Analysis of malicious input issues on intelligent systems

نویسندگان

  • Yuanfeng Cai
  • Zhengrui Jiang
  • Joey F George
  • Sree Nilakanta
  • Huaiqing Wu
  • Yajing Quan
چکیده

Intelligent systems can facilitate decision making and have been widely applied to various domains. The output of intelligent systems relies on the users’ input. However, with the development of Web-Based Interface, users can easily provide dishonest input. Therefore, the accuracy of the generated decision will be affected. This dissertation presents three essays to discuss the defense solutions for malicious input into three types of intelligent systems: expert systems, recommender systems, and rating systems. Different methods are proposed in each domain based on the nature of each problem. The first essay addresses the input distortion issue in expert systems. It develops four methods to distinguish liars from truth-tellers, and redesign the expert systems to control the impact of input distortion by liars. Experimental results show that the proposed methods could lead to the better accuracy or the lower misclassification cost. The second essay addresses the shilling attack issue in recommender systems. It proposes an integrated Value-based Neighbor Selection (VNS) approach, which aims to select proper neighbors for recommendation systems that maximize the e-retailer’s profit while protecting the system from shilling attacks. Simulations are conducted to demonstrate the effectiveness of the proposed method. The third essay addresses the rating fraud issue in rating systems. It designs a twophase procedure for rating fraud detection based on the temporal analysis on the rating series.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Intelligent Vehicle Highway Systems (Ivhs) Issues and Recommendations

Intelligent Vehicle Highway Systems (IVHS) is the integration of various pieces of information and computer technologies to the transportation elements in order to obtain a more productive transportation system. The five major components of IVHS are the Advanced Traffic Management Systems (ATMS), Advanced Vehicle Control Systems (AVCS), and Advanced Public Transportation systems (APTS). This pa...

متن کامل

Fractional order robust adaptive intelligent controller design for fractional-order chaotic systems with unknown input delay, uncertainty and external disturbances

In this paper, a fractional-order robust adaptive intelligent controller (FRAIC) is designed for a class of chaotic fractional order systems with uncertainty, external disturbances and unknown time-varying input time delay. The time delay is considered both constant and time varying. Due to changes in the equilibrium point, adaptive control is used to update the system's momentary information a...

متن کامل

Recent Developments in Discrete Event Systems

This article is a brief exposure of the process approach to a newly emerging area called "discrete event systems" in control theory and summarizes some of the recent developments in this area. Discrete event systems is an area of research that is developing within the interstices of computer, control and communication sciences. The basic direction of research addresses issues in the analysis an...

متن کامل

Design of robust carrier tracking systems in high dynamic and high noise conditions, with emphasis on neuro-fuzzy controller

The robust carrier tracking is defined as the ability of a receiver to determine the phase and frequency of the input carrier signal in unusual conditions such as signal loss, input signal fading, high receiver dynamic, or other destructive effects of propagation. An implementation of tight tracking can be understood in terms of adopting a very narrow loop bandwidth that contradict with the req...

متن کامل

An automated approach to analysis and classification of Crypto-ransomwares’ family

There is no doubt that malicious programs are one of the permanent threats to computer systems. Malicious programs distract the normal process of computer systems to apply their roguish purposes. Meanwhile, there is also a type of malware known as the ransomware that limits victims to access their computer system either by encrypting the victimchr('39')s files or by locking the system. Despite ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2016