Secure Personalization: Building Trustworthy Recommender Systems∗

نویسندگان

  • Bamshad Mobasher
  • Robin Burke
چکیده

Th l f hi j i l h l bili i f d i d li i i h f f e goa o t s pro ect s to exp ore t e vu nera t es o recommen at on an persona zat on systems n t e ace o li i tt k l t h i f h i th i b t d i th d b hi h tt k b ma c ous a ac s, exp ore ec n ques or en anc ng e r ro us ness, an exam ne me o s y w c a ac s can e i d d ibl d f t d recogn ze an poss y e ea e . Example: Bandwagon attack Profiles use Collaborative Recommendation: Highly Vulnerable . popular items to push a target item C ll b i fil i (CF) d i i l d . o a orat ve ter ng recommen at on s common y use i U ' f t d b fil Impact of attack n e-commerce. sers pre erences are represen e y pro es th t i t f ti f d t S h t id tif After attack Before attack a cons s o ra ngs or pro uc s. uc sys ems en y peer users with similar tastes and extrapolates their ratings as likely 0 8 0.9

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Providing a model based on Recommender systems for hospital services (Case: Shariati Hospital of Tehran)

Background and objectives: In the increasingly competitive market of the healthcare industry, the organizations providing health care services are highly in need of systems that will enable them to meet their clients' needs in order to achieve a high degree of patient satisfaction. To this end, health managers need to identify the factors affecting patient satisfaction focus. T...

متن کامل

Trustworthy Agent-Based Recommender System in a Mobile P2P Environment

Current major P2P systems focus on PCs and do not provide services for the mobile environment. Compared to traditional P2P, characteristics of Mobile P2P include unreliable connections, limited bandwidth and constraints of mobile devices. In addition, nomadic users demand applications and services that are context-aware, personalised, secure, and trustworthy. Recommender systems are one of thes...

متن کامل

Personalization and Recommender Systems in the Larger Context: New Directions and Research Questions (Keynote Speech)

My background is in building large-scale library automation systems and distributed networked information systems; these are areas where personalization has been very slow to arrive, and where recommender systems have met both cultural opposition (in part based in privacy concerns) and technical barriers. I have been a strong advocate of personalization in information retrieval systems; this se...

متن کامل

Research Statement - Paolo Viappiani

Personalization can help people to better deal with the complexities of choices in their lives. Personalized preference-aware interactive systems are in great demand in many domains: for instance, ambient intelligence systems can make our homes more secure, comfortable and better organized, cognitive assistants help the elderly in their daily activities, tutoring systems facilitate learning, ad...

متن کامل

Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems

Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on userspecified judgments for building profiles. Attackers who cannot be readily distinguished from ordinary users may introduce biased data in an attempt to force the system to “adapt” in a manner...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2007