《电子商务 E-business》阅读文献:Tutorial on Robustness of Recommender systems

Tutorial on robustness of recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011
Tutorial on Robustness of Recommender Systems Tutorial on Robustness of Recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011 RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy
Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? Profile Injection Attacks Relevance of robustnes Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy
Tutorial on Robustness of Recommender Systems What is Robustness? Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks rObUstnESs Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy
Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

jection Attacks Defining the Problem a Recommender Systems use personal information about end-users to make useful personalised recommendations a When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct owever One can have, some claim, as many electronic per sonas as one has time and energy to create a How does the system perform if multiple identities are used to try to deliberately bias the recommender output
Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Defining the Problem Recommender Systems use personal information about end-users to make useful personalised recommendations. When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct. However . . . “One can have, some claim, as many electronic personas as one has time and energy to create” –Judith Donath (1998) as quoted in Douceur (2002) How does the system perform if multiple identities are used to try to deliberately bias the recommender output? RecSys 2011: Tutorial on Recommender Robustness
按次数下载不扣除下载券;
注册用户24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
- 《电子商务 E-business》阅读文献:Trust based recommender system using ant colony for trust computation.pdf
- 《电子商务 E-business》阅读文献:Tracking Usage in Collaborative Tagging Communities.pdf
- 《电子商务 E-business》阅读文献:towards a theory model for product search.pdf
- 《电子商务 E-business》阅读文献:topic-based Web page recommendation using tags.pdf
- 《电子商务 E-business》阅读文献:Topic Extraction from Scientific Literature for Competency Management.pdf
- 《电子商务 E-business》阅读文献:The task of guiding in adaptive recommender systems.pdf
- 《电子商务 E-business》阅读文献:the state of the art of ontology-based query systems.pdf
- 《电子商务 E-business》阅读文献:The Lane's Gifts v. Google Report.pdf
- 《电子商务 E-business》阅读文献:The Impact of Recommender Systems on Sales Diversity.pdf
- 《电子商务 E-business》阅读文献:The dynamic competitive recommendation algorithm in social network services.pdf
- 《电子商务 E-business》阅读文献:the benefit of using tag-based profiles.pdf
- 《电子商务 E-business》阅读文献:Tagging Practices on Research Oriented Social.pdf
- 《电子商务 E-business》阅读文献:Tag-Based User Profiling for Social Media Recommendation.pdf
- 《电子商务 E-business》阅读文献:tag-aware recommender systems by fusion of collaborative filtering algorithms.pdf
- 《电子商务 E-business》阅读文献:Tag Recommendation for Folksonomies Oriented towards Individual Users.pdf
- 《电子商务 E-business》阅读文献:Tag Based Collaborative Filtering for Recommender Systems.pdf
- 《电子商务 E-business》阅读文献:Supporting flexible processes through recommendations based on history.pdf
- 《电子商务 E-business》阅读文献:supporting distributed scientific collaboration implications fordesigning the Citeseer collaborator.pdf
- 《电子商务 E-business》阅读文献:STaR a Social Tag Recommender System.pdf
- 《电子商务 E-business》阅读文献:Social Trust in Recommender Systems.pdf
- 《电子商务 E-business》阅读文献:Ubiquitous User Modeling in Recommender Systems.pdf
- 《电子商务 E-business》阅读文献:User Modeling Adaptation Personalization.pdf
- 《电子商务 E-business》阅读文献:User Modeling for Recommendation in Blogspace.pdf
- 《电子商务 E-business》阅读文献:user profiling system using social networks for recommendation.pdf
- 《电子商务 E-business》阅读文献:User-Sensitive Expert Recommendations for Knowledge-Dense Environments.pdf
- 《电子商务 E-business》阅读文献:Using a Clustering Genetic Algorithm to support customer segmentation for personalized recommender systems.pdf
- 《电子商务 E-business》阅读文献:Using Genetic Algorithm for Hybrid Modes of Collaborative Filtering in.pdf
- 《电子商务 E-business》阅读文献:Using Genetic Algorithms for Personalized Recommendation.pdf
- 《电子商务 E-business》阅读文献:Using profiles and social networking to improve recommender systems.pdf
- 《电子商务 E-business》阅读文献:Using WordNet to Improve User Modelling in a Web Document.pdf
- 《电子商务 E-business》阅读文献:Utilizing various sparsity measures for enhancing accuracy of collaborative recommender systems based on local and global similarities.pdf
- 《电子商务 E-business》阅读文献:vocabulary patterns in free-for-all collaborative indexing systems.pdf
- 《电子商务 E-business》阅读文献:Web Intelligence in Tourism User Modeling and Recommender System.pdf
- 《电子商务 E-business》阅读文献:RFID Data Mining-Opportunities and Challenges.pdf
- 复旦大学:《电子商务 E-business》课程课件_电子商务概论 Introduction to E-business(赵卫东).pdf
- 复旦大学:《电子商务 E-business》课程课件_电子商务模式与网络创新.pdf
- 复旦大学:《电子商务 E-business》课程课件_电子商务安全技术基础.pptx
- 复旦大学:《电子商务 E-business》课程课件_电子商务安全 The Security in e -Commerce.pdf
- 复旦大学:《电子商务 E-business》课程课件_搜索引擎优化 Search Engine Optimization.pdf
- 复旦大学:《电子商务 E-business》课程课件_信息时代的电子商务推荐系统 E-Recommender Systems at Information Age.pdf