Show simple item record

dc.contributor.advisorLeith, Douglasen
dc.contributor.authorShams, Sulthanaen
dc.date.accessioned2024-04-05T11:43:49Z
dc.date.available2024-04-05T11:43:49Z
dc.date.issued2024en
dc.date.submitted2024en
dc.identifier.citationShams, Sulthana, Recommender Systems: A Study of Cold-Start and Attack Resilience, Trinity College Dublin, School of Computer Science & Statistics, Computer Science, 2024en
dc.identifier.otherYen
dc.descriptionAPPROVEDen
dc.description.abstractMy thesis focuses on two key challenges in Recommender System: the Cold Start Problem and Data Poisoning attacks within the user-clustering framework. We explored utilizing user clustering to address the Cold Start Problem, analyzed its impact on data poisoning attacks, and devised a detection method for robust recommendation systems. By addressing the Cold Start issue in Chapter 3, we revisited the challenge of making recommendations for new users due to the absence of any historical preference data. We proposed a novel Cluster-based Bandit (CB) algorithm that achieves fast learning in cold-start users. CB suggests that for fast learning, we want to initially ask the user to rate those items for which the information to distinguish between a group pair is the largest. Identifying such items, called distinguisher items, can quickly identify the correct cluster a user belongs to. Once the correct cluster is identified, smart recommendations for new users can be utilized by the collective wisdom of comparable users within the cluster. We demonstrate that even without extensive user data, our method improves the first user experience and offers good recommendations. In Chapter 4, we examined the security ramifications of user clustering with regard to data poisoning threats. In order to modify recommendations and affect user behaviour, these malicious attacks entail the injection of skewed or false preference data. Our analysis showed that Matrix Factorisation (MF) could be vulnerable to targeted data poisoning attacks where attackers concentrate on particular user clusters. We specifically examined the process underlying how the user and item feature matrices U, V resulting from MF, alter following the injection of fake ratings. We demonstrated how these modifications aid in expanding the reach of targeted attacks by assessing the changes in these user and item feature matrices following the attack. Our findings lead us to the conclusion that it is the target item feature vector V that significantly contributes to altering the rating of the targeted item. Finally, in Chapter 5, based on the conclusions from the last chapter, we presented an effective detection method for safeguarding user clusters in recommenders against data poisoning attacks. We presented a novel Item Vector Deviation (IVD)-based detection method that is based on the deviation in the item feature vector following injection of set of new ratings.en
dc.publisherTrinity College Dublin. School of Computer Science & Statistics. Discipline of Computer Scienceen
dc.rightsYen
dc.subjectRecommender Systemsen
dc.subjectInformation Retrievalen
dc.subjectData Poisoning Attacksen
dc.subjectShilling Attacksen
dc.subjectMachine Learningen
dc.subjectMatrix Factorisationen
dc.titleRecommender Systems: A Study of Cold-Start and Attack Resilienceen
dc.typeThesisen
dc.type.supercollectionthesis_dissertationsen
dc.type.supercollectionrefereed_publicationsen
dc.type.qualificationlevelDoctoralen
dc.identifier.peoplefinderurlhttps://tcdlocalportal.tcd.ie/pls/EnterApex/f?p=800:71:0::::P71_USERNAME:SSHAMSen
dc.identifier.rssinternalid264750en
dc.rights.ecaccessrightsopenAccess
dc.identifier.urihttp://hdl.handle.net/2262/108155


Files in this item

Thumbnail
Thumbnail

This item appears in the following Collection(s)

Show simple item record