skip to main content
10.1145/1297231.1297236acmconferencesArticle/Chapter ViewAbstractPublication PagesrecsysConference Proceedingsconference-collections
Article

The influence limiter: provably manipulation-resistant recommender systems

Published: 19 October 2007 Publication History

Abstract

An attacker can draw attention to items that don't deserve that attention by manipulating recommender systems. We describe an influence-limiting algorithm that can turn existing recommender systems into manipulation-resistant systems. Honest reporting is the optimal strategy for raters who wish to maximize their influence. If an attacker can create only a bounded number of shills, the attacker can mislead only a small amount. However, the system eventually makes full use of information from honest, informative raters. We describe both the influence limits and the information loss incurred due to those limits in terms of information-theoretic concepts of loss functions and entropies.

References

[1]
B. Awerbuch and R. D. Kleinberg. Competitive collaborative learning. In 18th Annual Conference on Learning Theory (COLT 2005), volume 3559 of LNAI, pages 233--248. Springer, 2005.
[2]
B. Awerbuch, B. Patt-Shamir, D. Peleg, and M. R. Tuttle. Improved recommendation systems. In ACM-SIAM Symposium on Discrete Algorithms, pages 1174--1183. SIAM, 2005.
[3]
R. Bhattacharjee and A. Goel. Algorithms and incentives for robust ranking. In Proceedings of the ACM-SIAM Symposium on Discrete Algorithms(SODA '07), 2007.
[4]
G. Brier. Verification of forecasts expressed in terms of probability. Monthly Weather Review, 78:1--3, 1950.
[5]
N. Cesa-Bianchi and G. Lugosi. Prediction, Learning, and Games. Cambridge University Press, 2006.
[6]
A. Cheng and E. Friedman. Sybilproof reputation mechanisms. In P2PECON '05: Proceeding of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pages 128--132, 2005.
[7]
P.-A. Chirita, W. Nejdl, and C. Zamfir. Preventing shilling attacks in online recommender systems. In WIDM 05, pages 67--74, 2005.
[8]
C. Dellarocas. Building trust online: The design of robust reputation reporting mechanisms in online trading communties. In Information Society or Information Economy? A combined perspective on the digital era, pages 95--113. Idea Book Publishing, 2003.
[9]
I. J. Good. Rational decisions. Journal of the Royal Statistical Society. Series B (Methodological), 14(1):107--114, 1952.
[10]
P. Grunwald and A. Dawid. Game theory, maximum entropy, minimum discrepancy and robust bayesian decision theory. Annals of Statistics, 32:1367--1433, 2004.
[11]
R. Hanson. Combinatorial information market design. Information Systems Frontiers, 5(1):107--119, 2003.
[12]
R. Hanson, R. Oprea, and D. Porter. Information aggregation and manipulation in an experimental market. Journal of Economic Behavior and Organization, page (to appear), 2006.
[13]
J. Herlocker, J. Konstan, and J. Riedl. An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms. Information Retrieval, 5:287--310, 2002.
[14]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in P2P networks. In Prooceedings of WWW '03, pages 640--651, 2003.
[15]
S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of WWW '04, pages 393--402, 2004.
[16]
R. Levien. Attack-Resistant Trust Metrics. PhD thesis, University of California, Berkeley, 2004.
[17]
P. Massa and B. Bhattacharjee. Using trust in recommender systems: An experimental analysis. In Proceedings of the 2nd International Conference on Trust Management, 2004.
[18]
B. Mehta, T. Hoffman, and P. Fankhauser. Lies and propaganda: detecting spam users in collaborative filtering. In Proceedings of IUI'07, 2007.
[19]
N. Miller, P. Resnick, and R. Zeckhauser. Eliciting honest feedback: The peer-prediction method. Management Science, 51(9):1359--1373, 2005.
[20]
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Towards trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7(2):1--40, 2007.
[21]
J. O'Donovan and B. Smyth. Trust no one: Evaluating trust-based filtering for recommenders. In Proceedings of IJCAI'05, 2005.
[22]
M. O'Mahony, N. Hurley, and G. Silvestre. Promoting recommendations: An attack on collaborative filtering. In Proceedings of the 13th International Conference on Database and Expert System Applications, pages 494--503. Springer-Verlag, 2002.
[23]
M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Detecting noise in recommender system databases. In Proceedings of the 2006 International Conference on Intelligent User Interfaces, pages 109--115, 2006.
[24]
A. M. Rashid, I. Albert, D. Cosley, S. K. Lam, S. M. McNee, J. A. Konstan, and J. Riedl. Getting to know you: learning new user preferences in recommender systems. In IUI '02, pages 127--134, 2002.
[25]
A. M. Rashid, G. Karypis, and J. Riedl. Influence in ratings-based recommender systems: An algorithm-independent approach. In Proceedings of the SIAM International Conference on Data Mining, 2005.
[26]
G. Shafer and V. Vovk. Probability and Finance: It's Only a Game!. John Wiley and Sons, 2001.
[27]
L. von Ahn, M. Blum, N. Hopper, and J. Langford. CAPTCHA: Using Hard AI Problems for Security. In Proceedings of Eurocrypt 2003, 2003.

Cited By

View all
  • (2024)Finding the Wise and the Wisdom in a Crowd: Estimating Underlying Qualities of Reviewers and ItemsThe Economic Journal10.1093/ej/ueae045134:663(2712-2745)Online publication date: 24-May-2024
  • (2023)PeerNomination: A novel peer selection algorithm to handle strategic and noisy assessmentsArtificial Intelligence10.1016/j.artint.2022.103843316(103843)Online publication date: Mar-2023
  • (2022)Toward User Control over Information Access: A Sociotechnical ApproachProceedings of the 2022 New Security Paradigms Workshop10.1145/3584318.3584327(117-129)Online publication date: 24-Oct-2022
  • Show More Cited By

Index Terms

  1. The influence limiter: provably manipulation-resistant recommender systems

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Conferences
    RecSys '07: Proceedings of the 2007 ACM conference on Recommender systems
    October 2007
    222 pages
    ISBN:9781595937308
    DOI:10.1145/1297231
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Sponsors

    In-Cooperation

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 19 October 2007

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. manipulation-resistance
    2. recommender system
    3. shilling

    Qualifiers

    • Article

    Conference

    RecSys07
    Sponsor:
    RecSys07: ACM Conference on Recommender Systems
    October 19 - 20, 2007
    MN, Minneapolis, USA

    Acceptance Rates

    Overall Acceptance Rate 254 of 1,295 submissions, 20%

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)9
    • Downloads (Last 6 weeks)2
    Reflects downloads up to 05 Mar 2025

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Finding the Wise and the Wisdom in a Crowd: Estimating Underlying Qualities of Reviewers and ItemsThe Economic Journal10.1093/ej/ueae045134:663(2712-2745)Online publication date: 24-May-2024
    • (2023)PeerNomination: A novel peer selection algorithm to handle strategic and noisy assessmentsArtificial Intelligence10.1016/j.artint.2022.103843316(103843)Online publication date: Mar-2023
    • (2022)Toward User Control over Information Access: A Sociotechnical ApproachProceedings of the 2022 New Security Paradigms Workshop10.1145/3584318.3584327(117-129)Online publication date: 24-Oct-2022
    • (2022)Blockchain-based recommender systemsComputer Science Review10.1016/j.cosrev.2021.10043943:COnline publication date: 1-Feb-2022
    • (2022)On Trust, Blockchain, and Reputation SystemsHandbook on Blockchain10.1007/978-3-031-07535-3_9(299-337)Online publication date: 4-Nov-2022
    • (2020)The Structure of Social Influence in Recommender NetworksProceedings of The Web Conference 202010.1145/3366423.3380020(2655-2661)Online publication date: 20-Apr-2020
    • (2020)Systematic Review on Recommendation Systems2020 2nd International Conference on Advances in Computing, Communication Control and Networking (ICACCCN)10.1109/ICACCCN51052.2020.9362888(952-956)Online publication date: 18-Dec-2020
    • (2018)Design of Coalition Resistant Credit Score Functions for Online Discussion ForumsProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3237404(95-103)Online publication date: 9-Jul-2018
    • (2018)AdaErrorProceedings of the 2018 World Wide Web Conference10.1145/3178876.3186155(741-751)Online publication date: 10-Apr-2018
    • (2018)Privacy Preserving and Cost Optimal Mobile Crowdsensing Using Smart Contracts on Blockchain2018 IEEE 15th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2018.00068(442-450)Online publication date: Oct-2018
    • Show More Cited By

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Figures

    Tables

    Media

    Share

    Share

    Share this Publication link

    Share on social media