{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:07:03Z","timestamp":1750309623892,"version":"3.41.0"},"reference-count":31,"publisher":"IGI Global","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"abstract":"<jats:p>The location aware collaborative filtering (LACF) is one of the most successful technique of predicting the Quality of Service (QoS) in Internet of Things (IoT) service recommendation systems. However, the openness of CF web service recommendation renders them vulnerable to the injection of attack profiles consisting of apocryphal QoS values (also identified as shilling attacks). Combined with location factors, such profiles might exert greater impact on the LACF compared with traditional CF method. Unfortunately, to the best of the authors' knowledge, there is few research on such kind of attack model in the literature. Therefore, in this paper, the authors first construct three kinds of attack models including LAA, LAB, and LAR (location aware - average, bandwagon, and random) models and compare the impact of the classical shilling attacks (CSA) and location aware shilling attacks (LASA) on LACF. Furthermore, the authors use two attack detectors to compare the robustness of CSA and LASA. The experimental results on WS-DREAM dataset indicate that the LACF indeed suffers from CSA and LASA. Besides, in comparison with CSA, the LASA models do not always exert more influence on the LACF and the profiles injected by LASA are easier to be detected.<\/jats:p>","DOI":"10.4018\/ijwsr.2017070104","type":"journal-article","created":{"date-parts":[[2017,6,9]],"date-time":"2017-06-09T18:22:14Z","timestamp":1497032534000},"page":"53-66","source":"Crossref","is-referenced-by-count":3,"title":["The Performance of Location Aware Shilling Attacks in Web Service Recommendation"],"prefix":"10.4018","volume":"14","author":[{"given":"Min","family":"Gao","sequence":"first","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China"}]},{"given":"Xiang","family":"Li","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China"}]},{"given":"Wenge","family":"Rong","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Software Development Environment, School of Computer Science and Engineering, Beihang University, Beijing, China, Research Institute of Beihang University in Shenzhen, Shenzhen, China"}]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China"}]},{"given":"Qingyu","family":"Xiong","sequence":"additional","affiliation":[{"name":"Key Laboratory of Dependable Service Computing in Cyber Physical Society, Ministry of Education, Chongqing University, Chongqing, China & School of Software Engineering, Chongqing University, Chongqing, China"}]}],"member":"2432","reference":[{"key":"IJWSR.2017070104-0","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2013.20"},{"key":"IJWSR.2017070104-1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.308"},{"key":"IJWSR.2017070104-2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"IJWSR.2017070104-3","doi-asserted-by":"crossref","unstructured":"G\u00fcnnemann, N., G\u00fcnnemann, S., & Faloutsos, C. (2014, April). Robust multivariate auto regression for anomaly detection in dynamic product ratings. Proceedings of the 23rd International Conference on World Wide Web (pp. 361-372). USA: New York.","DOI":"10.1145\/2566486.2568008"},{"key":"IJWSR.2017070104-4","doi-asserted-by":"crossref","unstructured":"Jiang, Y., Liu, J., Tang, M., & Liu, X. (2011, July). An effective web service recommendation method based on personalized collaborative filtering. Proceedings of the IEEE International Conference on Web Services (pp. 211-218). USA: Washington.","DOI":"10.1109\/ICWS.2011.38"},{"issue":"3","key":"IJWSR.2017070104-5","first-page":"1","article-title":"Improving Web service clustering through post filtering to bootstrap the service discovery.","volume":"2","author":"B. T.Kumara","year":"2014","journal-title":"International Journal of Services Computing"},{"issue":"9","key":"IJWSR.2017070104-6","first-page":"1563","article-title":"A Shilling Attack Detection Algorithm Based on Popularity Degree Features","volume":"41","author":"W.Li","year":"2015","journal-title":"Acta Automatica Sinica"},{"key":"IJWSR.2017070104-7","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2016.75"},{"issue":"1","key":"IJWSR.2017070104-8","first-page":"52","article-title":"A location-aware service selection model.","volume":"1","author":"Y.Li","year":"2013","journal-title":"International Journal of Services Computing"},{"key":"IJWSR.2017070104-9","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2015.2433251"},{"key":"IJWSR.2017070104-10","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2012.49"},{"key":"IJWSR.2017070104-11","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9050-4"},{"key":"IJWSR.2017070104-12","doi-asserted-by":"publisher","DOI":"10.1109\/MIS.2007.45"},{"key":"IJWSR.2017070104-13","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2005, August). Effective attack models for shilling item-based collaborative filtering systems. Proceedings of the 2005 WebKDD Workshop, Chicago."},{"key":"IJWSR.2017070104-14","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"IJWSR.2017070104-15","doi-asserted-by":"crossref","unstructured":"Qiu, W., Zheng, Z., Wang, X., Yang, X., Lyu, M. R. (2013, June). Reputation-aware QoS value prediction of web services. Proceedings of Services Computing (pp. 41-48).","DOI":"10.1109\/SCC.2013.43"},{"key":"IJWSR.2017070104-16","doi-asserted-by":"publisher","DOI":"10.1007\/s10796-014-9495-4"},{"key":"IJWSR.2017070104-17","doi-asserted-by":"publisher","DOI":"10.1145\/2556270"},{"key":"IJWSR.2017070104-18","first-page":"202","article-title":"Location-aware collaborative filtering for QoS-based service recommendation","author":"M.Tang","year":"2012","journal-title":"Proceedings of the IEEE International Conference on Web Services"},{"key":"IJWSR.2017070104-19","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2014.2320262"},{"key":"IJWSR.2017070104-20","doi-asserted-by":"crossref","unstructured":"Wang, Y., Zhang, L., Tao, H., Wu, Z., & Cao, J. (2015, June). A comparative study of shilling attack detectors for recommender systems. Proceedings of the12th International Conference on Service Systems and Service Management (pp. 1-6). IEEE.","DOI":"10.1109\/ICSSSM.2015.7170330"},{"issue":"2","key":"IJWSR.2017070104-21","first-page":"428","article-title":"Predicting quality of service for selection by neighborhood-based collaborative filtering. IEEE Transactions on Systems, Man, and Cybernetics","volume":"43","author":"J.Wu","year":"2013","journal-title":"Systems"},{"key":"IJWSR.2017070104-22","doi-asserted-by":"publisher","DOI":"10.1145\/2339530.2339684"},{"key":"IJWSR.2017070104-23","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-012-0186-0"},{"key":"IJWSR.2017070104-24","doi-asserted-by":"crossref","unstructured":"Zhang, F. (2010, August). Analysis of love-hate shilling attack against e-commerce recommender system. Proceedings of Information Science and Management Engineering (pp. 318\u2013321).","DOI":"10.1109\/ISME.2010.116"},{"key":"IJWSR.2017070104-25","first-page":"1","article-title":"Analysis of profile injection attacks against recommendation algorithms on bipartite networks","author":"F.Zhang","year":"2014","journal-title":"Proceedings of 2014 International Conference on Management of e-Commerce and e-Government"},{"key":"IJWSR.2017070104-26","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-011-4464-8"},{"key":"IJWSR.2017070104-27","doi-asserted-by":"publisher","DOI":"10.1109\/YCICT.2010.5713049"},{"key":"IJWSR.2017070104-28","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2009.30"},{"key":"IJWSR.2017070104-29","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2010.52"},{"key":"IJWSR.2017070104-30","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2010.10"}],"container-title":["International Journal of Web Services Research"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=182831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T02:54:50Z","timestamp":1750301690000},"score":1,"resource":{"primary":{"URL":"http:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJWSR.2017070104"}},"subtitle":[""],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":31,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.4018\/ijwsr.2017070104","relation":{},"ISSN":["1545-7362","1546-5004"],"issn-type":[{"type":"print","value":"1545-7362"},{"type":"electronic","value":"1546-5004"}],"subject":[],"published":{"date-parts":[[2017,7]]}}}