Beruflich Dokumente
Kultur Dokumente
in Recommender Systems
By
Ayush Sharma
Gain in Value
The purpose of information collected by a
recommender is to differentiate a user from her peers.
Some pieces of data are inherently more valuable than
others thus, are better at differentiating among users.
Providing a recommender with data may produce
diminishing returns. That is, perhaps once a certain
amount is known about a user, obtaining further
information is only marginally useful.
Exposure Risk
When a user divulges his personal information, there is
a direct risk that someone will learn information that
the user wished to keep private.
Combinations of attributes may be highly identifying.
Such combinations are sometimes called a quasiidentifier to differentiate them from directly identifying
information like social security number. Personal
preferences like those expressed to many recommender
systems may also turn out to be a quasi-identifier.
Recommendation Bias
Bias may be to increase (push) or decrease
(nuke) the visibility of other items. There are
many ways to bias a recommender system.
One such attack is Shilling attack which attempts
to manipulate the systems recommendations for a
particular item by submitting misrepresented
opinions to the system.
Average Bot
An Average Bot attacker is more effective but
requires knowledge of the average rating for each
item in the system.
Each Average Bot attacker rates the items outside
the target set randomly, following a normal
distribution with a mean equal to the average
rating for that item, thus becoming more similar
to the real users than the Random Bot.
References
Do You Trust Your Recommendations? An Exploration Of
Security and Privacy Issues in Recommender Systems by
Shyong K Tony Lam, Dan Frankowski, and John Riedl
http://files.grouplens.org/papers/lam-etrics2006-security.pdf
Towards the Next Generation of Recommender Systems:A
Survey of the State-of-the-Art and Possible Extensions by
Gediminas Adomavicius and Alexander Tuzhilin
Preventing shilling attacks in online recommender systems
by Paul-Alexandru Chirita Wolfgang Nejdl Cristian Zamfir(
http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.
1.60.1540&rep=rep1&type=pdf
)
References
Profile Injection Attack Detection for Securing
Collaborative Recommender Systems by Chad
Williams.(
http://citeseerx.ist.psu.edu/viewdoc/downlo
ad?doi=10.1.1.162.2966&rep=rep1&type=pdf
)
Detecting Profile Injection Attacks in
Collaborative Recommender Systems by Robin
Burke, Bamshad Mobasher, Chad Williams,
Runa Bhaumik(
http://citeseerx.ist.psu.edu/viewdoc/downlo
ad?rep=rep1&type=pdf&doi=10.1.1.87.2235
)