中国高校课件下载中心 》 教学资源 》 大学文库

《电子商务 E-business》阅读文献:Tutorial on Robustness of Recommender systems

文档信息
资源类别:文库
文档格式:PDF
文档页数:195
文件大小:3.17MB
团购合买:点击进入团购
内容简介
《电子商务 E-business》阅读文献:Tutorial on Robustness of Recommender systems
刷新页面文档预览

Tutorial on robustness of recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011

Tutorial on Robustness of Recommender Systems Tutorial on Robustness of Recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011 RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? Profile Injection Attacks Relevance of robustnes Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy

Tutorial on Robustness of Recommender Systems What is Robustness? Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks rObUstnESs Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy

Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

jection Attacks Defining the Problem a Recommender Systems use personal information about end-users to make useful personalised recommendations a When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct owever One can have, some claim, as many electronic per sonas as one has time and energy to create a How does the system perform if multiple identities are used to try to deliberately bias the recommender output

Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Defining the Problem Recommender Systems use personal information about end-users to make useful personalised recommendations. When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct. However . . . “One can have, some claim, as many electronic per￾sonas as one has time and energy to create” –Judith Donath (1998) as quoted in Douceur (2002) How does the system perform if multiple identities are used to try to deliberately bias the recommender output? RecSys 2011: Tutorial on Recommender Robustness

刷新页面下载完整文档
VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
相关文档