Robust Collaborative Recommendation Algorithm Based on Fuzzy Kernel Clustering and Support Vector Machine
YI Huawei①②③ ZHANG Fuzhi①② Chao Jinbo①②
①(School of Information Science and Engineering, Yanshan University, Qinhuangdao 066004, China) ②(Key Laboratory for Computer Virtual Technology and System Integration of Hebei Province (Yanshan University), Qinhuangdao 066004, China) ③(School of Electronics and Information Engineering, Liaoning University of Technology, Jinzhou 121001, China)
The existing collaborative recommendation algorithms have low robustness against shilling attacks. To solve this problem, a robust collaborative recommendation algorithm is proposed based on Fuzzy Kernel Clustering (FKC) and Support Vector Machine (SVM). Firstly, according to the high correlation characteristic between attack profiles, the FKC method is used to cluster user profiles in high-dimensional feature space, which is the first stage of the attack profile detection. Then, the SVM classifier is used to classify the cluster including attack profiles, which is the second stage of the attack profile detection. Finally, an indicator function is constructed based on the attack detection results to reduce the influence of attack profiles on the recommendation, and it is combined with the matrix factorization technology to devise the corresponding robust collaborative recommendation algorithm. Experimental results show that the proposed algorithm outperforms the existing methods in terms of both recommendation accuracy and robustness.
MENG Xiangwu, LIU Shudong, ZHANG Yujie, et al. Research on social recommendation systems[J]. Journal of Software, 2015, 26(6): 1356-1372.
[2]
CHEN L, CHEN G L, WANG F. Recommender systems based on user reviews: The state of the art[J]. User Modeling and User-Adapted Interaction, 2015, 25(2): 99-154. doi: 10.1007/s11257-015-9155-5.
[3]
GUNES I, KALELI C, BILGE A, et al. Shilling attacks against recommender systems: A comprehensive survey[J]. Artificial Intelligence Review, 2014, 42(4): 767-799. doi: 10.1007/s10462-012-9364-9.
[4]
O'MAHONY M, HURLEY N, KUSHMERICK N, et al. Collaborative recommendation: A robustness analysis[J]. ACM Transactions on Internet Technology, 2004, 4(4): 344-377. doi: 10.1145/1031114.1031116.
[5]
MEHTA B and NEJDL W. Attack resistant collaborative filtering[C]. Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, Singapore, 2008: 75-82.
[6]
LEE J and ZHU D. Shilling attack detection-a new approach for a trustworthy recommender system[J]. Informs Journal on Computing, 2012, 24(1): 117-131. doi: 10.1287/ijoc.1100. 0440.
[7]
BHAUMIK R, MOBASHER B, and BURKE R. A clustering approach to unsupervised attack detection in collaborative recommender systems[C]. Proceedings of the 7th International Conference on Data Mining, IEEE Computer Society, Washington: 2011: 181-187.
LI Cong, LUO Zhigang, and SHI Jinlong. An unsupervised algorithm for detecting shilling attacks on recommender systems[J]. Acta Automatica Sinica, 2011, 37(2): 160-167.
[9]
WILLIAMS C A, MOBASHER B, BURKE R, et al. Detecting profile injection attacks in collaborative filtering: A classification-based approach[C]. Proceedings of the 8th Knowledge Discovery on the Web International Conference on Advances in Web Mining and Web Usage Analysis, Berlin, 2007: 167-186.
[10]
WILLIAMS C, MOBASHER B, and BURKE R. Defending recommender systems: Detection of profile injection attacks [J]. Service Oriented Computing and Applications, 2007, 1(3): 157-170. doi: 10.1007/s11761-007-0013-0.
[11]
HE F, WANG X, and LIU B. Attack detection by rough set theory in recommendation system[C]. 2010 IEEE International Conference on Granular Computing, Washington, 2010: 692-695.
LI Wentao, GAO Min, LI Hua, et al. An shilling attack detection algorithm based on popularity degree features[J]. Acta Automatica Sinica, 2015, 41(9): 1563-1575. doi: 10.16383/j.aas.2015.c150040.
[14]
ZHANG F and ZHOU Q. Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network[J]. Iet Information Security, 2015, 9(1): 24-31. doi: 10.1049/iet-ifs.2013.0145.
[15]
SANDVIG J J, MOBASHER B, and BURKE R. A survey of collaborative recommendation and the robustness of model-based algorithms[J]. Bulletin of the Technical Committee on Data Engineering, 2008, 31(2): 3-13.
[16]
SANDVIG J J, MOBASHER B, and BURKE R. Robustness of collaborative recommendation based on association rule mining[C]. Proceedings of the 2007 ACM Conference on Recommender Systems, Minneapolis, 2007: 105-112.
[17]
MEHTA B, HOFMANN T, and NEJDL W. Robust collaborative filtering[C]. ACM Conference on Recommender Systems, Recsys, Minneapolis, MN, USA, 2007: 49-56.
[18]
CHENG Z and HURLEY N. Robust collaborative recommendation by least trimmed squares matrix factorization[C]. Proceedings of the 22nd IEEE International Conference on Tools with Artificial Intelligence, Arras, France, 2010: 105-112.
[19]
YI Huawei and ZHANG Fuzhi. A robust collaborative recommendation algorithm based on k-distance and Tukey M-estimator[J]. China Communications, 2014, 11(9): 119-130. doi: 10.1109/CC.2014.6969776.
LI Cong and LUO Zhigang. A metadata-enhanced variational Bayesian matrix factorization model for robust collaborative recommendation[J]. Acta Automatica Sinica, 2011, 37(9): 1067-1076.
LI Gai and LI Lei. Robust ranking algorithms for one-class collaborative filtering[J]. Acta Automatica Sinica, 2015, 41(2): 405-418. doi: 10.16383/j.aas.2015.c140231.
[23]
YI H and ZHANG F. Robust recommendation algorithm based on the identification of suspicious users and matrix factorization[J]. Journal of Information and Computational Science, 2014, 11(13): 4769-4777. doi: 10.12733/ JICS20104307.
[24]
RICCI F, SHAPIRA B, and ROKACH L. Recommender Systems Handbook[M]. New York, Springer US, 2015: 961-995. doi: 10.1007/978-1-4899-7637-6_28.
[25]
DESHPANDE M and KARYPIS G. Item-based top-N recommendation algorithms[J]. ACM Transactions on Information Systems, 2004, 22(1): 143-177.