LIU Qing-lin MENG Ke LI Su-feng. Attack detection method based on statistical process control in collaborative recommender system[J]. Journal of Computer Applications, 2012, 32(03): 707-709.
[1]KWAK M, CHO D S. Collaborative filtering with automatic rating for recommendation[C]// ISIE 2001: IEEE International Symposium on Industrial Electronics. Piscataway, NJ: IEEE Press, 2001: 625-628.[2]YU XIAOGAO, JIAN YIN. A new clustering algorithm based on KNN and DENCLUE[C]// Proceedings of ICMLC 2005. Piscataway, NJ: IEEE Press, 2005: 2033-2038.[3]MOBASHER B, BURKE R, BHAUMIK R, et al. Effective attack models for shilling item-based collaborative filtering systems[C]// Proceedings of the WebKDD 2005. New York: ACM Press, 2005:13-23.[4]CHIRITA P A, NEJDL W, ZAMFIR C. Preventing shilling attacks in online recommender systems[C]// Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management. New York: ACM Press, 2005:67-74.[5]SU XUEFENG, ZENG HUAJUN, CHEN ZHENG. Finding group shilling in recommendation system[C]// Proceedings of the 14th International Conference on World Wide Web. New York: ACM Press, 2005:960-961.[6]唐通.基于时间SFM因子的推荐系统攻击检测方法[D].重庆:西南大学,2010.[7]WILLIAMS C, BHAUMIK R, BURKE R, et al. The impact of attack profile classification on the robustness of collaborative recommendation[C]// Proceedings of the WebKDD 2006. New York: ACM Press, 2006.[8]张公绪,孙静.统计过程控制与诊断[J].质量与可靠性,2002(4):39-45.[9]SHEWART W A. Economic control of quality of manufactured product [M]. New York: Van Nostrand, 1931.[10]何发镁,王旭仁.基于检测响应的安全协同推荐系统研究[J].微计算机信息, 2010,26(6): 1-2.