nanoll extt
Please use this identifier to cite or link to this item: http://lrcdrs.bennett.edu.in:80/handle/123456789/926
Full metadata record
DC FieldValueLanguage
dc.contributor.authorGarg, Deepak-
dc.date.accessioned2023-04-03T04:39:01Z-
dc.date.available2023-04-03T04:39:01Z-
dc.date.issued2017-
dc.identifier.urihttps://www.researchgate.net/publication/317059645_Clustering_Approach_to_detect_Profile_Injection_Attacks_in_Recommender_System-
dc.identifier.urihttp://lrcdrs.bennett.edu.in:80/handle/123456789/926-
dc.description.abstractRecommender systems apply techniques of knowledge discovery for specific problem to make personalized recommendation of the products or services to the users. The huge growth in the information and the count of visitors to the web sites especially on e-commerce in last few years creates some challenges for recommender systems. E-commerce recommender systems are vulnerable to the profile injection attacks, involving insertion of fake profiles into the system to influence the recommendations made to the users. Prior work has shown that performance of system can be affected by even small number of biased profiles. In this paper, we show that unsupervised clustering approach can be used effectively for the detection of profile injection attacks in recommender system. Here we give a comparative study of four clustering algorithms and measure their performanceen_US
dc.description.sponsorship.en_US
dc.language.isoen_USen_US
dc.publisherInternational Journal of Computer Applicationsen_US
dc.relation.ispartofseriesVolume 166;No.6-
dc.subjectRecommender systemen_US
dc.subjectCollaborative filteringen_US
dc.subjectDetectionen_US
dc.subjectBias profile injectionen_US
dc.subjectPerformance measureen_US
dc.subjectUnsupervised approachen_US
dc.titleClustering Approach to detect Profile Injection Attacks in Recommender Systemen_US
dc.typeArticleen_US
Appears in Collections:Journal Articles_SCSET

Files in This Item:
File Description SizeFormat 
1402 Clustering_Approach_to_detect_Profile_Injection_Attacks in recommender system.pdf
  Restricted Access
831.63 kBAdobe PDFView/Open Request a copy

Contact admin for Full-Text

Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.