Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
article

Collaborative recommendation: A robustness analysis

Published: 01 November 2004 Publication History

Abstract

Collaborative recommendation has emerged as an effective technique for personalized information access. However, there has been relatively little theoretical analysis of the conditions under which the technique is effective. To explore this issue, we analyse the <i>robustness</i> of collaborative recommendation: the ability to make recommendations despite (possibly intentional) noisy product ratings. There are two aspects to robustness: recommendation <i>accuracy</i> and <i>stability</i>. We formalize recommendation accuracy in machine learning terms and develop theoretically justified models of accuracy. In addition, we present a framework to examine recommendation stability in the context of a widely-used collaborative filtering algorithm. For each case, we evaluate our analysis using several real-world data-sets. Our investigation is both practically relevant for enterprises wondering whether collaborative recommendation leaves their marketing operations open to attack, and theoretically interesting for the light it sheds on a comprehensive theory of collaborative recommendation.

References

[1]
Albert, M. and Aha, D. 1991. Analyses of instance-based learning algorithms. In Proceedings of the 9th National Conference on Artificial Intelligence.]]
[2]
Angluin, D. and Laird, P. 1988. Learning from noisy examples. Machine Learning 2, 4, 343--370.]]
[3]
Azar, Y., Fiat, A., Karlin, A., McSherry, F., and Saia, J. 2001. Spectral analysis of data. In Proceedings of the 32nd ACM Symposium on the Theory of Computing.]]
[4]
Breese, J., Heckerman, D., and Kadie, C. 1998. Empirical analysis of predictive algorithms for collaborative filtering. In Conference on the Uncertainty in Artificial Intelligence.]]
[5]
Drineas, P., Kerenidis, I., and Raghavan, P. 2002. Competetive recommender systems. In Proceedings of the 32nd ACM Symposium on the Theory of Computing.]]
[6]
Goldberg, D., Nichols, D., Oki, B., and Terry, D. 1992. Using collaborative filtering to weave an information tapestry. Comm. ACM 35, 12, 61--70.]]
[7]
Groot, P., van Harmelen, F., and ten Teije, A. 2000. Torture tests: a quantitative analysis for the robustness of knowledge-based systems. In European Workshop on Knowledge Acquisition, Modelling and Management (EKAW'00). LNAI Springer-Verlag.]]
[8]
Haussler, D. 1990. Probably approximately correct learning. In National Conference on Artificial Intelligence. 1101--1108.]]
[9]
Herlocker, J., Konstan, J., Borchers, A., and Riedl, J. 1999. An algorithmic framework for performing collaborative filtering. In Proceedings of ACM SIGIR'99.]]
[10]
Hsu, C.-N. and Knoblock, C. A. 1995. Estimating the robustness of discovered knowledge. In Proceedings of the First International Conference on Knwledge Discovery and Data Mining. Montreal, Canada.]]
[11]
Hsu, C.-N. and Knoblock, C. A. 1996. Discovering robust knowledge from dynamic closed-world data. In Proceedings of AAAI'96.]]
[12]
http://movielens.umn.edu.]]
[13]
http://www.changingworlds.com.]]
[14]
IEEE. 1990. IEEE standard glossary of software engineering terminology. IEEE Standard 610.12-1990.]]
[15]
Kearns, M. and Li, M. 1988. Learning in the presence of malicious errors. In Proceedings of the ACM Symposium on the Theory of Computing.]]
[16]
Kleinberg, J. 1998. Authoritative sources in a hyperlinked environment. In Proceedings of the ACM SIAM Symposium on Discrete Algorithms.]]
[17]
Kumar, R., Raghavan, P., Rajagopalan, S., and Tompkins, A. 1998. Recommender systems: A probabilistic analysis. In Proceedings of the 39th IEEE Symposium on the Foundations of Computer Science.]]
[18]
Ng, A., Zheng, A., and Jordan, M. 2001. Link analysis, eigenvectors and stability. In Proceedings of the 17th International Joint Conference on Artificial Intelligence.]]
[19]
Pennock, D., Horvitz, E., and Giles, L. 2000. Socal choice theory and recommender systems: Analysis of the axiomatic foundations of collabortative filtering. In National Conference on Artificial Intelligence. 729--734.]]
[20]
Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., and Riedl, J. 1994. An open architecture for collaborative filtering of netnews. In ACM Conference on Computer Supported Cooperative Work.]]
[21]
Shardanand, U. and Maes, P. 1994. Social information filtering: Algorithms for automating "word of mouth". In Proceedings of the Conference on Human Factors in Computing Systems.]]
[22]
Valiant, L. 1984. A theory of the learnable. Comm. ACM, 1134--1142.]]

Cited By

View all
  • (2024)A novel clustered-based detection method for shilling attack in private environmentsPeerJ Computer Science10.7717/peerj-cs.213710(e2137)Online publication date: 24-Jun-2024
  • (2024)A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation SystemsMathematics10.3390/math1202024712:2(247)Online publication date: 12-Jan-2024
  • (2024)Attacking Click-through Rate Predictors via Generating Realistic Fake SamplesACM Transactions on Knowledge Discovery from Data10.1145/364368518:5(1-24)Online publication date: 28-Feb-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 4, Issue 4
November 2004
108 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/1031114
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 November 2004
Published in TOIT Volume 4, Issue 4

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Collaborative recommendation
  2. machine learning
  3. robustness

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)69
  • Downloads (Last 6 weeks)3
Reflects downloads up to 01 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A novel clustered-based detection method for shilling attack in private environmentsPeerJ Computer Science10.7717/peerj-cs.213710(e2137)Online publication date: 24-Jun-2024
  • (2024)A Sampling-Based Method for Detecting Data Poisoning Attacks in Recommendation SystemsMathematics10.3390/math1202024712:2(247)Online publication date: 12-Jan-2024
  • (2024)Attacking Click-through Rate Predictors via Generating Realistic Fake SamplesACM Transactions on Knowledge Discovery from Data10.1145/364368518:5(1-24)Online publication date: 28-Feb-2024
  • (2024)Shilling Black-Box Recommender Systems by Learning to Generate Fake User ProfilesIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2022.318321035:1(1305-1319)Online publication date: Jan-2024
  • (2024)Deep Learning for Remote Monitoring of Power System2024 IEEE 18th International Conference on Control & Automation (ICCA)10.1109/ICCA62789.2024.10591883(502-507)Online publication date: 18-Jun-2024
  • (2024)Design of a dynamic and robust recommender system based on item context, trust, rating matrix and rating time using social networks analysisJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10196436:2(101964)Online publication date: Feb-2024
  • (2024)An empirical study on metamorphic testing for recommender systemsInformation and Software Technology10.1016/j.infsof.2024.107410169(107410)Online publication date: May-2024
  • (2024)Ecological spatial network optimization of carbon sink patches for enhanced carbon sink in Wuhan Metropolitan Area, ChinaEcological Indicators10.1016/j.ecolind.2024.112177165(112177)Online publication date: Aug-2024
  • (2024)A recommendation attack detection approach integrating CNN with BaggingComputers & Security10.1016/j.cose.2024.104030146(104030)Online publication date: Nov-2024
  • (2024)SPERM: sequential pairwise embedding recommendation with MI-FGSMInternational Journal of Machine Learning and Cybernetics10.1007/s13042-024-02288-zOnline publication date: 19-Jul-2024
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media