dc.contributor.author | Batmaz, Zeynep | |
dc.contributor.author | Polat, Hüseyin | |
dc.date.accessioned | 2019-10-21T19:44:14Z | |
dc.date.available | 2019-10-21T19:44:14Z | |
dc.date.issued | 2017 | |
dc.identifier.issn | 1759-1163 | |
dc.identifier.issn | 1759-1171 | |
dc.identifier.uri | https://dx.doi.org/10.1504/IJDMMM.2017.10007683 | |
dc.identifier.uri | https://hdl.handle.net/11421/19838 | |
dc.description | WOS: 000413827300001 | en_US |
dc.description.abstract | Privacy-preserving collaborative filtering methods are effectual ways of coping with information overload problem while protecting confidential data. Their success depends on the quality of the collected data. However, malicious entities might create fake profiles and insert them into user-item matrices of such filtering schemes. Hence, shilling attacks play an important role on the quality of data. Designing effective shilling attacks and performing robustness analysis of privacy-preserving collaborative filtering methods are receiving increasing attention. In this study, six shilling attack models are designed to attack binary disguised user-item matrices in privacy-preserving collaborative filtering methods. The attack models are applied to naive Bayesian classifier-based collaborating filtering scheme with privacy to measure its robustness against fake profiles. Empirical results on real data show that designing effective shilling attacks is still possible on perturbed binary ratings and naive Bayesian classifier-based privacy-preserving collaborative filtering algorithm is vulnerable to such shilling attacks. | en_US |
dc.language.iso | eng | en_US |
dc.publisher | Inderscience Enterprises LTD | en_US |
dc.relation.isversionof | 10.1504/IJDMMM.2017.10007683 | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Shilling | en_US |
dc.subject | Privacy | en_US |
dc.subject | Binary Data | en_US |
dc.subject | Collaborative Filtering | en_US |
dc.subject | Robustness | en_US |
dc.title | Designing shilling attacks on disguised binary data | en_US |
dc.type | article | en_US |
dc.relation.journal | International Journal of Data Mining Modelling and Management | en_US |
dc.contributor.department | Anadolu Üniversitesi, Mühendislik Fakültesi, Bilgisayar Mühendisliği Bölümü | en_US |
dc.identifier.volume | 9 | en_US |
dc.identifier.issue | 3 | en_US |
dc.identifier.startpage | 185 | en_US |
dc.identifier.endpage | 200 | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US] |
dc.contributor.institutionauthor | Batmaz, Zeynep | |