Yan Zhang, Qingbo Hao, Wenguang Zheng, Yingyuan Xiao
{"title":"User similarity-based graph convolutional neural network for shilling attack detection","authors":"Yan Zhang, Qingbo Hao, Wenguang Zheng, Yingyuan Xiao","doi":"10.1007/s10489-025-06254-2","DOIUrl":null,"url":null,"abstract":"<div><p>Collaborative recommendation systems have been widely used in various fields, such as movies, music and e-commerce. However, due to the natural openness of its ratings, it is vulnerable to shilling attacks. Shilling attacks greatly affect the accuracy and trustworthiness of recommendation systems, so we urgently need effective methods to counter shilling attacks. Some detection methods have been proposed previously. However, they mostly use manual feature extraction-based methods. These methods require specialized statistical knowledge to summarize user-specific rating patterns in user rating databases, which is very difficult. Thus, we propose a method called User Similarity-based Graph convolutional neural network for Shilling Attack Detection (USGSAD). This method achieves the purpose of detecting shilling attacks without using manual features. First, our method calculates user similarity by jointing both correlation and deviation of user rating behaviors. Second, we build a user relationship graph based on user similarity matrix and use graph embedding method to obtain user low-dimensional embedding vectors. Finally, we design a User Similarity Graph Convolutional Network (USGCN) to assign weights to aggregate user embeddings and predict the attackers in the recommender system. Adequate experiments on Amazon and MovieLens datasets show that our proposed method outperforms the baseline methods in detection performance.</p></div>","PeriodicalId":8041,"journal":{"name":"Applied Intelligence","volume":"55 5","pages":""},"PeriodicalIF":3.4000,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Applied Intelligence","FirstCategoryId":"94","ListUrlMain":"https://link.springer.com/article/10.1007/s10489-025-06254-2","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE","Score":null,"Total":0}
引用次数: 0
Abstract
Collaborative recommendation systems have been widely used in various fields, such as movies, music and e-commerce. However, due to the natural openness of its ratings, it is vulnerable to shilling attacks. Shilling attacks greatly affect the accuracy and trustworthiness of recommendation systems, so we urgently need effective methods to counter shilling attacks. Some detection methods have been proposed previously. However, they mostly use manual feature extraction-based methods. These methods require specialized statistical knowledge to summarize user-specific rating patterns in user rating databases, which is very difficult. Thus, we propose a method called User Similarity-based Graph convolutional neural network for Shilling Attack Detection (USGSAD). This method achieves the purpose of detecting shilling attacks without using manual features. First, our method calculates user similarity by jointing both correlation and deviation of user rating behaviors. Second, we build a user relationship graph based on user similarity matrix and use graph embedding method to obtain user low-dimensional embedding vectors. Finally, we design a User Similarity Graph Convolutional Network (USGCN) to assign weights to aggregate user embeddings and predict the attackers in the recommender system. Adequate experiments on Amazon and MovieLens datasets show that our proposed method outperforms the baseline methods in detection performance.
期刊介绍:
With a focus on research in artificial intelligence and neural networks, this journal addresses issues involving solutions of real-life manufacturing, defense, management, government and industrial problems which are too complex to be solved through conventional approaches and require the simulation of intelligent thought processes, heuristics, applications of knowledge, and distributed and parallel processing. The integration of these multiple approaches in solving complex problems is of particular importance.
The journal presents new and original research and technological developments, addressing real and complex issues applicable to difficult problems. It provides a medium for exchanging scientific research and technological achievements accomplished by the international community.