| Citation: | NI W K,PENG S F,DU Y H. Identification of induced information for personalized recommendations based on knowledge graph[J]. Journal of Beijing University of Aeronautics and Astronautics,2025,51(7):2538-2552 (in Chinese) doi: 10.13700/j.bh.1001-5965.2023.0475 |
In the age of intelligent information, managing the recommendations of Internet information service algorithms is a crucial step in creating a national Internet governance framework. Personalized recommendation algorithm is one of the important technologies for Internet information service algorithm recommendation. The knowledge graph is widely used in personalized recommendation algorithms. At the same time, the knowledge graph and recommendation algorithm are vulnerable to data poisoning attacks by attackers, which in turn affects the recommendation results and induces information dissemination. There is a lack of effective models for identifying this type of induced information. Based on this, this article conducts research on the induced information identification model. Based on the analysis of user historical behavior records and the evolution process of user preferences, we study induction based on user interests and group perception. Information detection method, perform group preference modeling on the historical preferences of similar user groups, perform outlier analysis on abnormally exposed information within groups with common characteristics, and construct set node2vec-side item representation, GMM group division, and LUNAR induction for anomaly detection User preference modifications and recommendation result evolution reasoning are the basis for the realization of induced information recognition by the information recognition model NGL (Induced information detection model that incorporates node2vec-side item representation, GMM group division, and LUNAR, NGL). Induced information recognition experiments were conducted on RippleNet and MKR recommendation systems. The results show that the NGL model proposed in this article is better than the existing anomaly detection model.
| [1] |
ZHANG H T, TIAN C X, LI Y L, et al. Data poisoning attack against recommender system using incomplete and perturbed data[C]// Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data Mining. New York: ACM, 2021: 2154-2164.
|
| [2] |
ZHANG H T, ZHENG T H, GAO J, et al. Data poisoning attack against knowledge graph embedding[EB/OL]. (2019-06-24)[2023-05-04]. http://doi.org/10.48550/arXiv.1904.12052.
|
| [3] |
BHARDWAJ P, KELLEHER J, COSTABELLO L, et al. Poisoning knowledge graph embeddings via relation inference patterns[EB/OL]. (2021-11-11)[2023-05-04]. http://doi.org/48550/arXiv.2111.06345.
|
| [4] |
BHARDWAJ P, KELLEHER J, COSTABELLO L, et al. Adversarial attacks on knowledge graph embeddings via instance attribution methods[EB/OL]. (2021-11-04)[2023-05-04]. http://doi.org/10.48550/arXiv.2111.03120.
|
| [5] |
WU Z W, CHEN C T, HUANG S H. Poisoning attacks against knowledge graph-based recommendation systems using deep reinforcement learning[J]. Neural Computing and Applications, 2022, 34(4): 3097-3115. doi: 10.1007/s00521-021-06573-8
|
| [6] |
AKTUKMAK M, YILMAZ Y, UYSAL I. Quick and accurate attack detection in recommender systems through user attributes[C]// Proceedings of the 13th ACM Conference on Recommender Systems. New York: ACM, 2019: 348-352.
|
| [7] |
CAI H Y, ZHANG F Z. Detecting shilling attacks in recommender systems based on analysis of user rating behavior[J]. Knowledge-Based Systems, 2019, 177: 22-43. doi: 10.1016/j.knosys.2019.04.001
|
| [8] |
ZHANG S J, YIN H Z, CHEN T, et al. GCN-based user representation learning for unifying robust recommendation and fraudster detection[C]// Proceedings of the 43rd International ACM SIGIR Conference on Research and Development in Information Retrieval. New York: ACM, 2020: 689-698.
|
| [9] |
YANG L, NIU X X. A genre trust model for defending shilling attacks in recommender systems[J]. Complex & Intelligent Systems, 2023, 9(3): 2929-2942.
|
| [10] |
CHEN X, DENG X, HUANG C S, et al. Detection of trust shilling attacks in recommender systems[J]. IEICE Transactions on Information and Systems, 2022, E105.D(6): 1239-1242. doi: 10.1587/transinf.2021EDL8094
|
| [11] |
ZHANG F Z, ZHANG Z N, ZHANG P, et al. UD-HMM: an unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering[J]. Knowledge-Based Systems, 2018, 148: 146-166. doi: 10.1016/j.knosys.2018.02.032
|
| [12] |
ZHANG F Z, QU Y Q, XU Y S, et al. Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems[J]. Knowledge-Based Systems, 2020, 199: 105984. doi: 10.1016/j.knosys.2020.105984
|
| [13] |
HAO Y J, MENG G Y, WANG J, et al. A detection method for hybrid attacks in recommender systems[J]. Information Systems, 2023, 114: 102154. doi: 10.1016/j.is.2022.102154
|
| [14] |
JENY J R V, SOWMYA R, KIRAN G S, et al. Shilling attack detection system for online recommenders[C]//Proceedings of the 2022 International Conference on Inventive Computation Technologies. Piscataway: IEEE Press, 2022: 988-992.
|
| [15] |
GROVER A, LESKOVEC J. node2vec: scalable feature learning for networks[EB/OL]. (2016-07-03)[2023-06-25]. http://doi.org/10.48550/arXiv.1607.00653.
|
| [16] |
WANG H, ZHANG F, WANG J, et al. RippleNet: propagating user preferences on the knowledge graph for recommender systems[C]// Proceedings of the 27th ACM Interna-tional Conference on Information and Knowledge Manage-ment. New York: ACM, 2018: 417-426.
|
| [17] |
ZHANG C J, ZENG A. Behavior patterns of online users and the effect on information filtering[J]. Physica A: Statistical Mechanics and its Applications, 2012, 391(4): 1822-1830. doi: 10.1016/j.physa.2011.09.038
|
| [18] |
AZMEDROUB B, OUARZEDDINE M. Polarimetric SAR images clustering with Gaussian mixtures model[C]//Proceedings of the 2015 3rd International Conference on Control, Engineering & Information Technology. Piscataway: IEEE Press, 2015: 1-5.
|
| [19] |
GOODGE A, HOOI B, NG S K, et al. LUNAR: unifying local outlier detection methods via graph neural networks[J]. Proceedings of the AAAI Conference on Artificial Intelligence, 2022, 36(6): 6737-6745. doi: 10.1609/aaai.v36i6.20629
|
| [20] |
WANG H W, ZHANG F Z, ZHAO M, et al. Multi-task feature learning for knowledge graph enhanced recommendation[C]//Proceedings of the The World Wide Web Conference. New York: ACM, 2019: 2000-2010.
|
| [21] |
KRIEGEL H P, SCHUBERT M, ZIMEK A. Angle-based outlier detection in high-dimensional data[C]// Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York: ACM, 2008: 444-452.
|
| [22] |
RAMASWAMY S, RASTOGI R, SHIM K. Efficient algorithms for mining outliers from large data sets[C]// Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data. New York: ACM, 2000: 427-438.
|
| [23] |
BANDARAGODA T R, TING K M, ALBRECHT D, et al. Isolation-based anomaly detection using nearest-neighbor ensembles[J]. Computational Intelligence, 2018, 34(4): 968-998. doi: 10.1111/coin.12156
|
| [24] |
LIU F T, TING K M, ZHOU Z H. Isolation forest[C]//Processings of the 2008 Eighth IEEE International Conference on Data Mining. Piscataway: IEEE Press, 2008: 413-422.
|
| [25] |
HARDIN J, ROCKE D M. Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator[J]. Computational Statistics & Data Analysis, 2004, 44(4): 625-638.
|
| [26] |
LI Z, ZHAO Y, HU X Y, et al. ECOD: unsupervised outlier detection using empirical cumulative distribution functions[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 35(12): 12181-12193.
|
| [27] |
ALMARDENY Y, BOUJNAH N, CLEARY F. A novel outlier detection method for multivariate data[J]. IEEE Transactions on Knowledge and Data Engineering, 2022, 34(9): 4052-4062. doi: 10.1109/TKDE.2020.3036524
|
| [28] |
LI Z, ZHAO Y, BOTTA N, et al. COPOD: copula-based outlier detection[C]//Proceedings of the 2020 IEEE International Conference on Data Mining. Piscataway: IEEE Press, 2020: 1118-1123.
|
| [29] |
GOLDSTEIN M, DENGEL A. Histogram-based outlier score (HBOS): a fast unsupervised anomaly detection algorithm[C]//Proceedings of the KI-2012 35th Genman Conference on Artifical Intelligence. Saarbrücken: Springer, 2012.
|
| [30] |
ZENATI H, ROMAIN M, FOO C S, et al. Adversarially learned anomaly detection[C]//Proceedings of the 2018 IEEE International Conference on Data Mining. Piscataway: IEEE Press, 2018: 727-736.
|