{"title":"先令攻击和虚假评论注入:原理、模型和数据集","authors":"Dina Nawara;Ahmed Aly;Rasha Kashef","doi":"10.1109/TCSS.2024.3465008","DOIUrl":null,"url":null,"abstract":"Recommendation systems have proved to be a compelling performance in overcoming the data overload problem in many domains, such as e-commerce, e-health, and transportation. Recommender systems guide users/clients to personalized recommendations based on their preferences. However, some recommendation systems are vulnerable to shilling attacks, which create rating biases or fake reviews that will eventually affect the authenticity and integrity of the generated recommendations. This survey comprehensively covers various shilling attack methods, including high-knowledge, low-knowledge attacks, and obfuscated attacks. It explores malicious review generators that generate fake text. In addition to that, this survey covers shilling attack detection methods such as supervised, unsupervised, semisupervised, and hybrid techniques. Natural Language Processing techniques are also thoroughly explored for fake text review detection using large language models (LLMs). A wide range of detection mechanisms incorporated in the literature is examined, such as convolutional neural network (CNN), long short term memory (LSTM)-based detectors for rating-based shilling attacks, and bidirectional encoder representation (BERT) and RoBERTa-based detectors for fake reviews that are accompanied by shilling attacks, aiming to offer insights into the evolving methods of shilling attack strategies and the corresponding advancements in the detection methods.","PeriodicalId":13044,"journal":{"name":"IEEE Transactions on Computational Social Systems","volume":"12 1","pages":"362-375"},"PeriodicalIF":4.5000,"publicationDate":"2024-10-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10716004","citationCount":"0","resultStr":"{\"title\":\"Shilling Attacks and Fake Reviews Injection: Principles, Models, and Datasets\",\"authors\":\"Dina Nawara;Ahmed Aly;Rasha Kashef\",\"doi\":\"10.1109/TCSS.2024.3465008\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Recommendation systems have proved to be a compelling performance in overcoming the data overload problem in many domains, such as e-commerce, e-health, and transportation. Recommender systems guide users/clients to personalized recommendations based on their preferences. However, some recommendation systems are vulnerable to shilling attacks, which create rating biases or fake reviews that will eventually affect the authenticity and integrity of the generated recommendations. This survey comprehensively covers various shilling attack methods, including high-knowledge, low-knowledge attacks, and obfuscated attacks. It explores malicious review generators that generate fake text. In addition to that, this survey covers shilling attack detection methods such as supervised, unsupervised, semisupervised, and hybrid techniques. Natural Language Processing techniques are also thoroughly explored for fake text review detection using large language models (LLMs). A wide range of detection mechanisms incorporated in the literature is examined, such as convolutional neural network (CNN), long short term memory (LSTM)-based detectors for rating-based shilling attacks, and bidirectional encoder representation (BERT) and RoBERTa-based detectors for fake reviews that are accompanied by shilling attacks, aiming to offer insights into the evolving methods of shilling attack strategies and the corresponding advancements in the detection methods.\",\"PeriodicalId\":13044,\"journal\":{\"name\":\"IEEE Transactions on Computational Social Systems\",\"volume\":\"12 1\",\"pages\":\"362-375\"},\"PeriodicalIF\":4.5000,\"publicationDate\":\"2024-10-14\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10716004\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Computational Social Systems\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10716004/\",\"RegionNum\":2,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"COMPUTER SCIENCE, CYBERNETICS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Computational Social Systems","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10716004/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, CYBERNETICS","Score":null,"Total":0}
Shilling Attacks and Fake Reviews Injection: Principles, Models, and Datasets
Recommendation systems have proved to be a compelling performance in overcoming the data overload problem in many domains, such as e-commerce, e-health, and transportation. Recommender systems guide users/clients to personalized recommendations based on their preferences. However, some recommendation systems are vulnerable to shilling attacks, which create rating biases or fake reviews that will eventually affect the authenticity and integrity of the generated recommendations. This survey comprehensively covers various shilling attack methods, including high-knowledge, low-knowledge attacks, and obfuscated attacks. It explores malicious review generators that generate fake text. In addition to that, this survey covers shilling attack detection methods such as supervised, unsupervised, semisupervised, and hybrid techniques. Natural Language Processing techniques are also thoroughly explored for fake text review detection using large language models (LLMs). A wide range of detection mechanisms incorporated in the literature is examined, such as convolutional neural network (CNN), long short term memory (LSTM)-based detectors for rating-based shilling attacks, and bidirectional encoder representation (BERT) and RoBERTa-based detectors for fake reviews that are accompanied by shilling attacks, aiming to offer insights into the evolving methods of shilling attack strategies and the corresponding advancements in the detection methods.
期刊介绍:
IEEE Transactions on Computational Social Systems focuses on such topics as modeling, simulation, analysis and understanding of social systems from the quantitative and/or computational perspective. "Systems" include man-man, man-machine and machine-machine organizations and adversarial situations as well as social media structures and their dynamics. More specifically, the proposed transactions publishes articles on modeling the dynamics of social systems, methodologies for incorporating and representing socio-cultural and behavioral aspects in computational modeling, analysis of social system behavior and structure, and paradigms for social systems modeling and simulation. The journal also features articles on social network dynamics, social intelligence and cognition, social systems design and architectures, socio-cultural modeling and representation, and computational behavior modeling, and their applications.