%0 Journal Article %T Review of key security threats and countermeasures in recommender systems
推荐系统安全问题及技术研究综述* %A ZHANG Fu-guo %A XU Sheng-hua %A
张富国 %A 徐升华 %J 计算机应用研究 %D 2008 %I %X This paper presented an overview of the five dimensions of shilling attack including category, attack model, power evaluation, detection and defence, and especially emphasized on the analysis of the key issue faced by each dimension.Finally, pointed out some promising directions in shilling attack. %K 推荐系统 %K 安全 %K 托攻击 %K 检测 %K 防御 %U http://www.alljournals.cn/get_abstract_url.aspx?pcid=5B3AB970F71A803DEACDC0559115BFCF0A068CD97DD29835&cid=8240383F08CE46C8B05036380D75B607&jid=A9D9BE08CDC44144BE8B5685705D3AED&aid=2BCA748611A165DABF04ABE1E7FCDD0E&yid=67289AFF6305E306&vid=C5154311167311FE&iid=38B194292C032A66&sid=46682C11199DA00C&eid=00520952CD4BF212&journal_id=1001-3695&journal_name=计算机应用研究&referenced_num=1&reference_num=28