Keywords

1 Introduction

At present, the rapid development of electronic commerce retail and the rise of social network marketing make social recommendation a research hotspot [1]. Social recommendation refers to recommendation technology taking social relationships as additional input [2] to improve the sales of merchandise and users’ satisfaction [13].

Social recommendations mainly combine users’ social relationships and collaborative filtering technologies [4] to make recommendations. The social relationships between users can be combined with memory-based collaborative filtering method to find nearest neighbor or model-based collaborative filtering as an implicit vector constraints to form memory-based or model-based social recommendation. Social recommendations utilize users’ similarities reflected from social relationships [5] to play an important role in solving the cold start problem in the recommendation systems and improve the accuracy of recommendations, but still face serious challenges and problems. First, shilling attacks seriously affect the authenticity of the recommendation in a social recommendation system [6, 7]. Second, the noise relationship will lead to recommendation failure. There are many relationships in social networks. These relationships are usually dealt with as the same, which is an important reason that explains current social recommendations did not play its due role [8].

Comments injected by fake users seriously affect the authenticity of the recommendation list as well as users’ trust degree to the recommendation system; while the simplification of relationship treatment also seriously affects the accuracy of the recommendation list and users’ satisfaction to the recommendation system. To solve these issues, the social relationship is a key factor. This paper analyzes up to date research of social recommendation and the detecting technology of interference relationships, as well as proposes a research framework to solve these issues.

2 Social Recommendations and Multiple Relationships Detection

In this section, we will analyze up to date memory-based and model-based social recommendation approaches, fake user detection approaches, and multiple relationship detection approaches because these approaches are essential techniques to robust social recommendation.

2.1 Social Recommendations

Social recommendations usually refer to utilizing social relationships to conduct the merchandise recommendation, conducting the recommendation of friends, micro-blogs, or utilizing celebrities’ social influences to conduct the recommendations. The social recommendations in this paper belong to a narrowly-defined social recommendation [9]: a kind of item recommendation technique combining the social relationships. Social recommendation can be divided into memory-based one and model-based one. Memory-based social recommendations directly use ratings and directly linked users as neighbors. Rokach et al. [10] propose a social relationships’ weighed average method to find the neighbors. According to the shortest path length from the target user to all users, Golbeck [11] gradually calculate the trust degree and chose those users whose trust values were greater than a threshold value as the neighbor. Jithin and Beegom [12] use the theory of thermal diffusion for reference to conduct trust transfer in the social relationship networks, meanwhile combined it with traditional rating similarities. Model-based social recommendation takes the model-based collaborative filtering as its foundation, such as the probability matrix decomposition models [15] making relationships between users reflected to preference relationships and achieved the method of social trust integration, the random walk model [13] on social relationships to deal with both positive and negative relationships under the condition of ensuring the convergence and then realize the recommendations, the Social Bayes Personalized Rank (SBPR) model [14] used in combination with friends’ preference to predict ratings, the tensor decomposition model [16] and the multidimensional trust relationship model [17].

These social recommendation approaches utilize users’ social relationships and generate effective recommendation as rating matrices are sparse or recommending cold start items. Therefore, the approach can solve the sparsity problem and the cold start problem to some extents; meanwhile improve the accuracy of recommendation. Social recommendation widely drew academia and the industry’s attention, but due to a lower cost of establishing social relationships in social networks, social recommendation suffers from the problems related with interference relationships: (1) fake users who improve or lower items’ recommendation probabilities by injecting fake users and relationships, which is called the social recommendation shilling attack [6]; and (2) The problem of noise relationship leading to recommendation failure. There are multiple noise relationships that have side-effects on the recommendation, such as temporary friendships or random friendships [18]. If these relationships are treated equally with friendships and colleague relationships, it will make the recommendation results be questioned to a certain extent.

2.2 Social Relationships Detection

Fake User Detection. At present, the studies on fake users’ interference mainly concentrate on shilling attacks detection in the traditional recommendation systems as well as the methods of detecting fake users in social networks.

In the recommendation systems, Mobasher et al. [19] propose a supervised learning method that used the rating degree mean agreement (RDMA), Degsim, and other features training classifiers to detect fake users. Other researchers [22, 23] put forward a non-supervised learning method based on feature clustering to detect fake users. Cao et al. [23] raise a semi-supervised learning method which utilized a small amount of labeled data and a large amount of non-labeled data to improve the detection accuracy. Zhang [24] put forward a method to improve recommendation systems’ anti-shilling attacks ability by building a users’ multi-layered trust model. Wang et al. [25] raise an attack detection algorithm based on target item identification.

In social networks, fake users with the intention of spreading particular contents also can be called “shills” [7] or “water army”. The research on fake users in social networks concentrates on that detecting abnormal users based on user features or network structures. Aggarwal et al. [26] extract characteristics from users’ registration information, published contents and other information and then built classifiers. Limsaiprom and Tantatsanawong [27] detect fake users by clustering users’ source and target addresses.

In social recommendation, Zhang et al. [7] detect fake users based on the cluster of friends’ trust relationships. Shrivastava et al. [6] raise that detecting random link attacks by clustering social network diagrams.

Multiple Relationship Detection. Some research on the multiple relationship are focused on raising problems [8]. Liu et al. [4] believe that social recommendation did not distinguish friendships is one of reasons for its recommendation failure in some case at present. Ghosh et al. [28] raise that in social networks, real users might also build up unreal relationships.

In the aspect of solving the problems, Yeung and Iwata [18] introduce the concept of relationship strength, and used the method of matrix decomposition and optimization to solve the relationship strength. Tang et al. [17] analyze multidimensional trust relationships based on themes’ multidimensional trust tensors and then conducted the recommendation.

3 Analysis and Discussion

At the time of achieving recommendation accuracy and solving the cold start problem, social recommendation is easy to receive fake users’ shilling attacks and noise relationships’ interference. The detection on fake users in the traditional recommendation system [1921], the recommendation based on the calculation of trust degree or target items’ abnormality [24, 25] and the detection on fake users in social networks [26, 27] all involved less in the problem of shilling attacks produced when social networks are combined with the e-commerce to conduct product recommendations. In current study on fake users of social recommendation [6, 7], it is assumed that attackers use random link attacks to establish links randomly between fake users and normal users, and if attackers use other strategies to conduct attacks, then it would be difficult to deal with.

The future research should focus on robust social recommendation, four research points are shown in Fig. 1: (1) The modeling of users’ social relationships is the foundation of robust social recommendation. It focuses on the study of using complex network modeling to build fake user injection strategies and shilling attacks models of social recommendation; (2) Utilize the multi-view collaborative training, probabilistic graphical model, tensor decomposition, and other technologies to form the method of probability estimation of multidimensional social relationships; (3) Aim at the cold start, hot and general item exploration to explore function mechanisms of multiple social relationships on the recommendation. The influence of relationships on different types of items can be analyzed by comparing the baseline recommendation algorithms with that by the social recommendation algorithms; and (4) Combine the multidimensional social relationship probability matrix, and finally build up the algorithm of anti-interference social recommendation to achieve a robust social recommendation system.

Fig. 1.
figure 1

The further research of robust social recommendation

4 Conclusion

This paper started from the analysis of the study of social recommendation and existing problems. It explained the characteristic that social recommendation is easy to be attacked by bogus social relationships and be interfered by multiple social relationships. It analyzed the future research point of robust social recommendation, and proposed four aspects: (1) the users’ relationship modeling and characteristic extraction faced anti-shilling attack social recommendation; (2) strategies of fake relationship injection and social recommendation shilling attack models; (3) probability estimation of users’ multidimensional social relationships and function mechanism of relationship types on social recommendation; and (4) robust social recommendation approaches combined multidimensional social relationships with traditional social recommendation algorithms.