【RS-Defence】Detection of Shilling Attack Based on Bayesian Model and User Embedding (ICTAI‘2018)

Detection of Shilling Attack Based on Bayesian Model and User Embedding (ICTAI’2018)

直接将user embedding输入到分类器,因此需要强化一下user embedding,把更多的信息加进去。

三个loss训练user embedding。

image-20210903105412691

loss1:Matrix factorization

矩阵分解正常loss,分解user-item评分矩阵 R R R
L = ∑ u ∈ m , i ∈ n ( r u , i − r ^ u , i ) + λ ( ∑ u ∥ p u ∥ 2 + ∑ i ∥ q i ∥ 2 ) L=\sum_{u \in m, i \in n}\left(r_{u, i}-\widehat{r}_{u, i}\right)+\lambda\left(\sum_{u}\left\|p_{u}\right\|^{2}+\sum_{i}\left\|q_{i}\right\|^{2}\right) L=um,in(ru,ir u,i)+λ(upu2+iqi2)

loss2:User embedding

大致思路是构建一个user-user矩阵 M M M,用user embedding分解矩阵 M M M

构建user-user 矩阵 M M M

构建user-user SPPMI (Shifted Positive Point Mutual Information),构建方式:
P M I ( u , v ) = log ⁡ # ( u , v ) ⋅ ∣ D ∣ # u ⋅ # v S P P M I ( u , v ) = max ⁡ { P M I ( u , v ) − log ⁡ s , 0 } \begin{gathered} P M I(u, v)=\log \frac{\#(u, v) \cdot|D|}{\# u \cdot \# v} \\ S P P M I(u, v)=\max \{P M I(u, v)-\log s, 0\} \end{gathered} PMI(u,v)=log#u#v#(u,v)DSPPMI(u,v)=max{ PMI(u,v)logs,0}
where # ( u , v ) \#(u, v) #(u,v) denotes the number of items that have been jointly rated by both user u u u and user v v v, # ( u ) = ∑ v # ( u , v ) \#(u)=\sum_{v} \#(u, v) #(u)=<

  • 0
    点赞
  • 1
    收藏
    觉得还不错? 一键收藏
  • 0
    评论

“相关推荐”对你有帮助么?

  • 非常没帮助
  • 没帮助
  • 一般
  • 有帮助
  • 非常有帮助
提交
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值