skip to main content
10.1145/3625007.3630112acmconferencesArticle/Chapter ViewAbstractPublication PageskddConference Proceedingsconference-collections
research-article

ROBUREC: Building a Robust Recommender using Autoencoders with Anomaly Detection

Published: 15 March 2024 Publication History

Abstract

In the realm of social network analysis and mining, recommendation systems have become indispensable algorithms in assisting users and industries in navigating the available contents or products in various domains and getting the most personalized recommendations to their interests and preferences. However, if the input data has been generated by malicious users, that poses a significant challenge to recommender systems' reliability and efficiency. One of the main threats that poses a challenge to recommender systems is shilling attacks. Shilling attacks tend to manipulate or poison the data in the systems' training phase, leading to biased or compromised recommendations. To address this challenge, we propose a robust recommender system using variational autoencoders (VAE) with Anomaly detection. Our model learns complex and non-linear patterns by exclusively focusing on the user-item interaction data, represented by a binary user-item interaction matrix, making it more resilient to classic shilling attacks. Moreover, our paper incorporates an anomaly detection mechanism, alongside the autoencoder, that analyzes the reconstruction errors, i.e. (MSE) between the original interactions and their reconstructed ones. We test the model on a real-world dataset and evaluate it using Recall@k and NDCG@k. This work enhances the trustworthiness and accuracy of recommendation algorithms, mainly when deployed in social network analysis and mining, where the potential for malicious data manipulation is a critical concern.

References

[1]
B. C. Kwon, S.-H. Kim, T. Duket, A. Catalán, and J. S. Yi, "Do People Really Experience Information Overload While Reading Online Reviews?," International Journal of Human-Computer Interaction, vol. 31, 2015.
[2]
C. Li and Z. Luo, "Detection of shilling attacks in collaborative filtering recommender systems," in 2011 International Conference of Soft Computing and Pattern Recognition (SoCPaR), 2011.
[3]
L. Nguyen and T. Ishigaki, "D2D-TM: A Cycle VAE-GAN for Multi-Domain Collaborative Filtering," in 2019 IEEE International Conference on Big Data (Big Data), 2019.
[4]
D. Liang, R. G. Krishnan, M. D. Hoffman and T. Jebara, "Variational Autoencoders for Collaborative Filtering," in WWW '18: Proceedings of the 2018 World Wide Web Conference, 2018.
[5]
F. Zhang and S. Wang, "Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering," IEEE Transactions on Computational Social Systems, vol. 7, no. 5, 2020.
[6]
F. W. a. b, M. G. a. b, J. Y. c, Z. W. b, K. L. d and X. W. e, "Ready for emerging threats to recommender systems? A graph convolution-based generative shilling attack," Information Sciences, vol. 578, 2021.
[7]
Z. Fayyaz, M. Ebrahimian, D. Nawara, A. Ibrahim and R. Kashef, "Recommendation systems: Algorithms, challenges, metrics, and business opportunities," applied sciences, vol. 21, 2020.
[8]
G. Gupta and R. Katarya, "Recommendation analysis on item-based and user-based collaborative filtering," in International conference on smart systems, 2019.
[9]
M. Ebrahimian and R. Kashef, "Efficient Detection of Shilling's Attacks in Collaborative Filtering Recommendation Systems Using Deep Learning Models," in IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2020.
[10]
M. H. Mohamed, M. H. Khafagy and M. H. Ibrahim, "Recommender Systems Challenges and Solutions Survey," in 2019 International Conference on Innovative Trends in Computer Engineering (ITCE), 2019.
[11]
S. Natarajan, S. Vairavasundaram, S. Nataraja and A. H. Gandomi, "Resolving data sparsity and cold start problem in collaborative filtering recommender system using Linked Open Data," Expert Systems with Applications, vol. 149, 2020.
[12]
A. Abu-Issa, H. Nawawreh, L. Shreteh, Y. Salman, Y. Hassouneh, I. Tumar and M. Hussein, "A Smart City Mobile Application for Multitype, Proactive, and Context-Aware Recommender System," in International Conference on Engineering and Technology (ICET), 2017.
[13]
S. Milano, M. Taddeo and L. Floridi, "Recommender systems and their ethical challenges," AI & SOCIETY, vol. 35, 2020.
[14]
Y. Zheng, "Utility-based multi-criteria recommender systems," in SAC '19: Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019.
[15]
P. Jariha and S. K. Jain, "A state-of-the-art Recommender Systems: An overview on Concepts, Methodology and Challenges," in 2018 Second International Conference on Inventive Communication and Computational Technologies (ICICCT), 2018.
[16]
D. Nawara and R. Kashef, "Context-Aware Recommendation Systems in the IoT Environment (IoT-CARS)-A Comprehensive Overview," IEEE Access, vol. 9, 2021.
[17]
D. Nawara and R. Kashef, "MCARS-CC: A Salable Multicontext-Aware Recommender System," IEEE Transactions on Computational Social Systems, 2022.
[18]
B. Walek and V. Fojtik, "A hybrid recommender system for recommending relevant movies using an expert system," Expert Systems with Applications, vol. 158, 2020.
[19]
A. K. Verma and V. S. Dixit, "A Comparative Evaluation of Profile Injection Attacks," in Advances in Data and Information Sciences, Singapore, Springer, 2018.
[20]
M. Si and Q. Li, "Shilling attacks against collaborative recommender systems: a review," Artificial Intelligence Review, vol. 53, 2020.
[21]
N. Praveena and K. Vivekanandan, "A Survey on Detection Approaches of Shilling Attacks in SAN," in 5th International Conference on Computing Methodologies and Communication (ICCMC), 2021.
[22]
P. K. Patiala and S. Goel, "Shilling attack models in recommender system," in 2016 International Conference on Inventive Computation Technologies (ICICT), 2016.
[23]
B. R, W. CA, M. B and B. RD, "Securing collaborative filtering against malicious attacks through anomaly detection," in 4th workshop on intelligent techniques for web personalization, 2006.
[24]
B. Mobasher, R. Burke, R. Bhaumik and C. Williams, "Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems," in Proc. of the 2005 WebKDD Workshop, 20015.
[25]
F. Zhang, "Analysis of Love-Hate Shilling Attack Against E-commerce Recommender System," in International Conference of Information Science and Management Engineering, 2010.
[26]
Z. Liu and M. Larson, "Adversarial item promotion: Vulnerabilities at the core of top-n recommenders that use images to address cold start," in Proceedings of the Web Conference, 2021.
[27]
T. Kumari and P. Bedi, "A Comprehensive Study of Shilling Attacks in Recommender Systems," International Journal of Computer Science Issues (IJCSI), vol. 14, 2017.
[28]
S. Alonso, J. Bobadilla, F. Ortega and R. Moya, "Robust Model-Based Reliability Approach to Tackle Shilling Attacks in Collaborative Filtering Recommender Systems," IEEE Access, vol. 7, 2019.
[29]
A. P. Sundar, F. Li, X. Zou, T. Gao and E. D. Russomanno, "Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey," IEEE Access, vol. 8, 2020.
[30]
X. You, C. Li, D. Ding, M. Zhang, F. Feng, X. Pan and M. Yang, "Anti-FakeU: Defending Shilling Attacks on Graph Neural Network based Recommender Model," in WWW '23: Proceedings of the ACM Web Conference 2023, 2023.
[31]
S. Wang, H. Wang, H. Yu and F. Zhang, "Detecting shilling groups in recommender systems based on hierarchical topic model," in 2021 IEEE International Conference on Artificial Intelligence and Computer Applications (ICAICA), 2021.
[32]
T. U. o. T. T. C. Wanqiao Yuan Tianjin Key Laboratory of Intelligence Computing and Novel Software Technology, Y. Xiao, X. Jiao and Y. Ming, "Neural Network Detection of Shilling Attack Based on User Rating History and Latent Features," in 2019 International Conference on Machine Learning, Big Data and Business Intelligence (MLBDBI), 2019.
[33]
https://grouplens.org/datasets/movielens/100k/.
[34]
https://grouplens.org/datasets/movielens/1m/.
[35]
X. Wang, H. Zhao, Y. Wang, H. Tao and J. Cao, " Supervised Prototypical Variational Autoencoder for Shilling Attack Detection in Recommender Systems," in International Conference on Data Mining and Big Data, 2023.
[36]
Manjunath, Y. S. K., & Kashef, R. F. (2021). Distributed clustering using multi-tier hierarchical overlay super-peer peer-to-peer network architecture for efficient customer segmentation. Electronic Commerce Research and Applications, 47, 101040.
[37]
Kashef, R., & Niranjan, A. (2017, December). Handling Large-Scale Data Using Two-Tier Hierarchical Super-Peer P2P Network. In Proceedings of the International Conference on Big Data and Internet of Thing (pp. 52--56).
[38]
Jebamikyous, H., Li, M., Suhas, Y., & Kashef, R. (2023). Leveraging machine learning and blockchain in E-commerce and beyond: benefits, models, and application. Discover Artificial Intelligence, 3(1), 3.
[39]
Saleminezhadl, A., Remmele, M., Chaudhari, R., & Kashef, R. (2021). IoT Analytics and Blockchain. arXiv preprint arXiv:2112.13430.
[40]
Schmid, P., Schaffhäuser, A., & Kashef, R. (2023). IoTBChain: Adopting Blockchain Technology to Increase PLC Resilience in an IoT Environment. Information, 14(8), 437.
[41]
Yeh, T. Y., & Kashef, R. (2020). Trust-Based collaborative filtering recommendation systems on the blockchain. Advances in Internet of Things, 10(4), 37--56.

Cited By

View all

Index Terms

  1. ROBUREC: Building a Robust Recommender using Autoencoders with Anomaly Detection
            Index terms have been assigned to the content through auto-classification.

            Recommendations

            Comments

            Information & Contributors

            Information

            Published In

            cover image ACM Conferences
            ASONAM '23: Proceedings of the 2023 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining
            November 2023
            835 pages
            ISBN:9798400704093
            DOI:10.1145/3625007
            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

            Sponsors

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            Published: 15 March 2024

            Permissions

            Request permissions for this article.

            Check for updates

            Author Tags

            1. recommender systems
            2. user-item interactions shillings attacks
            3. autoencoders
            4. anomaly detection

            Qualifiers

            • Research-article

            Funding Sources

            • Toronto metropolitan university

            Conference

            ASONAM '23
            Sponsor:

            Acceptance Rates

            ASONAM '23 Paper Acceptance Rate 53 of 145 submissions, 37%;
            Overall Acceptance Rate 116 of 549 submissions, 21%

            Upcoming Conference

            KDD '25

            Contributors

            Other Metrics

            Bibliometrics & Citations

            Bibliometrics

            Article Metrics

            • Downloads (Last 12 months)66
            • Downloads (Last 6 weeks)5
            Reflects downloads up to 03 Jan 2025

            Other Metrics

            Citations

            Cited By

            View all

            View Options

            Login options

            View options

            PDF

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader

            Media

            Figures

            Other

            Tables

            Share

            Share

            Share this Publication link

            Share on social media