Cryptography Reference
In-Depth Information
Security and privacy are the critical issues for developing a recommender system.
In this work, we only consider the security issue. We plan to publish the privacy-
preserving and trust management recommender system in our next paper.
References
1. Aïmeur, E., Brassard, G., Fernandez, J.M., Onana, F.S.M.: Alambic: A Privacy-Preserving
Recommender System for Electronic Commerce. International Journal of Information
Security 7(5), 307-334 (2008)
2. Burke, R., Mobasher, B., Zabicki, R., Bhaumik, R.: Identifying Attack Models for Secure
Recommendation. In: Beyond Personalization: A Workshop on the Next Generation of
Recommender Systems, San Diego, California (2005)
3. Cheng, Z., Hurley, N.: Analysis of Robustness in Trust-based Recommender Systems. In:
RIAO 2010, Paris, France, Copyright CID (2010)
4. Goldberg, D., Nichols, D., Oki, B., Terry, D.: Using Collaborative Filtering to Weave an
Information Tapestry. ACM 35(12), 61-70 (1992)
5. Lam, S.K., Riedl, J.: Shilling Recommender Systems for Fun and Profit. In: 13th
International World Wide Web Conference (WWW 2004), New York, NY, USA, pp.
393-402 (2004)
6. Loh, S., Lorenzi, F., Saldana, R., Licthnow, D.: A Tourism Recommender System based on
Collaboration and Text Analysis. Information Technology & Tourism 6, 157-165 (2004)
7. Maw, S.Y., Thein, N.L.: Multi-Agent Mobile Tourism System. Encyclopedia of
Information Science and Technology. In: Information Science Reference, 2nd edn.,
vol. VI (Mu-Q), pp. 2722-2727. IGI Global Publishing, Hershey (2008)
8. Maw, S.Y., Naing, M.-M., Thein, N.L.: RPCF Algorithm for Multi-Agent Tourism
System. In: IEEE International Symposium on Micro-NanoMachatronics and Human
Science (MHS 2006), Nagoya, Japan, pp. 533-538 (2006)
9. Maw, S.Y., Naing, M.-M.: Multi-Agent Tourism System (MATS). In: Social Information
Retrieval System: Emerging Technologies and Applications for Searching the Web
Effectively. Ch. XV, pp. 289-310. IGI Global Publishing, Hershey (2007)
10. Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Effective Attack Models for Shilling
Item-based Collaborative Filtering Systems. In: WebKDD Workshop (2005)
11. Mobasher, B., Burke, R., Bhaumik, R., Sandvig, J.: Attacks and Remedies in
Collaborative Recommendation. IEEE Intelligent Systems 22(3), 56-63 (2007)
12. O'Donovan, J., Smyth, B.: Trust in Recommender Systems. In: 10th International Conference
on Intelligent User Interfaces (IUI 2005), pp. 167-174. ACM Press, San Diego (2005)
13. Quan, Q., Hinze, A.: Trust-based Recommendations for Mobile Tourists in TIP. Working
Paper: 13/2008, Hamilton, New Zealand (2008)
14. Sammut, C., Webb, G.: Encyclopedia of Machine Learning. Ch. 00338, pp. 1-9. Springer,
Heidelberg (2010)
15. Shon, T., Choi, W.: An Analysis of Mobile WiMAX Security: Vulnerabilities and
Solutions. In: Enokido, T., Barolli, L., Takizawa, M. (eds.) NBiS 2007. LNCS, vol. 4658,
pp. 88-97. Springer, Heidelberg (2007)
16. Web site personalization, http://www.128.ibm.com/developerworks/
websphere/library/techarticles/hipods/personalize.html
17. Williams, C., Bhaumik, R., Burke, R., Mobasher, B.: The Impact of Attack Profile
Classification on the Robustness of Collaborative Recommendation. In: WebKDD
Workshop, ACM SIGKDD Conference on Data Mining and Knowledge Discovery (KDD
2006), Philadelphia (2006)
 
Search WWH ::




Custom Search