• Title/Summary/Keyword: Movie site crawling

Search Result 2, Processing Time 0.014 seconds

Bipartite Preference aware Robust Recommendation System (이분법 선호도를 고려한 강건한 추천 시스템)

  • Lee, Jaehoon;Oh, Hayoung;Kim, Chong-kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.953-960
    • /
    • 2016
  • Due to the prevalent use of online systems and the increasing amount of accessible information, the influence of recommender systems is growing bigger than ever. However, there are several attempts by malicious users who try to compromise or manipulate the reliability of recommender systems with cyber-attacks. By analyzing the ratio of 'sympathy' against 'apathy' responses about a concerned review and reflecting the results in a recommendation system, we could present a way to improve the performance of a recommender system and maintain a robust system. After collecting and applying actual movie review data, we found that our proposed recommender system showed an improved performance compared to the existing recommendation systems.

State Information Based Recommendation Algorithm for Minimizing the Malicious User's Influence (상태 정보를 활용하여 악의적 사용자의 영향력을 최소화 하는 추천 알고리즘)

  • Noh, Taewan;Oh, Hayoung;Noh, Giseop;Kim, Chong-Kwon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.6
    • /
    • pp.1353-1360
    • /
    • 2015
  • With the extreme development of Internet, recently most users refer the sites with the various Recommendation Systems (RSs) when they want to buy some stuff, movie and music. However, the possibilities of the Sybils with the malicious behaviors may exists in these RSs sites in which Sybils intentionally increase or decrease the rating values. The RSs cannot play an accurate role of the proper recommendations to the general normal users. In this paper, we divide the given rating values into the stable or unstable states and propose a system information based recommendation algorithm that minimizes the malicious user's influence. To evaluate the performance of the proposed scheme, we directly crawl the real trace data from the famous movie site and analyze the performance. After that, we showed proposed scheme performs well compared to existing algorithms.