用户名: 密码: 验证码:
基于多维信任模型的可信推荐方法研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着互联网的飞速发展,网络信息量剧增,给用户提出了如何有效利用网络资源的挑战。推荐系统作为一种信息过滤技术,逐渐发展成为解决网络信息过载问题的一个有利工具。在众多的推荐方法中,协同过滤是迄今为止应用最广泛、最成功的技术之一。然而,由于推荐系统的开放性,一些恶意用户向系统提供大量的虚假评分信息从而使推荐结果产生严重偏离,导致用户对推荐系统的满意度下降。因此,面对这种用户概貌注入攻击,如何对用户做出可信推荐成为目前推荐系统中亟待解决的问题。本文从数据源的可信性、邻居选取策略、推荐系统的鲁棒性以及top-N推荐的可信性等几个方面对可信推荐方法进行了深入研究。
     首先,针对已有信任计算方法对用户间信任关系度量准确性较差的问题,提出一种融合用户可疑度的多维信任模型。基于用户-项目评分数据,通过引入信息熵理论和基于密度的局部离群因子的思想,对用户的可疑度进行度量;根据信息源可信性理论,从多个视角对用户间的信任属性进行分析和度量,以提高用户间信任度计算的准确性。
     其次,针对已有启发式推荐算法推荐质量较差的问题,提出一种基于双重邻居选取策略的协同过滤推荐方法。基于用户相似度计算结果,动态选取目标用户的兴趣相似用户集;采用提出的融合用户可疑度的多维信任模型,计算得到目标用户对每个兴趣相似用户的信任度,并以此作为选取可信邻居用户集的依据;采用双重邻居选取策略,结合常规的协同过滤推荐算法,完成对目标用户的推荐。
     再次,针对已有基于模型的推荐算法鲁棒性较差的问题,提出一种融合可信邻居模型的鲁棒协同推荐方法。将提出的融合用户可疑度的多维信任模型与基线估计方法相结合,构建可信邻居模型;在此基础上,引入基于M-估计的矩阵分解方法,完成对目标用户的推荐。
     然后,针对已有top-N推荐方法召回率较低和鲁棒性较差的问题,提出一种基于可靠用户的top-N推荐方法。采用提出的融合用户可疑度的多维信任模型度量用户间的信任关系,根据信任度计算结果,选取目标用户的可靠用户集;在此基础上,采用多种方法为目标用户选取候选推荐项目,并利用“均值法”融合策略给出目标用户的top-N推荐结果。
     最后,对提出的方法进行了实验验证,和已有的方法进行了对比,并对今后的研究工作进行了展望。
With the rapid development of Internet, there has been a great increase in the amountof information. So how to make use of online resources effectively becomes a challengingtask. Recommender systems, as a kind of information filtering technology, have becomean effective way to solve the information overload problem. Specially, among thenumerous recommendation methods, collaborative filtering is one of the most widely usedand successful recommendation technologies. However, due to the openness ofrecommender systems, some malicious users might try to insert a lot of fake profiles intosystems in order to bias the recommendation results, which results in a decline in users’satisfaction with the recommender systems. Therefore, with the emergence of shillingattacks, how to provide trustworthy recommendation for target user has become a keyissue to be solved. In this thesis, we have made some deep research of trustworthyrecommendation approaches from the following four aspects: the credibility of data source,the strategy of choosing neighbors, the robustness of recommender systems and thecredibility of top-N recommendation.
     Firstly, aiming at the problem that the existing computational approaches of trust cannot measure the trust relationship between users accurately, a multidimensional trustmodel incorporating users’ degree of suspicion is proposed. According to users’ ratings onitems, the users’ degree of suspicion are calculated through introducing the theory ofentropy and the idea of density-based local outlier factor. On the basis of that, in order toimprove the calculation accuracy for the degree of trust between users, the trust attributesare analyzed and measured from different angles using the source credibility theory.
     Secondly, aiming at the problem that the existing heuristic recommendationalgorithms suffer from lower recommendation quality, a collaborative filteringrecommendation algorithm based on double neighbor choosing strategy is proposed. Onthe basis of the computational result of similarity, the preference similar users of targetuser are chosen dynamically. We can measure the degree of trust between target user andpreference similar user using the proposed multidimensional trust model incorporating users’ degree of suspicion. The trustworthy neighbor set of target user is selected inaccordance with the degree of trust between users. The recommendation for target user isgenerated by incorporating the double neighbor choosing strategy with the conventionalcollaborative filtering recommendation algorithm.
     Thirdly, aiming at the problem that the existing model-based recommendationalgorithms have the disadvantage of weaker robustness, a robust collaborativerecommendation algorithm incorporating trustworthy neighborhood model is proposed. Atrustworthy neighborhood model is constructed by incorporating the proposedmultidimensional trust model with baseline estimate approach. On the basis of that, wecan provide recommendation for target user using the M-estimator based matrixfactorization approach.
     Fourthly, aiming at the problems that the existing top-N recommendation approachessuffer from lower recall and weaker robustness, a top-N recommendation approach basedon reliable users is proposed. We can measure the degree of trust between users using theproposed multidimensional trust model. And the computational result is used to choosereliable users for target user. Moreover, based on the rating information of reliable users,we can choose candidate recommendation items using some approaches and providetop-N recommendation for target user using the strategy of average aggregation.
     Lastly, we have compared the performance between the proposed approaches andothers to demonstrate the effectiveness of the proposed approaches. Also, we propose thefurther research work.
引文
[1] Park D H, Kim H K, Choi I Y, et al. A Literature Review and Classification of RecommenderSystems Research[J]. Expert Systems with Applications,2012,39(11):10059-10072.
    [2] Lü L, Medo M, Yeung C H, et al. Recommender Systems[J]. Physics Reports,2012,519(1):1-50.
    [3] Bobadilla J, Ortega F, Hernando A, et al. Recommender Systems Survey[J]. Knowledge-BasedSystems,2013,46(7):109-132.
    [4] Basile P, Gemmis M, Gentile A L, et al. An Electronic Performance Support System Based on aHybrid Content-Collaborative Recommender System[J]. Neural Network World,2007,17(6):529-541.
    [5] Blanco-Fernández Y, Pazos-Arias J J, Gil-Solla A, et al. Providing Entertainment byContent-based Filtering and Semantic Reasoning in Intelligent Recommender Systems[J]. IEEETransactions on Consumer Electronics,2008,54(2):727-735.
    [6] Degemmis M, Lops P, Semeraro G. A Content-Collaborative Recommender that ExploitsWordNet-based User Profiles for Neighborhood Formation[J]. User Modeling and User-AdaptedInteraction,2007,17(3):217-255.
    [7] Gemmis M D, Lops P, Semeraro G, et al. Integrating Tags in a Semantic Content-basedRecommender[C]//Proceedings of the2008ACM Conference on Recommender Systems(RecSys2008). New York: ACM,2008:163-170.
    [8] Schafer J B, Frankowski D, Herlocker J, et al. Collaborative Filtering Recommender Systems[J].The Adaptive Web, LNCS,2007,4321:291-324.
    [9] Fesenmaier D R, Wober K W, Werthner H. Destination Recommendation Systems: BehaviouralFoundations and Applications [M]. Wallingford, Oxfordshire: CABI,2006:67-93.
    [10] Bridge D, G ker M H, McGinty L, et al. Case-based Recommender Systems[J]. The KnowledgeEngineering review,2005,20(3):315-320.
    [11] Brusilovsky P, Kobsa A, Nejdl W. The Adaptive Web[M]. Burke R. Berlin: Springer,2007:377-408.
    [12] Choi K, Yoo D, Kim G, et al. A Hybrid Online-Product Recommendation System: CombiningImplicit Rating-Based Collaborative Filtering and Sequential Pattern Analysis[J]. ElectronicCommerce Research and Applications,2012,11(4):309-317.
    [13] Herlocker J, Konstan J A, Terveen L, et al. Evaluating Collaborative Filtering RecommenderSystems[J]. ACM Transactions on Information Systems,2004,22(1):5-53.
    [14] Lam S K, Riedl J. Shilling Recommender Systems for Fun and Profit[C]//Proceedings of the13thInternational Conference on World Wide Web. New York: ACM,2004:393-402.
    [15] Lam S K, Frankowski D, Riedl J. Do You Trust Your Recommendation? An Exploration ofSecurity and Privacy Issues in Recommender Systems[C]//Proceedings of the2006InternationalConference on Emerging Trends in Information and Communication Security. Berlin: Springer,2006:14-29.
    [16] Hurley N J, O’Mahony M P, Silvestre G C M. Attacking Recommender Systems: A Cost-BenefitAnalysis[J]. IEEE Intelligent Systems,2007,22(3):64-68.
    [17] Mobasher B, Burke R, Bhaumik R. Toward Trustworthy Recommender Systems: An Analysis ofAttack Models and Algorithm Robustness[J]. ACM Transactions on Internet Technology,2007,7(4):1-38.
    [18] Gunes I, Kaleli C, Bilge A, et al. Shilling Attacks against Recommender Systems: AComprehensive Survey[J]. Artificial Intelligence Review,2012,38:1-33.
    [19] Massa P, Bhattacharjee B. Using Trust in Recommender Systems: An Experimental Analysis[C]//Proceedings of2nd International Conference on Trust Management. Berlin: Springer,2004:221-235.
    [20] McKnight D H, Chervany N L. The meanings of trust[R]. Minneapolis: Carlson School ofManagement, University of Minnesota,1996,13-19.
    [21] Kini A, Choobineh J. Trust in Electronic Commerce: Definition and TheoreticalConsiderations[C]//Proceedings of the31st Hawaii International Conference on System Sciences.Washington: IEEE,1998:51-61.
    [22] Jones S, Wilikens M, Morris P, et al. Trust Requirements in E-Business: A ConceptualFramework[J]. Communications of the ACM,2000,43(12):81-87.
    [23] Walter F E, Battiston S, Schweitzer F. A Model of A Trust-based Recommendation System on ASocial Network[J]. Autonomous Agents and Multi-Agent Systems,2008,16(1):57-74.
    [24] Marsh S P. Formalising trust as a computational concept[D]. PhD Thesis. Stirling: University ofStirling,1994:25-38.
    [25] Ricci F, Rokach L, Shapira B, et al. Recommender Systems Handbook[M]. Berlin: Springer,2011:655-658.
    [26] Golbeck J. Computing and Applying Trust in Web-based Social Networks[D]. PhD thesis,Maryland: University of Maryland,2005:34-106.
    [27] Bhaumik R, Williams C A, Mobasher B, et al. Securing Collaborative Filtering Against MaliciousAttacks through Anomaly Detection[C]//Proceedings of the4th workshop on IntelligentTechniques for Web Personalization(ITWP’06). Menlo Park, California: AAAI,2006:50-59.
    [28] Hurley N J, Cheng Z, ZhangM. Statistical Attack Detection[C]//Proceedings of the3rdACMInternational Conference on Recommender Systems. New York: ACM,2009:149-156.
    [29] Li C, Luo Z G. Detection of Shilling Attacks in Collaborative Filtering RecommenderSystems[C]//Proceedings of the International Conference on Soft Computing and PatternRecognition. Washington: IEEE,2011:190-193.
    [30] Burke R D, Mobasher B,Williams C A, et al. Classification Features for Attack Detection inCollaborative Recommender Systems[C]//Proceedings of the12th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining. New York: ACM,2006:542-547.
    [31] Burke R D, Mobasher B,Williams C A, et al. Detecting Profile Injection Attacks in CollaborativeRecommender Systems[C]//Proceedings of the8th IEEE Conference on E-commerceTechnology. Washington: IEEE,2006:23-30.
    [32] Mehta B, Nejdl W. Unsupervised Strategies for Shilling Detection and Robust CollaborativeFiltering[J]. User Modeling and User-Adapted Interaction,2009,19(1-2):65-97.
    [33] Bhaumik R, Mobasher B, Burke R D. A Clustering Approach to Unsupervised Attack Detection inCollaborative Recommender Systems[C]//Proceedings of the7th IEEE International Conferenceon Data Mining. Washington: IEEE,2011:181-187.
    [34] Mehta B, Hofmann T, Nejdl W. Lies and Propaganda: Detecting Spam Users in CollaborativeFiltering[C]//Proceedings of the12th International Conference on Intelligent User Interfaces.New York: ACM,2007:14-21.
    [35] Mehta B. Unsupervised Shilling Detection for Collaborative Filtering[C]//Proceedings of the22nd International Conference on Artificial Intelligence. Menlo Park, California: AAAI,2007:1402-1407.
    [36]许海玲,吴潇,李晓东,等.互联网推荐系统比较研究[J].软件学报,2009,20(2):350-362.
    [37] Bobadilla J, Serradilla F, Bernal J. A New Collaborative Filtering Metric that Improves theBehavior of Recommender Systems[J]. Knowledge-Based Systems,2010,23(6):520-528.
    [38] Bobadilla J, Ortega F, Hernando A, et al. Improving Collaborative Filtering Recommender SystemResults and Performance using Genetic Algorithms[J]. Knowledge-Based Systems,2011,24(8):1310-1316.
    [39] Bobadilla J, Ortega F, Hernando A, et al. A Balanced Memory-based Collaborative FilteringSimilarity Measure[J]. International Journal of ntelligent Systems,2012,27(10):939-946.
    [40] Bobdailla J, Ortega F, Hernando A. A Collaborative Filtering Similarity Measure Based onSingularities[J]. Information Processing and Management,2012,48(2):204-217.
    [41] Bobdailla J, Ortega F, Hernando A, et al. A Collaborative Filtering Approach to Mitigate the NewUser Cold Start Problem[J]. Knowledge-Based Systems,2012,26(2):225-238.
    [42] Choi K, Suh Y. A New Similarity Fuction for Selecting Neighbors for Each Target Item inCollaborative Filtering[J]. Knowledge Based Systems,2013,37(1):146-153.
    [43] Ortega J, Sánchez J L, Bobadilla J, et al. Improving Collaborative Filtering-based RecommenderSystems Results using Pareto Dominance[J]. Information Sciences,2013,239(1):50-61.
    [44]黄创光,印鉴,汪静,等.不确定近邻的协同过滤推荐算法[J].计算机学报,2010,33(8):1369-1377.
    [45]李聪,梁昌勇,马丽,等.基于领域最近邻的协同过滤推荐算法[J].计算机研究与发展,2008,45(9):1532-1538.
    [46] O’Mahony M P, Hurley N J, Silvestre G C M. Efficient and Secure Collaborative Filtering throughIntelligent Neighbor Selection[C]//Proceedings of the16th European Conference on ArtificialIntelligence. Valencia, Spain: IOS Press,2004:383-387.
    [47] O’Mahony M P. Towards Robust and Efficient Automated Collaborative Filtering[D]. PhD thesis,Ireland: University College Dublin,2004:98-120.
    [48] O’Mahony M P, Hurley N J, Silvestre G C M. Utility-based Neighborhood Formation for Efficientand Robust Collaborative Filtering[C]//Proceedings of the5th ACM conference on electroniccommerce. New York: ACM,2004:260-261.
    [49]罗辛,欧阳元新,熊璋,等.通过相似度支持度优化基于K近邻的协同过滤算法[J].计算机学报,2010,33(8):1437-1445.
    [50] Karypis G. Evaluation of Item-based Top-n Recommendation Algorithms[C]//Proceedings of the10th International Conference on Information and Knowledge Management. New York: ACM,2001:245-254.
    [51] Sarwar B, Karypis G, Konstan J, et al. Item-based Collaborative Filtering RecommendationAlgorithms[C]//Proceedings of the10th International Conference on World Wide Web. NewYork: ACM,2001:285-295.
    [52]邢春晓,高凤荣,战思南.适应用户兴趣变化的协同过滤推荐算法[J].计算机研究与发展,2007,44(2):296-301
    [53]张富国.用户多兴趣下基于信任的协同过滤算法研究[J].小型微型计算机系统,2008,29(8):1415-1419.
    [54] Godoy D, Amandi A. Enabling Topic-Level Trust for Collaborative Information Sharing[J].Personal and Ubiquitous Computing,2012,16(8):1065-1077.
    [55] Bobadilla J, Hernando A, Ortega F, et al. Collaborative Filtering Based on Significances[J].Information Sciences,2012,185(1):1-17.
    [56] Hernado A, Bobadilla J, Ortega F. Incorporating Reliability Measurements into the Predictions ofA Recommender System[J]. Information Sciences,2013,218(1):1-16.
    [57] Li J J, Sun L M, Wang J. A Slope One Collaborative Filtering Recommendation Algorithm usingUncertain Neighbors Optimizing[C]//Proceedings of the2011International Conference onWeb-Age Information Management. Berlin: Springer,2011:160-166.
    [58] O’Donovan J, Smyth B. Trust in Recommender Systems[C]//Proceedings of the10th InternationalConference on Intelligent User Interfaces. New York: ACM,2005:167-174.
    [59] Lathia N, Hailes S, Capra L. Trust-based Collaborative Filtering[C]//Proceedings of Joint iTrustand PST Conferences on Privacy, Trust Management and Security. Berlin: Springer,2008:119-134.
    [60] Pitsilis G, Marshall L. A Model of Trust Ferivation from Evidence for Use in RecommendationSystems [R]. Newcastle, UK: University of Newcastle Upon Tyne,2004:1-10.
    [61] Pitsilis G, Marshall L. Modeling trust for recommender systems using similarity metrics[C]//Proceedings of IFIPTM2008. Berlin: Springer,2008:103-118
    [62] Kwon K, Cho J, Park Y. Multidimensional Credibility Model for Neighbor Selection inCollaborative Recommendation[J]. Expert Systems with Applications,2009,36(3):7114-7122.
    [63] Massa P, Avesani P. Trust Metrics on Controversial Users: Balancing between Tyranny of theMajority and Echo Chambers[J]. International Journal on Semantic Web and InformationSystems,2007,3(1):39-64.
    [64] Golbeck J. Personalizing Applications through Integration of Inferred Trust Values in SemanticWeb-Based Social Networks[C]//Proceedings of Semantic Network Analysis Workshop at the4th International Semantic Web Conference.2005:15-28.
    [65] Victor P, Cornelis C, Cock M D, et al. Gradual Trust and Distrust in Recommender Systems[J].Fuzzy Sets and Systems,2009,160(10):1367-1382.
    [66] Moghaddam S, Jamali M, Ester M, et al. FeedbackTrust: Using Feedback Effects in Trust-basedRecommendation Systems[C]//Proceedings of the2009ACM Conference on RecommenderSystems. New York: ACM,2009:269-272.
    [67] Maida M, Maier K, Obwegeser N, et al. A Multidimensional Model of Trust in RecommenderSystems[C]//Proceedings of13thInternational Conference on Electronic Commerce and WebTechnologies. Berlin: Springer,2012:212-219.
    [68] Bedi P, Sharma R. Trust Based Recommender System using Ant Colony for Trust Computation[J].Expert Systems with Applications,2012,39(1):1183-1190.
    [69] Hwang C S, Chen Y P. Using Trust in Collaborative Filtering Recommendation[C]//Proceedingsof20thInternational Conference on Industrial, Engineering, and other Applications of AppliedIntelligent Systems. Berlin: Springer,2007:1052-1060.
    [70] Tavakolifard M. Situation-aware Trust Management[C]//Proceedings of the3rd ACM Conferenceon Recommender Systems. New York: ACM,2009:413-416.
    [71] Zarghami A, Fazeli S, Dokoohaki N. Social Trust-aware Recommendation System: A T-IndexApproach[C]//Proceedings of2009IEEE/WIC/ACM International Joint Conference on WebIntelligence and Intelligent Agent Technology. Washington: IEEE,2009:85-90.
    [72] Ceolin D, Hage W R, Fokkink W. A Trust Model to Estimate the Quality of Annotations using theWeb[C]//Proceedings of the WebSci10: Extending the Frontiers of Society OnLine.2010:1-8.
    [73]田春岐,邹仕洪,王文东,等.一种基于推荐证据的有效抗攻击P2P网络信任模型[J].计算机学报,2008,31(2):270-281.
    [74]彭冬生,林闯,刘卫东.一种直接评价节点诚信度的分布式信任机制[J].软件学报,2008,19(4):946-955.
    [75] Avesani P, Massa P, Tiella R. A Trust-Enhanced Recommender System Application:Moleskiing[C]//Proceedings of the2005ACM symposium on Applied computing. New York:ACM,2005:1589-1593.
    [76] Golbeck J. Generating Predictive Movie Recommendations from Trust in Social Networks[C]//Proceedings of the4th International Conference on Trust Management. Berlin: Springer,2006:93-104.
    [77] Peng T C, Chou S T. iTrustU: A Blog Recommender System Based on Multi-faceted Trust andCollaborative Filtering[C]//Proceedings of the2009ACM symposium on Applied Computing.New York: ACM,2009:1278-1285.
    [78] O’Donovan J, Smyth B, Gretarsson B, et al. Peerchooser: Visual Interactive Recommendation[C]//Proceedings of the twenty-sixth Annual SIGCHI Conference on Human Factors in ComputingSystems. New York: ACM,2008:1085-1088.
    [79] Sandvig J, Mobasher B, Burke R. Robustness of Collaborative Recommendation Based onAssociation Rule Mining[C]//Proceedings of the2007ACM Conference on Recommendersystems. New York: ACM,2007:105-112.
    [80] Sandvig J J, Mobasher B, Burke R. Impact of Relevance Measures on the Robustness andAccuracy of Collaborative Filtering[C]//Proceedings of the8th International Conference onE-commerce and Web Technologies. Berlin: Springer,2007:99-108.
    [81] Sandvig J J, Mobasher B, Burke R D. A Survey of Collaborative Recommendation and theRobustness of Model-based Algorithms[J]. IEEE Data Engineering Bulletin,2008,31(2):3-13.
    [82] Mobasher B, Burke R, Sandvig J. Model-based Collaborative Filtering as a Defense againstProfile Injection Attacks[C]//Proceedings of the21st National Conference on ArtificialIntelligence. Menlo Park, California: AAAI,2006:1388-1393.
    [83] Mehta B, Hofmann T, Nejdl W. Robust Collaborative Filtering[C]//Proceedings of the2007ACMConference on Recommender systems. New York: ACM,2007:49-56.
    [84] Mehta B, Hofmann T. A Survey of Attack-Resistant Collaborative Filtering Algorithms[J]. Bulletinof the Technical Committee on Data Engineering,2008,31(2):14-22.
    [85] Cheng Z P, Hurley N. Robust Collaborative Recommendation by Least Trimmed Squares MatrixFactorization[C]//Proceedings of the22ndInternational Conference on Tools with ArtificialIntelligence. Washington: IEEE,2010:105-112.
    [86] Koren Y, Bell R, Volinsky C. Matrix Factorization Techniques for Recommender Systems[J].Computer,2009,42(8):30-37.
    [87] Koren Y. Factorization Meets the Neighborhood: A Multifaceted Collaborative FilteringModel[C]//Proceedings of the14th ACM SIGKDD International Conference on KnowledgeDiscovery and Data Mining. New York: ACM,2008:426-434.
    [88] Koren Y. Collaborative Filtering with Temporal Dynamics[C]//Proceedings of the15th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM,2009:447-456.
    [89] Luo X, Xia Y N, Zhu Q S. Applying the Learning Rate Adaptation to the Matrix FactorizationBased Collaborative Filtering[J]. Knowledge-Based Systems,2013,37(1):154-164.
    [90] Yin C X, Peng Q K. A Careful Assessment of Recommendation Algorithms related to DimensionReduction Techniques[J]. Knowledge-Based Systems,2012,27(3):407-423.
    [91]李聪,骆志刚.用于鲁棒协同推荐的元信息增强变分贝叶斯矩阵分解模型[J].自动化学报,2011,37(9):1067-1076.
    [92] George T, Merugu S. A Scalable Collaborative Filtering Framework Based on Co-clustering[C]//Proceedings of the5thIEEE International Conference on Data Mining. New York: IEEE,2005:625-628.
    [93]吴湖,王永吉,王哲,等.两阶段联合聚类协同过滤算法[J].软件学报,2010,21(5):1042-1054.
    [94] Roy B V, Yan X. Manipulation Robustness of Collaborative Filtering Systems[J]. ManagementScience,2010,56(11):1911-1929.
    [95] Jamali M, Ester M. TrustWalker: A Random Walk Model for Combining Trust-based andItem-based Recommendation[C]//Proceedings of the15th ACM SIGKDD InternationalConference on Knowledge Discovery and Data Mining. New York: ACM,2009:397-406.
    [96] Ma H, King I, Michael R L. Learning to Recommend with Social Trust Ensemble[C]//Proceedings of the32nd Annual ACM SIGIR Conference on Research and Development inInformation Retrieval. New York: ACM,2009:203-210.
    [97] Ma H, Zhou T C, Lyu M R, et al. Improving Recommender Systems by Incorporating SocialContextual Information[J]. ACM Transactions on Infromation Systems,2011,29(2): article9.
    [98] Ma H, King I, Lyu M R. Learning to Recommend with Explicit and Implicit Social Relations[J].ACM Transactions on Intelligent System and Technology,2011,2(3): article29.
    [99] Deshpande M, Karypis G. Item-based Top-n Recommendation Algorithms[J]. ACM Transactionson Information Systems,2004,22(1):143-177.
    [100]Kim H N, Ji A T, Kim H J, et al. Error-based Collaborative Filtering Algorithm for Top-nRecommendation[C]//Proceedings of the joint9thAsia-Pacific web and8thInternationalConference on web-age Information Management Conference on Advances in Data and WebManagement. Berlin: Springer,2007:594-605.
    [101]Kwon Y. Improving Top-n Recommendation Techniques using Rating Variance[C]//Proceedingsof the2008ACM Conference on Recommender systems. New York: ACM,2008:307-310.
    [102]Yang X W, Steck H, Guo Y, et al. On Top-k Recommendation using Social Networks[C]//Proceedings of the sixth ACM Conference on Recommender systems. New York: ACM,2012:67-74.
    [103]Jamali M, Ester M. Using A Trust Network to Improve Top-n Recommendation[C]//Proceedingsof the3rdACM Conference on Recommender Systems. New York, ACM,2009:181-188.
    [104]Cremonesi P, Garza P. Top-n Recommendations on Unpopular Items with ContextualKnowledge[C]//Proceedings of3rd Workshop on Context-aware Recommender Systems. NewYork, ACM,2011.
    [105]Aytekin T, Karakaya M. Clustering-based Diversity Improvement in Top-N Recommendation[J].Journal of Intelligent Information Systems.2013,40(3):1-18.
    [106]Cremonesi P, Koren Y, Turrin R. Performance of Recommender Algorithms on Top-NRecommendation tasks[C]//Proceedings of the4thACM Conference on Recommender System.New York: ACM,2010:39-46.
    [107]Breunig M M, Kriegel H P, Ng R T, et al. LOF: Identifying Density-based Local Outliers [C]//Proceedings of ACM SIGMOD Conference. New York: ACM,2000:427-438.
    [108]范丽敏,冯登国,陈华.基于熵的随机性检测相关性研究[J].软件学报,2009,20(7):1967-1976.
    [109] Eisend M. Source Credibility Dimensions in Marketing Communication-A GeneralizedSolution[J]. Journal of Empirical Generalizations in Marketing,2006,10(2):1-33.
    [110]何超颖.基于关系阶段的网络评论来源可信度研究[D].大连:大连理工大学学位论文,2009:11-16.
    [111]Resnick P, Iacovou N, Sushak M, et al. GroupLens: An Open Architecture for CollaborativeFiltering of Netnews[C]//Proceedings of ACM1994Conference on Computer SupportedCooperative Work. New York: ACM,1994:175-186.
    [112]Paterek A. Improving Regularized Singular Value Decomposition for Collaborative Filtering[C]//Proceedings KDD Cup and Workshop. New York: ACM,2007:39-42.
    [113]Miller B N, Albert I, Lam S K, et al. MovieLens Unplugged: Experiences with An OccasionallyConnected Recommender System[C]//Proceedings of the International Conference on IntelligentUser Interfaces. New York: ACM,2003:263-266.
    [114]Fawcett T. An Introduction to ROC Analysis[J]. Pattern Recognition Letters,2006,27(8):861-874.
    [115]Cacheda F, Carneiro V, Fernandez D, et al. Comparison of Collaborative Filtering Algorithms:Limitations of Current Techniques and Proposals for Scalable, High-Performance RecommenderSystem[J]. ACM Transactions on the Web,2011,5(1): article2.
    [116]Mehta B, Nejdl W. Attack Resistant Collaborative Filtering[C]//Proceedings of the31st annualInternational ACM SIGIR Conference on Research and Development in Information Retrieval.New York: ACM,2008:75-82.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700