|
计算机应用研究 2008
Review of key security threats and countermeasures in recommender systems
|
Abstract:
This paper presented an overview of the five dimensions of shilling attack including category, attack model, power evaluation, detection and defence, and especially emphasized on the analysis of the key issue faced by each dimension.Finally, pointed out some promising directions in shilling attack.