January 2003
·
2,708 Reads
·
4,644 Citations
IEEE Internet Computing
This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.
January 2003
·
2,708 Reads
·
4,644 Citations
IEEE Internet Computing
January 2003
·
1,095 Reads
·
1,124 Citations
IEEE Internet Computing
Recommendation algorithms are best known for their use on e-commerce Web sites, 1 where they use input about a customer’s interests to generate a list of recommended items. Many applications use only the items that customers purchase and explicitly rate to represent their interests, but they can also use other attributes, including items viewed, demographic data, subject interests, and favorite artists. At Amazon.com, we use recommendation algorithms to personalize the online store for each customer. The store radically changes based on customer interests, showing programming titles to a software engineer and baby toys to a new mother. The click-through and conversion rates — two
... In today's era of information explosion, recommender systems (RecSys) effectively assist users in filtering out uninteresting information and providing tailored services, which are widely applied in various scenarios such as e-commerce [26,36,15], streaming platforms [30,13,4], and social media [10, 6, 5]. For instance, Amazon's recommender system utilizes user's historical purchase records, browsing behaviors, and data from other users to personalize product recommendations, helping users discover items they may be interested in but have not yet found and enhancing user experience [16,21]. Recently, Large Language Models (LLMs) have fundamentally revolutionized existing recommender systems due to their powerful language comprehension capabilities and rich open-world knowledge [7, 38,43]. ...
January 2003
IEEE Internet Computing
... These attacks have been developed for a range of systems, including graph-based [24], association rule-based [25], matrix factorization-based [26,27], and neighborhood-based [28] recommender systems. For example, O'Mahony et al. [18] studied the robustness of user-based collaborative filtering (CF) methods [29] by injecting fake users. Burke et al. [30] analyzed the impact of low-knowledge attack strategies on CF methods, aiming to promote or demote items. ...
January 2003
IEEE Internet Computing