Skip to main content

Collaborative Shilling Detection Bridging Factorization and User Embedding

  • Conference paper
  • First Online:

Abstract

The recommender system based on collaborative filtering is vulnerable to shilling attacks due to its open nature. With the wide employment of recommender systems, an increasing number of attackers are disordering the system in order to benefit from the manipulated recommendation results. Therefore, how to effectively detect shilling attacks now becomes more and more crucial. Most existing detection models recognize attackers in statistics-based manners. However, they failed in capturing the fine-grained interactions between users and items, leading to a degradation in detection accuracy. In this paper, inspired by the success of word embedding models, we propose a collaborative shilling detection model, CoDetector, which jointly decomposes the user-item interaction matrix and the user-user co-occurrence matrix with shared user latent factors. Then, the learned user latent factors containing network embedding information are used as features to detect attackers. Experiments conducted on simulated and real-world datasets show that CoDetector has a good performance and generalization capacity and outperforms state-of-the-art methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: International Conference on World Wide Web, pp. 393–402. ACM (2004)

    Google Scholar 

  2. Yu, J., et al.: Hybrid attacks on model-based social recommender systems. Phys. Stat. Mech. Its Appl. 483, 171–181 (2017)

    Article  Google Scholar 

  3. Levy, O., Goldberg, Y.: Neural word embedding as implicit matrix factorization. In: Advances in Neural Information Processing Systems, vol. 3, pp. 2177–2185 (2014)

    Google Scholar 

  4. Mikolov, T., et al. : Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26, pp. 3111–3119 (2013)

    Google Scholar 

  5. Burke, R., et al.: Classification features for attack detection in collaborative recommender systems. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542–547. ACM (2006)

    Google Scholar 

  6. Chirita, P.-A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management. ACM (2005)

    Google Scholar 

  7. Li, W., et al.: Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Trans. Inf. Syst. 99(10), 2600–2611 (2016)

    Article  Google Scholar 

  8. Mobasher, B., Burke, R., Williams, C., Bhaumik, R.: Analysis and detection of segment-focused attacks against collaborative recommendation. In: Nasraoui, O., Zaïane, O., Spiliopoulou, M., Mobasher, B., Masand, B., Yu, P.S. (eds.) WebKDD 2005. LNCS (LNAI), vol. 4198, pp. 96–118. Springer, Heidelberg (2006). https://doi.org/10.1007/11891321_6

    Chapter  Google Scholar 

  9. Burke, R., et al.: Segment-based injection attacks against collaborative filtering recommender systems. In: Fifth IEEE International Conference on Data Mining. IEEE (2005)

    Google Scholar 

  10. Cao, J., et al.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5–6), 729–748 (2013)

    Article  Google Scholar 

  11. Zhang, Z., Kulkarni, S.R.: Graph-based detection of shilling attacks in recommender systems. In: 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP). IEEE (2013)

    Google Scholar 

  12. Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(8), 30–37 (2009)

    Article  Google Scholar 

  13. Mikolov, T., et al.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)

  14. Zhang, Y., et al.: Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: IJCAI (2015)

    Google Scholar 

  15. Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User Adapt. Interact. 19(1), 65–97 (2009)

    Article  Google Scholar 

  16. Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31(1), 31–39 (2016)

    Article  Google Scholar 

  17. Wu, Z.A., Wang, Y.Q., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Chin. Sci. Bull. 59(7), 551–560 (2014)

    Article  Google Scholar 

  18. Wu, Z., et al.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM). IEEE (2015)

    Google Scholar 

  19. Li, X.-L., et al.: Positive unlabeled learning for data stream classification. In: Proceedings of the 2009 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics (2009)

    Google Scholar 

  20. Xu, C., et al.: Uncovering collusive spammers in Chinese review websites. In: ACM International Conference on Conference on Information and Knowledge Management, pp. 979–988. ACM (2013)

    Google Scholar 

Download references

Acknowledgment

This research is supported by the National Key Basic Research Program of China (973) (2013CB328903), and the Graduate Scientific Research and Innovation Foundation of Chongqing (cys17035).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Qingyu Xiong .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2018 ICST Institute for Computer Sciences, Social Informatics and Telecommunications Engineering

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., Fang, Q. (2018). Collaborative Shilling Detection Bridging Factorization and User Embedding. In: Romdhani, I., Shu, L., Takahiro, H., Zhou, Z., Gordon, T., Zeng, D. (eds) Collaborative Computing: Networking, Applications and Worksharing. CollaborateCom 2017. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 252. Springer, Cham. https://doi.org/10.1007/978-3-030-00916-8_43

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-00916-8_43

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-00915-1

  • Online ISBN: 978-3-030-00916-8

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics