Skip to main content
Advertisement
Browse Subject Areas
?

Click through the PLOS taxonomy to find articles in your field.

For more information about PLOS Subject Areas, click here.

< Back to Article

Fig 1.

The general composition of an attack profile.

More »

Fig 1 Expand

Table 1.

Features of attack models.

More »

Table 1 Expand

Fig 2.

Prediction shift in user-based collaborative filtering with attack size varies and filler size varies.

More »

Fig 2 Expand

Fig 3.

Overall structure of the proposed shilling detecting method.

More »

Fig 3 Expand

Fig 4.

Rating deviation distribution.

More »

Fig 4 Expand

Table 2.

Attackers in suspicious rating segments ratio in phase 1 when attack size and confidence coefficient vary.

More »

Table 2 Expand

Table 3.

Attack detection ratio when attack size varies under confidence coefficient 90%.

More »

Table 3 Expand

Fig 5.

Detection rate and false positive rate when attack size varies.

More »

Fig 5 Expand

Fig 6.

Comparisons of detection results with other methods.

More »

Fig 6 Expand

Fig 7.

Detection results with different datasets with attack size varies.

More »

Fig 7 Expand