{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,2]],"date-time":"2026-05-02T04:25:55Z","timestamp":1777695955333,"version":"3.51.4"},"reference-count":33,"publisher":"SAGE Publications","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IDA"],"published-print":{"date-parts":[[2021,1,26]]},"abstract":"<jats:p>A recommendation system is based on the user and the items, providing appropriate items to the user and effectively helping the user to find items that may be of interest. The most commonly used recommendation method is collaborative filtering. However, in this case, the recommendation system will be injected with false data to create false ratings to push or nuke specific items. This will affect the user\u2019s trust in the recommendation system. After all, it is important that the recommendation system provides a trusted recommendation item. Therefore, there are many algorithms for detecting attacks. In this article, it proposes a method to detect attacks based on the beta distribution. Different researchers in the past assumed that the attacker only attacked one target item in the user data. This research simulated an attacker attacking multiple target items in the experiment. The result showed a detection rate of more than 80%, and the false rate was within 16%.<\/jats:p>","DOI":"10.3233\/ida-194935","type":"journal-article","created":{"date-parts":[[2021,2,2]],"date-time":"2021-02-02T14:40:27Z","timestamp":1612276827000},"page":"121-137","source":"Crossref","is-referenced-by-count":5,"title":["Using the beta distribution technique to detect attacked items from collaborative filtering"],"prefix":"10.1177","volume":"25","author":[{"given":"Ping-Yu","family":"Hsu","sequence":"first","affiliation":[{"name":"Department of Business Administration, National Central University, Jhongli, Taoyuan, Taiwan"}]},{"given":"Jui-Yi","family":"Chung","sequence":"additional","affiliation":[{"name":"Department of Business Administration, National Central University, Jhongli, Taoyuan, Taiwan"}]},{"given":"Yu-Chin","family":"Liu","sequence":"additional","affiliation":[{"name":"Department of Information Management, Shih Hsin University, Taipei, Taiwan"}]}],"member":"179","reference":[{"key":"10.3233\/IDA-194935_ref1","doi-asserted-by":"crossref","unstructured":"A. Bilge, Z. Ozdemir and H. Polat, A novel shilling attack detection method, Procedia Computer Science 31 (2014), 165\u2013174.","DOI":"10.1016\/j.procs.2014.05.257"},{"key":"10.3233\/IDA-194935_ref3","unstructured":"A. J\u00f8sang and R. Ismail, The beta reputation system, In Proceedings of the 15th Bled Conference on Electronic Commerce Conference, Bled, Slovenia, 2002."},{"key":"10.3233\/IDA-194935_ref4","unstructured":"A. Whitrby, A. J\u00f8sang and J. Indulska, Filtering out unfair ratings in Bayesian reputation system, In Proceedings of the Third International Joint Conference on Autonomous Agents and Multi Agent Systems, 2004."},{"key":"10.3233\/IDA-194935_ref5","doi-asserted-by":"crossref","unstructured":"B. Mehta, T. Hofmann and P. Fankhauser, Lies and propaganda: Detecting spam users in collaborative filtering, In Proceedings of the 12th International Conference on Intelligent User Interfaces, Honolulu Hi USA, 2007.","DOI":"10.1145\/1216295.1216307"},{"key":"10.3233\/IDA-194935_ref6","unstructured":"B. Mehta, Unsupervised shilling detection for collaborative filtering, In Proceedings of the 22nd National Conference on Artificial Intelligence, British Columbia Canada, 2007."},{"key":"10.3233\/IDA-194935_ref7","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","article-title":"Unsupervised strategies for shilling detection and robust collaborative filtering","volume":"19","author":"Mehta","year":"2009","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"10.3233\/IDA-194935_ref8","unstructured":"B. Mobasher, Secure personalization: Building trustworthy recommender system, In 10\ud835\udc61\u210e DELOS Thematic Workshop on Personalized Access, Profile Management, and Context Awareness in Digital Libraries, Corfu Greece, 2007."},{"issue":"4","key":"10.3233\/IDA-194935_ref9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1278366.1278372","article-title":"Towards trustworthy recommender systems: an analysis of attack models and algorithm robustness","volume":"7","author":"Mobasher","year":"2007","journal-title":"ACM Transactions on Internet Technology"},{"issue":"3","key":"10.3233\/IDA-194935_ref10","doi-asserted-by":"crossref","first-page":"56","DOI":"10.1109\/MIS.2007.45","article-title":"Attacks and remedies in collaborative recommendation","volume":"22","author":"Mobasher","year":"2007","journal-title":"IEEE Intelligent System"},{"key":"10.3233\/IDA-194935_ref11","doi-asserted-by":"crossref","unstructured":"B. Sun, X. Luo, M. Akiyama, T. Watanabe and T. Mori, PADetective: A systematic approach to automate detection of promotional attackers in mobile app store, Journal of Information Processing 26 (2018), 212\u2013223.","DOI":"10.2197\/ipsjjip.26.212"},{"key":"10.3233\/IDA-194935_ref12","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","article-title":"Defending recommender systems detection of profile injection attacks","volume":"1","author":"Williams","year":"2007","journal-title":"Service Oriented Computing and Applications"},{"key":"10.3233\/IDA-194935_ref13","doi-asserted-by":"crossref","unstructured":"C. Li and Z. Luo, A hybrid item-based recommendation algorithm against segment attack in collaborative filtering systems, In 2011 International Conference on Information Management, Innovation Management and Industrial Engineering, Shenzhen, China, 2011.","DOI":"10.1109\/ICIII.2011.242"},{"key":"10.3233\/IDA-194935_ref14","unstructured":"C. Williams, B. Mobasher, R. Burke, J. Sandvig and R. Bhaumik, Detection of obfuscated attacks in collaborative recommender systems, In ECAI\u201906 Proceedings of the 17th European Conference on Artificial Intelligence, Riva del Garda Italy, 2006."},{"key":"10.3233\/IDA-194935_ref15","doi-asserted-by":"crossref","first-page":"314","DOI":"10.1016\/j.dss.2013.01.020","article-title":"\u03b2P: A novel approach to filter out malicious rating profiles from recommender systems","volume":"55","author":"Chung","year":"2013","journal-title":"Decision Support Systems"},{"key":"10.3233\/IDA-194935_ref16","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1016\/j.compeleceng.2017.05.020","article-title":"Fake profile detection techniques in large-scale online social networks: A comprehensive review","volume":"65","author":"Ramalingam","year":"2017","journal-title":"Computers and Electrical Engineering"},{"key":"10.3233\/IDA-194935_ref17","doi-asserted-by":"crossref","unstructured":"E. Lim, V.-A. Nguyen, N. Jindal, B. Liu and H. Lauw, Detecting product review spammers using rating behaviors, In Proceedings of the 19th ACM International Conference on Information and Knowledge Management CIKM \u201910, Toronto Canada, 2010.","DOI":"10.1145\/1871437.1871557"},{"issue":"3","key":"10.3233\/IDA-194935_ref18","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1049\/iet-ifs.2018.5131","article-title":"Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours","volume":"13","author":"Zhang","year":"2019","journal-title":"IET Information Security"},{"key":"10.3233\/IDA-194935_ref20","unstructured":"H. Yu and F. Zhang, Collaborative filtering recommender system in adversarial environment, In Proceedings of the 2012 International Conference on Machine Learning and Cybernetics, Xian China, 2012."},{"key":"10.3233\/IDA-194935_ref21","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","article-title":"Shilling attacks against recommender systems: A comprehensive survey","volume":"42","author":"Gunes","year":"2012","journal-title":"Artificial Intelligence Review"},{"key":"10.3233\/IDA-194935_ref23","doi-asserted-by":"crossref","unstructured":"J. Zou and F. Fekri, A belief propagation approach of detecting smiling attacks in collaborative filtering, In CIKM\u201913 Proceedings of the 22nd ACM international conference on information & knowledge management, 2013.","DOI":"10.1145\/2505515.2507875"},{"issue":"6","key":"10.3233\/IDA-194935_ref24","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1049\/iet-ifs.2016.0345","article-title":"Defending shilling attacks in recommender systems using soft co-clustering","volume":"11","author":"Yang","year":"2017","journal-title":"IEF Information Security"},{"issue":"1","key":"10.3233\/IDA-194935_ref25","first-page":"1","article-title":"A robust collaborative filtering approach based on user relationships for recommendation systems","volume":"2014","author":"Gao","year":"2014","journal-title":"Mathematical Problems in Engineering"},{"issue":"5\u20136","key":"10.3233\/IDA-194935_ref26","doi-asserted-by":"crossref","first-page":"393","DOI":"10.1023\/A:1006544522159","article-title":"A framework for collaborative, content-based and demographic filtering","volume":"13","author":"Pazzani","year":"1999","journal-title":"Artificial Intelligence Review"},{"key":"10.3233\/IDA-194935_ref27","doi-asserted-by":"crossref","first-page":"506","DOI":"10.1007\/978-3-540-39592-8_72","article-title":"Collaborative filtering\u00a0\u2013 safe and sound","volume":"2871","author":"O\u2019Mahony","year":"2003","journal-title":"Foundations of Intelligent Systems"},{"key":"10.3233\/IDA-194935_ref28","doi-asserted-by":"crossref","unstructured":"N. Hurley, Z. Cheng and M. Zhang, Statistical attack detection, In Proceedings of the Third ACM Conference on Recommender Systems, ACM Press, 2009.","DOI":"10.1145\/1639714.1639740"},{"key":"10.3233\/IDA-194935_ref29","unstructured":"P. Johnson and M. Beverlin, Beta Distribution, 2013."},{"key":"10.3233\/IDA-194935_ref30","unstructured":"R. Bhaumik, C. Williams, B. Mobasher and R. Burke, Securing collaborative filtering against malicious attacks through anomaly detection, In Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization, Boston, MA, 2006."},{"key":"10.3233\/IDA-194935_ref31","doi-asserted-by":"crossref","unstructured":"R. Burke, B. Mobasher, C. Williams and R. Bhaumik, Classification features for attack detection in collaborative recommender systems, KDD \u201906 Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, ACM Press, 2006.","DOI":"10.1145\/1150402.1150465"},{"issue":"2","key":"10.3233\/IDA-194935_ref32","doi-asserted-by":"crossref","first-page":"231","DOI":"10.1007\/s10844-017-0454-7","article-title":"State-of-art approaches for review spammer detection: A survey","volume":"50","author":"Dewang","year":"2018","journal-title":"Journal of Intelligent Information Systems"},{"key":"10.3233\/IDA-194935_ref33","doi-asserted-by":"crossref","unstructured":"S. Lam and J. Riedl, Shilling recommender systems for fun and profit, Proc. Int. Conf. World Wide Web WWW\u201904, (2004), 393\u2013402.","DOI":"10.1145\/988672.988726"},{"key":"10.3233\/IDA-194935_ref34","doi-asserted-by":"crossref","unstructured":"W. Zhou, J. Wen, Y.S. Koh, S. Alam and G. Dobbie, Attack detection in recommender systems based on target item analysis, 2014 International Joint Conference on Neural Networks (IJCNN) 2014, pp.\u00a0332\u2013339.","DOI":"10.1109\/IJCNN.2014.6889419"},{"key":"10.3233\/IDA-194935_ref35","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1016\/j.knosys.2011.09.006","article-title":"Incremental collaborative filtering recommender based on regularized matrix factorization","volume":"27","author":"Luo","year":"2012","journal-title":"Knowledge-Based Systems"},{"key":"10.3233\/IDA-194935_ref36","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1155\/2009\/421425","article-title":"A survey of collaborative filtering techniques","volume":"2009","author":"Su","year":"2009","journal-title":"Advances in Artificial Intelligence"}],"container-title":["Intelligent Data Analysis"],"original-title":[],"link":[{"URL":"https:\/\/content.iospress.com\/download?id=10.3233\/IDA-194935","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,4,29]],"date-time":"2026-04-29T09:18:53Z","timestamp":1777454333000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/full\/10.3233\/IDA-194935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,26]]},"references-count":33,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.3233\/ida-194935","relation":{},"ISSN":["1088-467X","1571-4128"],"issn-type":[{"value":"1088-467X","type":"print"},{"value":"1571-4128","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,1,26]]}}}