METHOD OF IDENTIFICATION BOT PROFILES BASED ON NEURAL NETWORKS IN RECOMMENDATION SYSTEMS
Main Article Content
Abstract
Article Details
References
(2010), Recommender Systems Handbook, Editors Francesco Ricci, Lior Rokach, Bracha Shapira, Paul B. Kantor, 1st edition, Springer-Verlag New York Inc., New York, USA, 842 p.
Lam, S.K.,and Riedl, J. (2004), “Shilling recommender systems for fun and profit”, Proceedings of the 13th International World Wide Web Conference, pp. 393–402.
O’Mahony, M.P., Hurley, N.J. and Silvestre, G.C.M. (2002), “Promoting recommendations: An attack on collaborative filtering”, Database and Expert Systems Applications: 13th International Conference, DEXA Aix-en-Provence, France, pp. 494-503.
Williams, C., Mobasher, B. and Burke, R. (2007), “Defending recommender systems: detection of profile injection attacks”, Service Oriented Computing and Applications, pp. 157–170.
Chirita, P.A., Nejdl, W. and Zamfir C. (2005), “Preventing shilling attacks in online recommender systems”, Proceedings of the ACM Workshop on Web Information and Data Management, pp. 67–74.
Zhou W., Wen J., Qu Q., Zeng J. and Cheng T. (2018), “Shilling attack detection for recommender systems based on credibility of group users and rating time series”, PLoS ONE 13(5): e0196533, DOI: https://doi.org/10.1371/journal.pone.0196533
Kumari, T. and Punam, B.A (2017), “Comprehensive Study of Shilling Attacks in Recommender Systems”, IJCSI International Journal of Computer Science Issues, Volume 14, Issue 4, URL: https://www.ijcsi.org/papers/IJCSI-14-4-44-50.pdf
Mobasher, B., Burke, R., Bhaumik, R. and Williams C. (2007), “Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness”, ACM Transactions on Internet Technology, Vol. 7(4), pp. 1–41.
Mobasher, B., Burke, R., Bhaumik R. and Williams C. (2005). “Effective attack models for shilling item-based collaborative filtering system”, Proceedings of the WebKDD Workshop, pp. 1–8.
Harper, F.M. and Konstan J.A. (2016), “The MovieLens Datasets: History and Context”, ACM Transactions on Interactive Intelligent Systems (TiiS), available at: https://doi.org/10.1145/2827872
(2020), TensorFlow tutorials, URL: https://www.tensorflow.org/tutorials/
(2017), “The gentle introduction to Adam optimization algorithm for deep learning”, Blog about Machine Learning, Neural Networks, Artificial Intelligence, URL: https://www.machinelearningmastery.ru/adam-optimization-algorithm-for-deep-learning (in Russian).