<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Regression Framework to Interpret the Robustness of Recom mender Systems Against Shilling Attacks</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Discussion Paper</string-name>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Yashar Deldjoo</string-name>
          <email>yashar.deldjoo@poliba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Tommaso Di Noia</string-name>
          <email>tommaso.dinoia@poliba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Eugenio Di Sciascio</string-name>
          <email>eugenio.disciascio@poliba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Felice Antonio Merra</string-name>
          <email>felice.merra@poliba.it</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="editor">
          <string-name>Recommender systems, Shilling Attacks, Robustness</string-name>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Politecnico di Bari</institution>
          ,
          <addr-line>via Orabona, 4, 70125 Bari</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>Collaborative filtering recommender systems (CF-RSs) employ user-item feedback, e.g., ratings, purchases, or reviews, to harmonize similarities among customers and produce personalized lists of products. Being based on the benevolence of other customers, CF-RSs are vulnerable to Shilling Attacks, i.e., fake profiles injected on the platform by adversaries to hack the recommendation outcomes toward a corrupt behavior. While mainly works on shilling attacks have been conducted to propose novel methods, compare recommendation models and outputs with and without defenses, we have found a lack of study on the impact of dataset properties on the CF-RSs robustness. In this work, we present a regression model to test whether dataset characteristics can impact the robustness of CF-RSs under shilling attacks to interpret their eficacy depending on these characteristics. Obtained results can help the system designer understand the cause of CF-RSs performance variations in attack scenarios.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction and Motivation</title>
      <p>
        Collaborative filtering recommender systems (CF-RSs) are a core service in online platforms in
increasing trafic and promoting sales [
        <xref ref-type="bibr" rid="ref1 ref2">1, 2</xref>
        ]. A key assumption of collaborative models is that
users with similar preferences will likely agree to interact with novel (next) items. However,
CF-RSs are vulnerable to adversarial attacks [
        <xref ref-type="bibr" rid="ref3">3</xref>
        ] such as the injection of fake profiles, named
Shilling Profiles [
        <xref ref-type="bibr" rid="ref4 ref5">4, 5</xref>
        ], perturbed side-data [
        <xref ref-type="bibr" rid="ref6 ref7">6, 7</xref>
        ], or perturbed parameters [
        <xref ref-type="bibr" rid="ref8">8</xref>
        ]. The motivation
for such attacks is often malicious, e.g., economic gain, market infiltration, and even for causing
damage on an underlying system (break the model availability). For instance, fake social media
accounts might be created to spread fake news, or false reviews could be provided about a
product to promote (push) or demote (nuke) items. For instance, past works have shown that a
few fake profiles (e.g., 3%) are suficient for a prediction shift up to 30% [
        <xref ref-type="bibr" rid="ref10 ref9">9, 10</xref>
        ].
      </p>
      <p>
        Three main directions have been explored on shilling attacks: attack designs, detection
algorithms, and defense strategies. The main shilling attack strategies are random, average,
popular, bandwagon, and love-hate [
        <xref ref-type="bibr" rid="ref11">11</xref>
        ]. These assume a certain level of knowledge of the
adversary on the recommendation model, recommendation outputs, the properties of items
(e.g., rating mean and entropy [12])) and users (e.g., group of users [13]). Detection strategies
aim to filter out fake profiles before used for the model learning [ 14, 15]. Robust algorithms try
to reduce the influence of possible out-of-distribution profiles [
        <xref ref-type="bibr" rid="ref10">16, 10</xref>
        ].
      </p>
      <p>While previous works have been orientated to “win-lose” scenarios, i.e., find an answer to
questions such as “Which attack models impact more the performance of specific recommendation
models? ”, “Which amount of knowledge on a specific recommendation-model is required for specific
attack A to influence recommendation algorithm B? ”. No efort has been made to provide an
interpretation on which dataset features can impact the efectiveness of attacks. Indeed, while
it is well-known that CF-RSs are afected by the sparsity of the dataset (e.g., a denser dataset can
make easier the recommendation task [17]), there are no claims in the case of shilling attacks.</p>
      <p>In this works, we focus on a novel research question “Given popular shilling attack types and
CF models already recognized by the community, which dataset characteristics can explain an
observed change in the performance of recommendation?” To answer this question, we propose a
regression-based model to analyze the efects of dataset characteristics on the robustness of
CF-RSs, and, via a large-scale experiment on three domains, we evaluate how three classes of
data characteristics —rating structure, rating value, and rating distribution— may influence the
robustness of CF-RSs. This work is an extended abstract of [18] published at SIGIR 2020.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Model</title>
      <p>Let  and  denote a set of users and items in a system, and  ∈ ℝ | |×| | as the complete user-item
rating matrix, where each entry   ∈ ℝ represents a rating assigned by user  ∈  to item
 ∈  if it is a recorded interaction (we use  to indicate the set of recorded interactions), a
shilling attack consists in adding novel users as composed by   the selected item set,   the
ifller set,   the unrated-item set, and   the target item set.   contains items identified by the
attacker to exploit the owned knowledge to maximize the efectiveness of the attack,   holds
randomly selected items for which rating scores are assigned to make the attack imperceptible.
  includes items without ratings in the fake user profile, and   is the item is to push or nuke.
The  composition varies based on attack strategies. We study: Random [12], Love-Hate [19],
Bandwagon [20], Popular [21], Average [12], and Perfect Knowledge [22]. To study the
impact of characteristics on the eficacy of this class of attacks, we use an explanatory model
defined as follows:
Definition 1 (Framework). Let  bet the set of datasets, let  be the number of data characteristic
factors, let X be the matrix containing the independent variables values (data characteristic values
specified below), then the regression model is built using the formulation
y =  +  0 +   X
(1)
where  0 represents the expected value of y (the attack performance metric under analysis),
  = [ 1,  2, ...,   ] is the vector of the regression coeficient associated with the IVs, and  the error.
Independent Variables (IV) We explore three class of independent variables on the (i) structure
(i.e.,   ,ℎ  , and   ), (ii) rating frequency (i.e.,   and   ), and
(iii) rating values (  ) of the user-item rating matrix. F   big values might
imply a higher chance of finding similar neighbor users or items. Therefore, as both attack and
recommendation models rely on identifying like-minded users (neighbor users) or similarly rated
items (neighbor items), we deem   to be an impactful characteristic on evaluating the
performance of shilling attacks. ℎ  can impact the efectiveness of shilling profile injection
attacks. For example, in domains where | | « | | ) there are more candidate neighbor users
than candidate neighbor items for memory-based CF models. This situation might work to the
advantage of user-based CF than item-based CF. Moreover, under a similar number of ratings,
changing the shape implies changing the average number of ratings per item | | ÷ | | . We
conjecture that this circumstance may impact the robustness of CF, since the construction of 
is mainly based on altering the popularity of targeted items.   is a well-recognized issue
in the community of RS and   = 1 −   . Sparser data means that the fraction of
unrated items significantly exceeds the fraction of rated ones [ 23]. It can harm the performance
of CF, reducing, for instance, the chance of discovering neighbors in memory-based CF, building
accurate model-based CF [24]. In [25], we have already identified a potential impact of dataset
density on the efectiveness of shilling attacks.   and   measure the concentration
of items, or users’, ratings and use them to capture the rating frequency distribution. The equal
popularity (e.g., all users give the same number of ratings) is represented with the value of
the Gini coeficients to 0, while the total inequality (e.g., only one user has given all ratings) is
represented with the value to 1. Finally, we study   motivated by the connection between
high rating variance and recommendation performance claimed in Herlocker et al. [26] and the
linear and negative impact on the accuracy shown in [17].</p>
      <p>Dependent Variables The dependent variable (DV) used to study the efectiveness of the attack
on RS is the Incremental Overall Hit Ratio (Δ @ ). This is a stability metric that measures if
the recommendation model recommends diferent products due to the attack irrespective of
their actual rating value [22]. The   metric has been proposed by Aggarwal [27]</p>
    </sec>
    <sec id="sec-3">
      <title>3. Experiments</title>
      <p>We study three datasets: ML-20M [28] having movies ratings ( = 138, 493 ,  = 26, 744 ,  =
20, 000, 263,  = 0.0054 ), Yelp [29] containing users’ reviews on businesses ( = 25, 677 ,
 = 25, 778 ,  = 705, 994 ,  = 0.0010 ), and LFM-1b [30] presenting user-artist play
counts( = 120, 175 ,  = 521, 232 ,  = 25, 285, 767 ,  = 0.0004 ). We use three CF-RSs
available in [31]: User-kNN [32], Item-kNN [32], and SVD [33]. Additional reproducibility
details are available in the original work [18]. Table 1 presents a snapshot of the full results for
answering two research questions presented below.</p>
      <p>RQ1. Is there an underlying relationship between the studied IVs and the DV ? The
results obtained for the adjusted coeficient of determination ( . 2) show that the six dataset
characteristics can explain more than 60% of the variation in Δ @ irrespective of the attack
type, model, and dataset, providing empirical evidence supporting the hypothesis that the six
IVs can explain a large part of the DV. The explanatory power is highest for the model-based
SVD approach (when comparing the global behavior of each CF model). However, not a similar
observation could be made on attacks.</p>
      <p>RQ2. How do IVs impact the DV in terms of the significance and directionality? The
significance of the computed regression coeficients for the IVs tends to vary for each IV or group
of IVs. The results show that the regression coeficients computed for   , ℎ  ,
and   are statistically significant. This shows enough statistical evidence to support
the hypothesis that structural characteristics can explain DV variations( &lt; 0.05, 0.01, 0.001 ).
However, results for the other IVs vary depending on &lt;attack, CF-model, dataset&gt; triplet, or
they can be insignificant as in the case of   . For instance, the coeficients for Gini indices
(i.e.,   and   ) are most significant for shilling attacks against SVD, particularly for
samples drawn from the Yelp and LFM-1b datasets. The coeficients for   are insignificant
(p-value &gt; 0.05) in all experimented cases, except for two cases &lt;Random/Average attack,
SVD, Yelp&gt;, implying that this dataset characteristic, which deals directly with rating values,
plays a less significant role on the impact of the attack. Investigating the directionality of the
coeficients, Table 1 shows that the   has a negative efect on Δ @ across majority
of the cases in &lt;attacks, CF-model, dataset&gt;. This result is consistent with RSs findings that
increasing the density is suitable for the performance of CF-RSs [34, 17]. An explanation is
that: if we fix the number of users and items and increase the number of genuine ratings, the
accuracy of similarities is improved by using more genuine ratings. As these similarities are
generally vulnerable to the insertion of fake profiles, adding more genuine feedbacks can help
to decrease the impact of attacks. Additionally, we can note that   has a negative
impact on Δ @ in neighborhood models, which means that increasing the space size makes
neighborhood models less vulnerable to attacks. Finally, and on the contrary, ℎ  presents
a consistently positive influence on the eficacy of the attacks. We explain it by considering the
following example: increasing ℎ  leads to an increased number of users with respect to
items (i.e., decreasing items). In this way, it could be easier to push the target item to higher
positions inside the recommendation list (i.e., fewer items have contributed).</p>
    </sec>
    <sec id="sec-4">
      <title>4. Conclusion and Future Work</title>
      <p>We have provided statistical evidence to accept the hypothesis that the chosen properties
account for a considerable portion of variations in attack performance. In particular, structural
properties (i.e., size, shape, and density) have a significant impact on the model, distributional
(i.e., Gini index) have a higher impact on memory-based models, and standard deviation does
not show an efect. Novel characteristics, attacks, and models are possible extensions.</p>
    </sec>
    <sec id="sec-5">
      <title>Acknowledgments</title>
      <p>We acknowledge support of PON ARS01_00876 BIO-D, Casa delle Tecnologie Emergenti della Città di
Matera, PON ARS01_00821 FLET4.0, PIA Servizi Locali 2.0, H2020 Passapartout - Grant n. 101016956,
and PIA ERP4.0.
[12] S. K. Lam, J. Riedl, Shilling recommender systems for fun and profit, in: WWW, ACM,
2004, pp. 393–402.
[13] R. D. Burke, B. Mobasher, R. Bhaumik, C. Williams, Segment-based injection attacks
against collaborative filtering recommender systems, in: ICDM, IEEE Computer Society,
2005, pp. 577–580.
[14] W. Zhou, J. Wen, Q. Xiong, M. Gao, J. Zeng, SVM-TIA a shilling attack detection method
based on SVM and target item analysis in recommender systems, Neurocomputing 210
(2016) 197–205.
[15] M. Aktukmak, Y. Yilmaz, I. Uysal, Quick and accurate attack detection in recommender
systems through user attributes, in: RecSys, ACM, 2019, pp. 348–352.
[16] F. Zhang, Y. Lu, J. Chen, S. Liu, Z. Ling, Robust collaborative filtering based on non-negative
matrix factorization and r1-norm, Knowl.-Based Syst. 118 (2017) 177–190.
[17] G. Adomavicius, J. Zhang, Impact of data characteristics on recommender systems
performance, ACM Trans. Management Inf. Syst. 3 (2012) 3:1–3:17.
[18] Y. Deldjoo, T. D. Noia, E. D. Sciascio, F. A. Merra, How dataset characteristics afect the
robustness of collaborative recommendation models, in: SIGIR, ACM, 2020, pp. 951–960.
[19] B. Mobasher, R. Burke, R. Bhaumik, C. Williams, Toward trustworthy recommender
systems: An analysis of attack models and algorithm robustness, ACM Transactions on
Internet Technology (TOIT) 7 (2007).
[20] M. P. O’Mahony, N. J. Hurley, G. C. M. Silvestre, Recommender systems: Attack types and
strategies, in: AAAI, 2005, pp. 334–339.
[21] M. P. O’Mahony, N. J. Hurley, G. C. Silvestre, An evaluation of the performance of
collaborative filtering, in: 14th Irish Artificial Intelligence and Cognitive Science (AICS
2003) Conference, Citeseer, 2003.
[22] M. P. O’Mahony, N. J. Hurley, N. Kushmerick, G. C. M. Silvestre, Collaborative
recommendation: A robustness analysis, ACM Trans. Internet Techn. 4 (2004) 344–377.
[23] Y. Moshfeghi, B. Piwowarski, J. M. Jose, Handling data sparsity in collaborative filtering
using emotion and semantic based features, in: Proceedings of the 34th international ACM
SIGIR conference on Research and development in Information Retrieval, ACM, 2011, pp.
625–634.
[24] P. Cremonesi, A. Tripodi, R. Turrin, Cross-domain recommender systems, in: ICDM</p>
      <p>Workshops, IEEE Computer Society, 2011, pp. 496–503.
[25] Y. Deldjoo, T. D. Noia, F. A. Merra, Assessing the impact of a user-item collaborative attack
on class of users, in: ImpactRS@RecSys, volume 2462, CEUR-WS.org, 2019.
[26] J. L. Herlocker, J. A. Konstan, J. Riedl, Explaining collaborative filtering recommendations,
in: CSCW 2000, Philadelphia, PA, USA, December 2-6, 2000, 2000, pp. 241–250. URL:
https://doi.org/10.1145/358916.358995. doi:1 0 . 1 1 4 5 / 3 5 8 9 1 6 . 3 5 8 9 9 5 .
[27] C. C. Aggarwal, Recommender Systems - The Textbook, Springer, 2016. URL: https://doi.</p>
      <p>org/10.1007/978-3-319-29659-3. doi:1 0 . 1 0 0 7 / 9 7 8 - 3 - 3 1 9 - 2 9 6 5 9 - 3 .
[28] F. M. Harper, J. A. Konstan, The movielens datasets: History and context, TiiS 5 (2016)
19:1–19:19.
[29] X. He, Z. He, X. Du, T. Chua, Adversarial personalized ranking for recommendation, in:</p>
      <p>SIGIR, ACM, 2018, pp. 355–364.
[30] M. Schedl, The lfm-1b dataset for music retrieval and recommendation, in: ICMR, ACM,
2016, pp. 103–110.
[31] N. Hug, Surprise, a Python library for recommender systems, 2017.
[32] Y. Koren, Factor in the neighbors: Scalable and accurate collaborative filtering, TKDD 4
(2010) 1:1–1:24.
[33] Y. Koren, R. M. Bell, C. Volinsky, Matrix factorization techniques for recommender systems,</p>
      <p>IEEE Computer 42 (2009) 30–37.
[34] P. Cremonesi, Y. Koren, R. Turrin, Performance of recommender algorithms on top-n
recommendation tasks, in: Proc. of the 2010 ACM Conference on Recommender Systems,
RecSys 2010, 2010, pp. 39–46. URL: https://doi.org/10.1145/1864708.1864721. doi:1 0 . 1 1 4 5 /
1 8 6 4 7 0 8 . 1 8 6 4 7 2 1 .</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>C. A.</given-names>
            <surname>Gomez-Uribe</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Hunt</surname>
          </string-name>
          ,
          <article-title>The netflix recommender system: Algorithms, business value, and innovation</article-title>
          ,
          <source>ACM Trans. Management Inf. Syst</source>
          .
          <volume>6</volume>
          (
          <year>2016</year>
          )
          <volume>13</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>13</lpage>
          :
          <fpage>19</fpage>
          . URL: https://doi.org/10.1145/2843948.
          <source>doi:1 0 . 1 1</source>
          <volume>4 5 / 2 8 4 3 9 4 8 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2]
          <string-name>
            <given-names>B.</given-names>
            <surname>Smith</surname>
          </string-name>
          ,
          <string-name>
            <surname>G.</surname>
          </string-name>
          <article-title>Linden, Two decades of recommender systems at amazon</article-title>
          .com,
          <source>IEEE Internet Computing</source>
          <volume>21</volume>
          (
          <year>2017</year>
          )
          <fpage>12</fpage>
          -
          <lpage>18</lpage>
          . URL: https://doi.org/10.1109/MIC.
          <year>2017</year>
          .
          <volume>72</volume>
          .
          <source>doi:1 0 . 1 1 0 9 / M I C . 2 0</source>
          <volume>1 7 . 7</volume>
          <fpage>2</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3]
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deldjoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          ,
          <article-title>A survey on adversarial recommender systems: From attack/defense strategies to generative adversarial networks</article-title>
          ,
          <source>ACM Comput. Surv</source>
          .
          <volume>54</volume>
          (
          <year>2021</year>
          )
          <volume>35</volume>
          :
          <fpage>1</fpage>
          -
          <lpage>35</lpage>
          :
          <fpage>38</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]
          <string-name>
            <given-names>I.</given-names>
            <surname>Gunes</surname>
          </string-name>
          ,
          <string-name>
            <given-names>C.</given-names>
            <surname>Kaleli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Bilge</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Polat</surname>
          </string-name>
          ,
          <article-title>Shilling attacks against recommender systems: a comprehensive survey</article-title>
          ,
          <source>Artif. Intell. Rev</source>
          .
          <volume>42</volume>
          (
          <year>2014</year>
          )
          <fpage>767</fpage>
          -
          <lpage>799</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          [5]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Y.</given-names>
            <surname>Deldjoo</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. Di</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>E. Di</given-names>
            <surname>Sciascio</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          , Sasha:
          <article-title>Semantic-aware shilling attacks on recommender systems exploiting knowledge graphs</article-title>
          ,
          <source>in: 17th European Semantic Web Conference ESWC 2020</source>
          , Springer,
          <year>2020</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Malitesta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          ,
          <article-title>Assessing perceptual and recommendation mutation of adversarially-poisoned visual recommenders (short paper)</article-title>
          ,
          <source>in: DP@AI*IA</source>
          , volume
          <volume>2776</volume>
          <source>of CEUR Workshop Proceedings, CEUR-WS.org</source>
          ,
          <year>2020</year>
          , pp.
          <fpage>49</fpage>
          -
          <lpage>56</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>D.</given-names>
            <surname>Malitesta</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          , Taamr:
          <article-title>Targeted adversarial attack against multimedia recommender systems</article-title>
          , in: DSN Workshops, IEEE,
          <year>2020</year>
          , pp.
          <fpage>1</fpage>
          -
          <lpage>8</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]
          <string-name>
            <given-names>V. W.</given-names>
            <surname>Anelli</surname>
          </string-name>
          ,
          <string-name>
            <given-names>T. D.</given-names>
            <surname>Noia</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F. A.</given-names>
            <surname>Merra</surname>
          </string-name>
          ,
          <article-title>The idiosyncratic efects of adversarial training on bias in personalized recommendation learning</article-title>
          ,
          <source>in: RecSys 2021: Fifteenth ACM Conference on Recommender Systems (RecSys '21)</source>
          ,
          <source>September 27-October 1</source>
          ,
          <year>2021</year>
          , Amsterdam, Netherlands,
          <string-name>
            <surname>ACM</surname>
          </string-name>
          ,
          <year>2021</year>
          . URL: https://doi.org/10.1145/3460231.3478858.
          <source>doi:1 0 . 1 1</source>
          <volume>4 5 / 3 4 6 0 2 3 1 . 3 4 7 8 8 5 8 .</volume>
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]
          <string-name>
            <given-names>D.</given-names>
            <surname>Jannach</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Zanker</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.</given-names>
            <surname>Felfernig</surname>
          </string-name>
          , G. Friedrich,
          <source>Recommender Systems - An Introduction</source>
          , Cambridge University Press,
          <year>2010</year>
          . URL: http://www.cambridge.org/de/academic/ subjects/computer-science/
          <article-title>knowledge-management-databases-and-data-mining/ recommender-systems-introduction?format=HB.</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>S.</given-names>
            <surname>Alonso</surname>
          </string-name>
          ,
          <string-name>
            <given-names>J.</given-names>
            <surname>Bobadilla</surname>
          </string-name>
          ,
          <string-name>
            <given-names>F.</given-names>
            <surname>Ortega</surname>
          </string-name>
          ,
          <string-name>
            <given-names>R.</given-names>
            <surname>Moya</surname>
          </string-name>
          ,
          <article-title>Robust model-based reliability approach to tackle shilling attacks in collaborative filtering recommender systems</article-title>
          ,
          <source>IEEE Access 7</source>
          (
          <year>2019</year>
          )
          <fpage>41782</fpage>
          -
          <lpage>41798</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11]
          <string-name>
            <surname>M. P. O'Mahony</surname>
          </string-name>
          ,
          <article-title>Towards robust and eficient automated collaborative filtering</article-title>
          ,
          <source>Ph.D. thesis, Citeseer</source>
          ,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>