22 research outputs found

    Towards a semantic and statistical selection of association rules

    Full text link
    The increasing growth of databases raises an urgent need for more accurate methods to better understand the stored data. In this scope, association rules were extensively used for the analysis and the comprehension of huge amounts of data. However, the number of generated rules is too large to be efficiently analyzed and explored in any further process. Association rules selection is a classical topic to address this issue, yet, new innovated approaches are required in order to provide help to decision makers. Hence, many interesting- ness measures have been defined to statistically evaluate and filter the association rules. However, these measures present two major problems. On the one hand, they do not allow eliminating irrelevant rules, on the other hand, their abun- dance leads to the heterogeneity of the evaluation results which leads to confusion in decision making. In this paper, we propose a two-winged approach to select statistically in- teresting and semantically incomparable rules. Our statis- tical selection helps discovering interesting association rules without favoring or excluding any measure. The semantic comparability helps to decide if the considered association rules are semantically related i.e comparable. The outcomes of our experiments on real datasets show promising results in terms of reduction in the number of rules

    L-Band MMICs for Space-based SAR system

    Get PDF
    The design and performance of an L-Band GaAs chip-set is presented.The chip-set consists of a 6-bit attenuator circuit,a Low-Noise Amplifier (LNA)and a Multi Function Chip that is the combination of a 6-bit attenuator and 6-bit Phase shifter circuit.The chip-set is developed for the pre-flight engineering T/R (Transmit and Receive)modules currently in development with Astrium in a space-based SAR (Synthetic Aperture Radar)system.The MMICs are realised in the 0.25 µm PHEMT (PH25)technology of UMS.Only one iteration was needed for the MMICs in order to be fully compliant with the specifications

    Ranking and selecting association rules based on dominance relationship

    Get PDF
    The huge number of association rules represent the main obstacle that a decision maker faces. In order to bypass this obstacle, an efficient selection of rules must be performed. Since selection is necessarily based on evaluation, many interestingness measures have been proposed. However, the abundance of these measures caused a new problem which is the heterogeneity of the evaluation results and this created confusion to the decision. In this scope, we propose a novel approach to discover interesting association rules without favouring or excluding any measure by adopting the notion of dominance between rules. Our approach bypasses the problem of measure heterogeneity and find a compromise between their evaluations and also bypasses another non-trivial problem which is the threshold value specification

    When Engagement Meets Similarity: Efficient (k, r)-Core Computation on Social Networks.

    Full text link
    In this paper, we investigate the problem of (k,r)-core which intends to find cohesive subgraphs on social networks considering both user engagement and similarity perspectives. In particular, we adopt the popular concept of k-core to guarantee the engagement of the users (vertices) in a group (subgraph) where each vertex in a (k,r)-core connects to at least k other vertices. Meanwhile, we also consider the pairwise similarity between users based on their profiles. For a given similarity metric and a similarity threshold r, the similarity between any two vertices in a (k,r)-core is ensured not less than r. Efficient algorithms are proposed to enumerate all maximal (k,r)-cores and find the maximum (k,r)-core, where both problems are shown to be NP-hard. Effective pruning techniques significantly reduce the search space of two algorithms and a novel (k,k')-core based (k,r)-core size upper bound enhances performance of the maximum (k,r)-core computation. We also devise effective search orders to accommodate the different nature of two mining algorithms. Comprehensive experiments on real-life data demonstrate that the maximal/maximum (k,r)-cores enable us to find interesting cohesive subgraphs, and performance of two mining algorithms is significantly improved by proposed techniques

    Robust Recommender System: A Survey and Future Directions

    Full text link
    With the rapid growth of information, recommender systems have become integral for providing personalized suggestions and overcoming information overload. However, their practical deployment often encounters "dirty" data, where noise or malicious information can lead to abnormal recommendations. Research on improving recommender systems' robustness against such dirty data has thus gained significant attention. This survey provides a comprehensive review of recent work on recommender systems' robustness. We first present a taxonomy to organize current techniques for withstanding malicious attacks and natural noise. We then explore state-of-the-art methods in each category, including fraudster detection, adversarial training, certifiable robust training against malicious attacks, and regularization, purification, self-supervised learning against natural noise. Additionally, we summarize evaluation metrics and common datasets used to assess robustness. We discuss robustness across varying recommendation scenarios and its interplay with other properties like accuracy, interpretability, privacy, and fairness. Finally, we delve into open issues and future research directions in this emerging field. Our goal is to equip readers with a holistic understanding of robust recommender systems and spotlight pathways for future research and development

    Estudio de técnicas de ataques en sistemas de recomendación aplicados al dominio turístico

    Full text link
    Debido a la aparición de la Web2.0, los sistemas de recomendación han tenido un gran desarrollo en las ultimas décadas. Ante la era de la información masiva, los métodos de recomendación se presentan como una manera eficiente de filtrar información y escoger lo que realmente se quiere. El método más común y mejor valorado en la industria y la comunidad científica es el filtrado colaborativo. Este tipo de técnica se basa en la similitud de los ítems o del perfil de usuario, por lo que resulta bastante vulnerable a los ataques externos. En este contexto, el propósito de este trabajo es estudiar los diferentes ataques conocidos hasta ahora y poder detectarlos mediante algoritmos de aprendizaje automático. En este documento se ha estudiado en profundidad la detección de los ataques basado en filtrado colaborativo así como los principales trabajos de investigación, lo cual ha producido las siguientes contribuciones: 1. En base al funcionamiento del filtrado colaborativo, se ha investigado sobre los conceptos de ataques y detecciones en este tipo de mecanismo. 2. Basándose en la estrategia de ataque se puede distinguir dos tipos: los estándares y los de confusión. En este trabajo se van a seleccionar los 3 tipos de ataques estándares más comunes: RandomAttack, AverageAttack, BandwagonAttack. Además, también se va a implementar un tipo de ataque híbrido que resulte de la combinación cualesquiera de los tres. Tras ejecutar las inyecciones de perfiles en sistema, se va a intentar evaluar la efectividad de dicho ataque mediante las métricas de HitRatio y Prediction shift. En esta parte se ha visto que fillerSize es un factor decisivo durante el proceso de ataque, ya que en numerosos escenarios este parámetro define el nivel de similitud entre ítems. En cambio, en aquellos sistemas que tienen una matriz de similitud densa, el factor attackSize es el que domina ya que hay una gran posibilidad de puntar un ítem popular. 3. Entender los algoritmos de detección basados en aprendizaje automático: BayesDetector, SemiSAD, PCASelectUsers. Analizar la idea básica de cada algoritmo y su proceso de implementación. Una vez implementados los modelos de detección se va a intentar realizar una evaluación sobre los distintos tipos de ataques mediante Precision, Recall y F-measure. Tras analizar los resultados obtenidos mediante estas métricas, llegamos a la conclusión de que la técnica de SemiSAD ha sido el mejor método

    Understanding Shilling Attacks and Their Detection Traits: A Comprehensive Survey

    Get PDF
    The internet is the home for huge volumes of useful data that is constantly being created making it difficult for users to find information relevant to them. Recommendation System is a special type of information filtering system adapted by online vendors to provide recommendations to their customers based on their requirements. Collaborative filtering is one of the most widely used recommendation systems; unfortunately, it is prone to shilling/profile injection attacks. Such attacks alter the recommendation process to promote or demote a particular product. Over the years, multiple attack models and detection techniques have been developed to mitigate the problem. This paper aims to be a comprehensive survey of the shilling attack models, detection attributes, and detection algorithms. Additionally, we unravel and classify the intrinsic traits of the injected profiles that are exploited by the detection algorithms, which has not been explored in previous works. We also briefly discuss recent works in the development of robust algorithms that alleviate the impact of shilling attacks, attacks on multi-criteria systems, and intrinsic feedback based collaborative filtering methods

    ДОСЛІДЖЕННЯ РОБАСТНОСТІ РЕКОМЕНДАЦІЙНИХ СИСТЕМ З КОЛАБОРАТИВНОЮ ФІЛЬТРАЦІЄЮ ДО ІНФОРМАЦІЙНИХ АТАК

    Get PDF
    In this article research to the robustness of recommendation systems with collaborative filtering to information attacks, which are aimed at raising or lowering the ratings of target objects in a system. The vulnerabilities of collaborative filtering methods to information attacks, as well as the main types of attacks on recommendation systems - profile-injection attacks are explored. Ways to evaluate the robustness of recommendation systems to profile-injection attacks using metrics such as rating deviation from mean agreement and hit ratio are researched. The general method of testing the robustness of recommendation systems is described. The classification of collaborative filtration methods and comparisons of their robustness to information attacks are presented. Collaborative filtering model-based methods have been found to be more robust than memory-based methods, and item-based methods more resistant to attack than user-based methods. Methods of identifying information attacks on recommendation systems based on the classification of user-profiles are explored. Metrics for identify both individual bot profiles in a system and a group of bots are researched. Ways to evaluate the quality of user profile classifiers, including calculating metrics such as precision, recall, negative predictive value, and specificity are described. The method of increasing the robustness of recommendation systems by entering the user reputation parameter as well as methods for obtaining the numerical value of the user reputation parameter is considered. The results of these researches will in the future be directed to the development of a program model of a recommendation system for testing the robustness of various algorithms for collaborative filtering to known information attacks.У даній статті здійснено дослідження робастності рекомендаційних систем з колаборативною фільтрацією до інформаційних атак, метою яких є накручування рейтингів деяких об’єктів системи. Досліджено вразливості методів колаборативної фільтрації до інформаційних атак, а також розглянуто основний вид атак на рекомендаційні системи – атаку ін’єкцією профілів. Розглянуто способи оцінки робастності рекомендаційних систем до атак ін’єкцією профілів за допомогою таких показників як середній зсув прогнозування оцінок та коефіцієнт звернень користувачів до рекомендацій. Описано загальний спосіб тестування робастності рекомендаційних систем. Наведено класифікацію методів колаборативної фільтрації та здійснено порівняння їх робастності до інформаційних атак. Виявлено, що методи колаборативної фільтрації засновані на моделі більш робастні, ніж методи засновані на пам’яті, а методи на основі коефіцієнтів подоби об’єктів, більш стійкі до атак, ніж методи засновані на коефіцієнтах подоби користувачів. Досліджено методи виявлення інформаційних атак на рекомендаційні системи на основі класифікації профілів користувачів. Розглянуто показники, на основі яких можна виявити як окремі профілі ботів у системі, так і групи ботів. Наведено способи оцінки якості роботи класифікаторів профілів користувачів, зокрема, обчислення таких показників як точність, повнота, точність негативного прогнозу та специфічність. Розглянуто спосіб підвищення робастності рекомендаційних систем за допомогою введення параметра репутація користувачів, а також методів одержання числового значення параметру репутації користувачів. Результати даних досліджень у подальшому будуть спрямовані на розробку програмної моделі рекомендаційної системи для тестування робастності різних алгоритмів колаборативної фільтрації до відомих інформаційних ата
    corecore