From: Support attack detection algorithm for recommendation system based on deep learning
Item1 | Item2 | Item3 | … | Itemn | Correlation with Alice | |
---|---|---|---|---|---|---|
Alice | 4 | 0 | 0 | … | 3 | 1.00 |
User1 | 3 | 3 | 4 | … | 0 | 0.89 |
User2 | 3 | 1 | 2 | … | 3 | 0.91 |
… | … | … | … | … | … | … |
Userm | 4 | 0 | 3 | … | 0 | 0.86 |
Attacker1 | 2 | 0 | 3 | … | 1 | 0.95 |
Attacker2 | 3 | 4 | 0 | … | 0 | 0.73 |
… | … | … | … | … | … | … |
Attackerp | 3 | 4 | 4 | … | 2 | 0.90 |