当前位置:高等教育资讯网  >  中国高校课件下载中心  >  大学文库  >  浏览文档

《电子商务 E-business》阅读文献:Tutorial on Robustness of Recommender systems

资源类别:文库,文档格式:PDF,文档页数:195,文件大小:3.17MB,团购合买
点击下载完整版文档(PDF)

Tutorial on robustness of recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011

Tutorial on Robustness of Recommender Systems Tutorial on Robustness of Recommender Systems Neil Hurley Complex Adaptive System Laboratory Computer Science and Informatics University College Dublin Clique Strategic Research Cluster clique.ucd.ie October 2011 RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks Relevance of robustness a Measuring Robustness 2 Attack Strategies a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection ■Cost- Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy

Tutorial on Robustness of Recommender Systems Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? Profile Injection Attacks Relevance of robustnes Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy

Tutorial on Robustness of Recommender Systems What is Robustness? Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

Outline 1 What is Robustness? a Profile Injection Attacks rObUstnESs Gastrin g Robustn 2 Attack Strateg a Attacking kNN Algorithms 3 Attack Detection PCA-based Attack detectio Statistical Attack dete Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms a Provably Manipulation Resistant Algorithm sTability, Trust and Privacy

Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Outline 1 What is Robustness? Profile Injection Attacks Relevance of Robustness Measuring Robustness 2 Attack Strategies Attacking kNN Algorithms 3 Attack Detection PCA-based Attack Detection Statistical Attack Detection Cost-Benefit Analysis 4 Robustness of Model-based Algorithms 5 Attack Resistant Recommendation Algorithms Provably Manipulation Resistant Algorithms 6 Stability, Trust and Privacy RecSys 2011: Tutorial on Recommender Robustness

jection Attacks Defining the Problem a Recommender Systems use personal information about end-users to make useful personalised recommendations a When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct owever One can have, some claim, as many electronic per sonas as one has time and energy to create a How does the system perform if multiple identities are used to try to deliberately bias the recommender output

Tutorial on Robustness of Recommender Systems What is Robustness? Profile Injection Attacks Defining the Problem Recommender Systems use personal information about end-users to make useful personalised recommendations. When ratings are provided explicitly, recommender algorithms have been designed on the assumption that the provided information is correct. However . . . “One can have, some claim, as many electronic per￾sonas as one has time and energy to create” –Judith Donath (1998) as quoted in Douceur (2002) How does the system perform if multiple identities are used to try to deliberately bias the recommender output? RecSys 2011: Tutorial on Recommender Robustness

点击下载完整版文档(PDF)VIP每日下载上限内不扣除下载券和下载次数;
按次数下载不扣除下载券;
24小时内重复下载只扣除一次;
顺序:VIP每日次数-->可用次数-->下载券;
共195页,可试读30页,点击继续阅读 ↓↓
相关文档

关于我们|帮助中心|下载说明|相关软件|意见反馈|联系我们

Copyright © 2008-现在 cucdc.com 高等教育资讯网 版权所有