Designing shilling attacks on disguised binary data
Zeynep Batmaz and
Huseyin Polat
International Journal of Data Mining, Modelling and Management, 2017, vol. 9, issue 3, 185-200
Abstract:
Privacy-preserving collaborative filtering methods are effectual ways of coping with information overload problem while protecting confidential data. Their success depends on the quality of the collected data. However, malicious entities might create fake profiles and insert them into user-item matrices of such filtering schemes. Hence, shilling attacks play an important role on the quality of data. Designing effective shilling attacks and performing robustness analysis of privacy-preserving collaborative filtering methods are receiving increasing attention. In this study, six shilling attack models are designed to attack binary disguised user-item matrices in privacy-preserving collaborative filtering methods. The attack models are applied to naïve Bayesian classifier-based collaborating filtering scheme with privacy to measure its robustness against fake profiles. Empirical results on real data show that designing effective shilling attacks is still possible on perturbed binary ratings and na
Keywords: shilling; privacy; binary data; collaborative filtering; robustness. (search for similar items in EconPapers)
Date: 2017
References: Add references at CitEc
Citations:
Downloads: (external link)
http://www.inderscience.com/link.php?id=86576 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:ids:ijdmmm:v:9:y:2017:i:3:p:185-200
Access Statistics for this article
More articles in International Journal of Data Mining, Modelling and Management from Inderscience Enterprises Ltd
Bibliographic data for series maintained by Sarah Parker ().