Utilizing Artificial Intelligence to Detect Fraudulent Manipulation in Recommender Systems

IF 0.5 Q4 AUTOMATION & CONTROL SYSTEMS
Kulvinder Singh, Sanjeev Dhawan, Sarika Gambhir
{"title":"Utilizing Artificial Intelligence to Detect Fraudulent Manipulation in Recommender Systems","authors":"Kulvinder Singh,&nbsp;Sanjeev Dhawan,&nbsp;Sarika Gambhir","doi":"10.3103/S0146411625700178","DOIUrl":null,"url":null,"abstract":"<p>The recommender system (RS) utilizes collective user opinions to forecast customer preferences. RS can be vulnerable to malicious information attacks. Introducing deceitful “shilling” profiles, such as push and nuke attacks, into the RS can promote inappropriate products. The introduction of these attacks results in inaccurate product recommendations. Because of their openness, Recommender systems are vulnerable to the injection of several fraudulent profiles, which might manipulate their predictions. Conventional detection methods rely on artificial characteristics derived from a single category of user-generated data. These methods need to comprehensively capture detailed user-item interactions, resulting in decreased accuracy when detecting diverse attacks. This study utilizes the modified density peak clustering algorithm to create a well-defined cluster using customer review information. The integration of collaborative filtering and content-based filtering methods has enabled a more advanced recurrent neural network algorithm to more precisely identify these hazards within hybrid recommendation systems. Characteristics obtained through varying degrees of corruption are ultimately incorporated into feeble classifiers capable of detecting attacks. Numerous assaults can be identified using the proposed method, as demonstrated by experimental testing on the Amazon dataset. In the realm of electronic commerce platforms, the recommended approach proves to be more effective for those experiencing rapid expansion in both product offerings and consumer base.</p>","PeriodicalId":46238,"journal":{"name":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","volume":"59 2","pages":"206 - 218"},"PeriodicalIF":0.5000,"publicationDate":"2025-07-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"AUTOMATIC CONTROL AND COMPUTER SCIENCES","FirstCategoryId":"1085","ListUrlMain":"https://link.springer.com/article/10.3103/S0146411625700178","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q4","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The recommender system (RS) utilizes collective user opinions to forecast customer preferences. RS can be vulnerable to malicious information attacks. Introducing deceitful “shilling” profiles, such as push and nuke attacks, into the RS can promote inappropriate products. The introduction of these attacks results in inaccurate product recommendations. Because of their openness, Recommender systems are vulnerable to the injection of several fraudulent profiles, which might manipulate their predictions. Conventional detection methods rely on artificial characteristics derived from a single category of user-generated data. These methods need to comprehensively capture detailed user-item interactions, resulting in decreased accuracy when detecting diverse attacks. This study utilizes the modified density peak clustering algorithm to create a well-defined cluster using customer review information. The integration of collaborative filtering and content-based filtering methods has enabled a more advanced recurrent neural network algorithm to more precisely identify these hazards within hybrid recommendation systems. Characteristics obtained through varying degrees of corruption are ultimately incorporated into feeble classifiers capable of detecting attacks. Numerous assaults can be identified using the proposed method, as demonstrated by experimental testing on the Amazon dataset. In the realm of electronic commerce platforms, the recommended approach proves to be more effective for those experiencing rapid expansion in both product offerings and consumer base.

Abstract Image

利用人工智能检测推荐系统中的欺诈操作
推荐系统(RS)利用用户的集体意见来预测顾客的偏好。RS容易受到恶意信息攻击。在RS中引入欺骗性的“先令”配置文件,例如推和核攻击,可以推广不适当的产品。引入这些攻击会导致不准确的产品推荐。由于它们的开放性,推荐系统很容易受到一些欺诈性配置文件的影响,这些配置文件可能会操纵它们的预测。传统的检测方法依赖于从单一类别的用户生成数据中获得的人工特征。这些方法需要全面捕获详细的用户-项目交互,因此在检测各种攻击时准确性降低。本研究利用改进的密度峰值聚类算法,利用顾客评论信息创建一个定义良好的聚类。协同过滤和基于内容的过滤方法的集成使更先进的递归神经网络算法能够更精确地识别混合推荐系统中的这些危害。通过不同程度的损坏获得的特征最终被纳入能够检测攻击的弱分类器。正如在Amazon数据集上的实验测试所证明的那样,使用所提出的方法可以识别许多攻击。在电子商务平台领域,对于那些在产品供应和消费者基础方面都经历快速扩张的公司来说,推荐的方法被证明是更有效的。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
AUTOMATIC CONTROL AND COMPUTER SCIENCES
AUTOMATIC CONTROL AND COMPUTER SCIENCES AUTOMATION & CONTROL SYSTEMS-
CiteScore
1.70
自引率
22.20%
发文量
47
期刊介绍: Automatic Control and Computer Sciences is a peer reviewed journal that publishes articles on• Control systems, cyber-physical system, real-time systems, robotics, smart sensors, embedded intelligence • Network information technologies, information security, statistical methods of data processing, distributed artificial intelligence, complex systems modeling, knowledge representation, processing and management • Signal and image processing, machine learning, machine perception, computer vision
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信