Shilling attack resistance recommendation algorithm based on matrix completion

A technology of matrix completion and recommendation algorithm, applied in the field of information security in the field of computer technology, and can solve problems such as trust attacks

Active Publication Date: 2018-08-31
NANJING UNIV OF POSTS & TELECOMM
View PDF3 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Purpose of the invention: Based on the structured noise matrix completion technology, the present invention proposes a robust personalized recommendation algorithm against trolling attacks to improve the ability of the recommendation system to resist trollin

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Shilling attack resistance recommendation algorithm based on matrix completion
  • Shilling attack resistance recommendation algorithm based on matrix completion
  • Shilling attack resistance recommendation algorithm based on matrix completion

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0082] A matrix-completion-based anti-trust attack recommendation algorithm includes the following steps:

[0083] 1) Establish user-item rating matrix:

[0084] m users form user set U={u 1 , u 2 ,...u m}, n items constitute the item collection I={i 1 ,i 2 ,…i n}, the user-item rating matrix can be expressed as

[0085]

[0086] Among them, the rating of user u on item i is denoted as r i,j , "*" indicates a known score, and "?" indicates an unknown score.

[0087] 2) Establish a recommendation system model:

[0088] For recommendation system problems, low-rank matrix completion techniques can be used for score prediction. Using R to represent the currently observed scoring matrix, the recommendation system problem can be modeled as:

[0089]

[0090] Among them, the Ω set represents the set of element subscripts that have received ratings in the scoring matrix, The X matrix is ​​a low-dimensional unknown matrix, σ i is the matrix kernel norm, σ i is t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a shilling attack resistance recommendation algorithm based on matrix completion. The algorithm comprises the following steps that: firstly, carrying out statistics on the scoring of a user for an item, extracting the attribute characteristics of the user and the attribute characteristics of the item, and independently constructing a user-item scoring matrix, a user attribute characteristic matrix and an item attribute characteristic matrix; then, modeling shilling attack scoring in the user-item scoring matrix into structured noise in a matrix completion model; then, adopting a blocking coordinate descent algorithm to carry out iterative update on each variable, and solving a structured line noise matrix; subsequently, according to the structured line noise matrix,rejecting the shilling attack scoring in the user-item scoring matrix; and finally, using a traditional recommendation algorithm to carry out scoring prediction, and solving a prediction scoring matrix. By use of the recommendation algorithm provided by the invention, the shilling attack user in a recommendation system can be effectively detected, a personalized scoring prediction effect which ismore accurate than a traditional recommendation algorithm can be obtained under shilling attack interference, and the robustness of the recommendation algorithm is effectively improved.

Description

technical field [0001] The invention belongs to the field of information security in the field of computer technology, and in particular relates to an anti-trust attack recommendation algorithm based on matrix completion. Background technique [0002] Facing the problem of information overload, the recommendation system came into being. A recommendation system is a software system that understands user preferences by collecting user information, item information, and user-item interaction information, thereby recommending items that users may be interested in to users, and to a certain extent solves the information that troubles users. overload problem. One of the mainstream algorithms currently used to implement recommendation systems is the collaborative filtering algorithm. It relies on users' historical behavior, analyzes past user-item interactions, and establishes new user-item connections. However, the generator of user-item interaction data is all users, and no ac...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F17/30G06F17/16
CPCG06F17/16G06F16/9535
Inventor 张涵峰陈蕾周宇轩曹璐张冯崇
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products