Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front. Comput. Sci.    2019, Vol. 13 Issue (2) : 231-246    https://doi.org/10.1007/s11704-017-6566-y
RESEARCH ARTICLE
From similarity perspective: a robust collaborative filtering approach for service recommendations
Min GAO1,2(), Bin LING3, Linda YANG3, Junhao WEN1,2, Qingyu XIONG1,2, Shun LI1,2
1. Key Laboratory of Dependable Service Computing in Cyber Physical Society (Chongqing University), Ministry of Education, Chongqing 400044, China
2. School of Software Engineering, Chongqing University, Chongqing 400044, China
3. School of Engineering, University of Portsmouth, Portsmouth PO1 3AH, UK
 Download: PDF(823 KB)  
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Collaborative filtering (CF) is a technique commonly used for personalized recommendation and Web service quality-of-service (QoS) prediction. However, CF is vulnerable to shilling attackers who inject fake user profiles into the system. In this paper, we first present the shilling attack problem on CF-based QoS recommender systems for Web services. Then, a robust CF recommendation approach is proposed from a user similarity perspective to enhance the resistance of the recommender systems to the shilling attack. In the approach, the generally used similarity measures are analyzed, and the DegSim (the degree of similarities with top k neighbors) with those measures is selected for grouping and weighting the users. Then, the weights are used to calculate the service similarities/differences and predictions.We analyzed and evaluated our algorithms using WS-DREAM and Movielens datasets. The experimental results demonstrate that shilling attacks influence the prediction of QoS values, and our proposed features and algorithms achieve a higher degree of robustness against shilling attacks than the typical CF algorithms.

Keywords collaborative filtering      service recommendation      system robustness      shilling attack     
Corresponding Author(s): Min GAO   
Just Accepted Date: 28 March 2017   Online First Date: 25 May 2018    Issue Date: 08 April 2019
 Cite this article:   
Min GAO,Bin LING,Linda YANG, et al. From similarity perspective: a robust collaborative filtering approach for service recommendations[J]. Front. Comput. Sci., 2019, 13(2): 231-246.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-017-6566-y
https://academic.hep.com.cn/fcs/EN/Y2019/V13/I2/231
1 Z BZheng, HMa, M RLyu, I King. Collaborative Web service QoS prediction via neighborhood integrated matrix factorization. IEEE Transactions on Services Computing, 2013, 6(3): 289–299
https://doi.org/10.1109/TSC.2011.59
2 AHernando, J Bobadilla, FOrtega. A non negative matrix factorization for collaborative filtering recommender systems based on a Bayesian probabilistic model. Knowledge-Based Systems, 2016, 97: 188–202
https://doi.org/10.1016/j.knosys.2015.12.018
3 J LXu, Z BZheng, M RLyu. Web service personalized quality of service prediction via reputation-based matrix factorization. IEEE Transactions on Reliability, 2016, 65(1): 28–37
https://doi.org/10.1109/TR.2015.2464075
4 S HJiang, X MQian, J LShen, Y Fu, TMei. Author topic modelbased collaborative filtering for personalized POI recommendations. IEEE Transactions on Multimedia, 2015, 17(6): 907–918
5 BMobasher, RBurke, J JSandvig. Model-based collaborative filtering as a defense against profile injection attacks. In: Proceedings of AAAI Conference on Artificial Intelligence. 2006, 1388–1393
6 NHurley, Z PCheng, MZhang. Statistical attack detection. In: Proceedings of the 3rd ACMConference on Recommender Systems. 2009, 149–156
https://doi.org/10.1145/1639714.1639740
7 SZhang, YOuyang, JFord, F Makedon. Analysis of a low-dimensional linear model under recommendation attacks. In: Proceedings of the 29th Annual ACM SIGIR Conference on Research and Development in Information Retrieval. 2006, 517–524
https://doi.org/10.1145/1148170.1148259
8 BSarwar, G Karypis, JKonstan, JRiedl . Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web. 2001, 285–295
https://doi.org/10.1145/371920.372071
9 BMobasher, RBurke, RBhaumik, C Williams. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 2007, 7(4): 2301–2338
https://doi.org/10.1145/1278366.1278372
10 Q QZhou. Supervised approach for detecting average over popular items attack in collaborative recommender systems. IET Information Security, 2016, 10(3): 134–141
https://doi.org/10.1049/iet-ifs.2015.0067
11 P AChirita, WNejdl, CZamfir. Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Workshop on Web Information and Data Management. 2005, 67–74
https://doi.org/10.1145/1097047.1097061
12 Z HYang, ZCai, X HGuan. Estimating user behavior toward detecting anomalous ratings in rating systems. Knowledge-Based Systems, 2016, 111: 114–158
https://doi.org/10.1016/j.knosys.2015.11.014
13 ZZhang, S R Kulkarni. Detection of shilling attacks in recommender systems via spectral clustering. In: Proceedings of the 17th IEEE Conference on Information Fusion. 2014, 1–8
14 JCao, ZWu, BMao, Y C Zhang. Shilling attack detection stilizing semi-supervised learning method for collaborative recommender system. World Wide Web, 2013, 16(5): 729–748
https://doi.org/10.1007/s11280-012-0164-6
15 ZWu, Y QWang, Y QWang, J J Wu, JCao, LZhang. Spammers detection from product reviews: a hybrid model. In: Proceedings of IEEE Conference on Data Mining. 2015, 1039–1044
https://doi.org/10.1109/ICDM.2015.73
16 JO’Donovan, B Smyth. Trust in recommender Systems. In: Proceedings of the 10th Conference on Intelligent User Interfaces. 2005, 39(4): 167–174
https://doi.org/10.1145/1040830.1040870
17 PMoradi, S Ahmadian. A reliability-based recommendation method to improve trust-aware recommender systems. Expert Systems with Applications, 2015, 42(21): 7386–7398
https://doi.org/10.1016/j.eswa.2015.05.027
18 HXia, BFang, MGao, H Ma, Y YTang, JWen. A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Information Sciences, 2015, 306: 150–165
https://doi.org/10.1016/j.ins.2015.02.019
19 BMobasher, RBurke , CWilliams, R Bhaumik. Analysis and detection of segment-focused attacks against collaborative recommendation. In: Proceedings of Advances in Web Mining and Web Usage Analysis. 2006, 96–118
https://doi.org/10.1007/11891321_6
20 BMobasher, RBurke, RBhaumik, C Williams. Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of KDD Workshop on Web Mining and Web Usage Analysis. 2005, 21–28
21 XChen, Z BZheng, QYu, M. RLyu.Web service recommendation via exploiting location and qos information. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7): 1913–1924
https://doi.org/10.1109/TPDS.2013.308
22 BMehta, T Hofmann, PFankhauser. Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th ACM Conference on Intelligent User Interfaces. 2007, 14–21
https://doi.org/10.1145/1216295.1216307
23 G JWang, FMusau, SGuo, M B Abdullahi. Neighbor similarity trust against sybil attack in P2P e-commerce. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(3): 824–833
https://doi.org/10.1109/TPDS.2014.2312932
24 MO’Mahony, N Hurley, NKushmerick. Collaborative recommendation: a robustness analysis. ACM Transactions on Internet Technology, 2004, 4(4): 344–377
https://doi.org/10.1145/1031114.1031116
25 M SShang, L YLu, WZeng, Y C Zhang, TZhou. Relevance is more significant than correlation: information filtering on sparse data. Europhysics Letters, 2009, 88(6): 68008
https://doi.org/10.1209/0295-5075/88/68008
26 C NZiegler, J Golbeck.Investigating interactions of trust and interest similarity. Decision Support Systems, 2007, 43(2): 460–475
https://doi.org/10.1016/j.dss.2006.11.003
27 D HLee, P Brusilovsky. Social networks and interest similarity: the case of CiteULike. In: Proceedings of the 21st ACM Conference on Hypertext and Hypermedia. 2010, 151–156
https://doi.org/10.1145/1810617.1810643
28 H KOh, S WKim, Robust features for trustable aggregation of online ratings. In: Proceedings of the 10th ACM Conference on Ubiquitous Information Management and Communication. 2016, 13–19
https://doi.org/10.1145/2857546.2857560
29 H PKriegel, PKroger, JSander, A Zimek. Density-based clustering. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2011, 1(3): 231–240
https://doi.org/10.1002/widm.30
30 MEster, H P Kriegel, JSander, XXu. A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of KDD Workshop on Web Mining and Web Usage Analysis. 1996, 226–231
31 DLemire, A Maclachlan. Slope one predictors for online rating-based collaborative filtering. In: Proceedings of the 2005 SIAM International Conference on Data Mining. 2005, 471–475
https://doi.org/10.1137/1.9781611972757.43
32 M PO’Mahony, N J Hurley, G CSilvestre. Promoting recommendations: an attack on collaborative filtering. Database and Expert Systems Applications. Springer Berlin Heidelberg, 2002, 2453: 494–503
33 JCao, Z AWu, Y QWang, Y Zhuang. Hybrid collaborative filtering algorithm for bidirectional Web service recommendation. Knowledge and Information Systems, 2013, 36(3): 607–627
https://doi.org/10.1007/s10115-012-0562-1
34 LYao, Q ZSheng, ASegev, J Yu. Recommending Web services via combining collaborative filtering with content-based features. In: Proceedings of the 20th IEEE Conference on Web Services. 2013, 42–49
https://doi.org/10.1109/ICWS.2013.16
35 Z BZheng, HMa, M RLyu, l King . QoS-aware Web service recommendation by collaborative filtering. IEEE Transaction on Services Computing, 2011, 4(2): 140–152
https://doi.org/10.1109/TSC.2010.52
36 J JJung.Attribute selection-based recommendation framework for short-head user group: an empirical study by movieLens and IMDB. Expert Systems with Applications, 2012, 39(4): 4049–4054
https://doi.org/10.1016/j.eswa.2011.09.096
37 W GRong, K CLiu, LLiang. Personalized Web service ranking via user group combining association rule. In: Proceedings of IEEE Conference on Services Computing. 2009, 445–452
https://doi.org/10.1109/ICWS.2009.113
38 W GRong, B LPeng, YOuyang, K C Liu, ZXiong. Collaborative personal profiling for Web service ranking and recommendation. Information Systems Frontiers, 2015, 17(6): 1265–1282
https://doi.org/10.1007/s10796-014-9495-4
39 XChen, X DLiu, Z CHuang, H L Sun. Region kNN: a scalable hybrid collaborative filtering algorithm for personalized Web service recommendation. In: Proceedings of IEEE Conference on Web Services. 2010, 9–16
40 KBryan, M O’Mahony, PCunningham. Unsupervised retrieval of attack profiles in collaborative recommender systems. In: Proceedings of ACM Conference on Recommender Systems. 2008, 155–162
https://doi.org/10.1145/1454008.1454034
41 PMassa, P Avesani. Trust-aware recommender systems. In: Proceedings of ACM Conference on Recommender Systems. 2007, 17–24
https://doi.org/10.1145/1297231.1297235
42 F GZhang. Research on trust based collaborative filtering algorithm for user’s multiple interests. Journal of Chinese Computer System, 2008, 29(8): 1415–1419
43 BMehta, WNejdl. Attack resistant collaborative filtering. In: Proceedings of the 31st ACM Conference on Research and Development in Information Retrieval. 2008, 75–82
https://doi.org/10.1145/1390334.1390350
44 N JHurley, Robustness of recommender systems. In: Proceedings of the 5th ACM Conference on Recommender System. 2011, 9–10
https://doi.org/10.1145/2043932.2043937
45 J RDouceur. The sybil attack. In: Proceedings of International Workshop on Peer-to-peer Systems. 2002, 251–260
https://doi.org/10.1007/3-540-45748-8_24
46 CKarlof, WDavid. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 2003, 1(2): 293–315
https://doi.org/10.1016/S1570-8705(03)00008-8
47 JNewsome, EShi, DSong, A Perrig. The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd ACM International Symposium on Information Processing in Sensor Networks. 2004, 259–268
https://doi.org/10.1145/984622.984660
48 H FYu, C WShi, MKaminsky, P B Gibbons, FXiao. Dsybil: optimal sybil-resistance for recommendation systems. In: Proceedings of the 30th IEEE Symposium on Security and Privacy. 2009, 283–298
https://doi.org/10.1109/SP.2009.26
49 GNoh, Y MKang, HOh, C KKim. Robust sybil attack defense with information level in online recommender systems. Expert Systems with Applications, 2014, 41(4): 1781–1791
https://doi.org/10.1016/j.eswa.2013.08.077
[1] Jia HE, Fuzhen ZHUANG, Yanchi LIU, Qing HE, Fen LIN. Bayesian dual neural networks for recommendation[J]. Front. Comput. Sci., 2019, 13(6): 1255-1265.
[2] Zhoujun LI, Haijun ZHANG, Senzhang WANG, Feiran HUANG, Zhenping LI, Jianshe ZHOU. Exploit latent Dirichlet allocation for collaborative filtering[J]. Front. Comput. Sci., 2018, 12(3): 571-581.
[3] Shaha AL-OTAIBI, Mourad YKHLEF. Hybrid immunizing solution for job recommender system[J]. Front. Comput. Sci., 2017, 11(3): 511-527.
[4] Hua MA,Zhigang HU. Recommend trustworthy services using interval numbers of four parameters via cloud model for potential users[J]. Front. Comput. Sci., 2015, 9(6): 887-903.
[5] Qiang GUO , Jianguo LIU , Binghong WANG , . Improved collaborative filtering algorithm based on heat conduction[J]. Front. Comput. Sci., 2009, 3(3): 417-420.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed