Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chad Williams is active.

Publication


Featured researches published by Chad Williams.


ACM Transactions on Internet Technology | 2007

Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness

Bamshad Mobasher; Robin D. Burke; Runa Bhaumik; Chad Williams

Publicly accessible adaptive systems such as collaborative recommender systems present a security problem. Attackers, who cannot be readily distinguished from ordinary users, may inject biased profiles in an attempt to force a system to “adapt” in a manner advantageous to them. Such attacks may lead to a degradation of user trust in the objectivity and accuracy of the system. Recent research has begun to examine the vulnerabilities and robustness of different collaborative recommendation techniques in the face of “profile injection” attacks. In this article, we outline some of the major issues in building secure recommender systems, concentrating in particular on the modeling of attacks and their impact on various recommendation algorithms. We introduce several new attack models and perform extensive simulation-based evaluations to show which attacks are most successful and practical against common recommendation techniques. Our study shows that both user-based and item-based algorithms are highly vulnerable to specific attack models, but that hybrid algorithms may provide a higher degree of robustness. Using our formal characterization of attack models, we also introduce a novel classification-based approach for detecting attack profiles and evaluate its effectiveness in neutralizing attacks.


knowledge discovery and data mining | 2006

Classification features for attack detection in collaborative recommender systems

Robin D. Burke; Bamshad Mobasher; Chad Williams; Runa Bhaumik

Collaborative recommender systems are highly vulnerable to attack. Attackers can use automated means to inject a large number of biased profiles into such a system, resulting in recommendations that favor or disfavor given items. Since collaborative recommender systems must be open to user input, it is difficult to design a system that cannot be so attacked. Researchers studying robust recommendation have therefore begun to identify types of attacks and study mechanisms for recognizing and defeating them. In this paper, we propose and study different attributes derived from user profiles for their utility in attack detection. We show that a machine learning classification approach that includes attributes derived from attack models is more successful than more generalized detection algorithms previously studied.


Transportation Letters: The International Journal of Transportation Research | 2009

An automated GPS-based prompted recall survey with learning algorithms

Joshua Auld; Chad Williams; Abolfazl Mohammadian; Peter C. Nelson

Abstract Using GPS technology in the collection of household travel data has been gaining importance as the technology matures. This paper documents recent developments in the field of GPS travel surveying and ways in which GPS has been incorporated into or even replaced traditional household travel survey methods. A new household activity survey is presented which uses automated data reduction methods to determine activity and travel locations based on a series of heuristics developed from land-use data and travel characteristics. The algorithms are used in an internet-based prompted recall survey which utilizes advanced learning algorithms to reduce the burden placed on survey respondents. Initial results of a small pilot study are discussed and potential areas of future work are presented.


service-oriented computing and applications | 2007

Defending recommender systems: detection of profile injection attacks

Chad Williams; Bamshad Mobasher; Robin D. Burke

Collaborative recommender systems are known to be highly vulnerable to profile injection attacks, attacks that involve the insertion of biased profiles into the ratings database for the purpose of altering the system’s recommendation behavior. Prior work has shown when profiles are reverse engineered to maximize influence; even a small number of malicious profiles can significantly bias the system. This paper describes a classification approach to the problem of detecting and responding to profile injection attacks. A number of attributes are identified that distinguish characteristics present in attack profiles in general, as well as an attribute generation approach for detecting profiles based on reverse engineered attack models. Three well-known classification algorithms are then used to demonstrate the combined benefit of these attributes and the impact the selection of classifier has with respect to improving the robustness of the recommender system. Our study demonstrates this technique significantly reduces the impact of the most powerful attack models previously studied, particularly when combined with a support vector machine classifier.


web mining and web usage analysis | 2005

Analysis and detection of segment-focused attacks against collaborative recommendation

Bamshad Mobasher; Robin D. Burke; Chad Williams; Runa Bhaumik

Significant vulnerabilities have recently been identified in collaborative filtering recommender systems. These vulnerabilities mostly emanate from the open nature of such systems and their reliance on user-specified judgments for building profiles. Attackers can easily introduce biased data in an attempt to force the system to “adapt” in a manner advantageous to them. Our research in secure personalization is examining a range of attack models, from the simple to the complex, and a variety of recommendation techniques. In this chapter, we explore an attack model that focuses on a subset of users with similar tastes and show that such an attack can be highly successful against both user-based and item-based collaborative filtering. We also introduce a detection model that can significantly decrease the impact of this attack.


congress on evolutionary computation | 2006

Detecting Profile Injection Attacks in Collaborative Recommender Systems

Robin D. Burke; Bamshad Mobasher; Chad Williams; Runa Bhaumik

Collaborative recommender systems are known to be highly vulnerable to profile injection attacks, attacks that involve the insertion of biased profiles into the ratings database for the purpose of altering the systems recommendation behavior. In prior work, we and others have identified a number of models for such attacks and shown their effectiveness. This paper describes a classification approach to the problem of detecting and responding to profile injection attacks. This technique significantly reduces the effectiveness of the most powerful attack models previously studied


web mining and web usage analysis | 2006

Detecting profile injection attacks in collaborative filtering: a classification-based approach

Chad Williams; Bamshad Mobasher; Robin D. Burke; Runa Bhaumik

Collaborative recommender systems have been shown to be vulnerable to profile injection attacks. By injecting a large number of biased profiles into a system, attackers can manipulate the predictions of targeted items. To decrease this risk, researchers have begun to study mechanisms for detecting and preventing profile injection attacks. In prior work, we proposed several attributes for attack detection and have shown that a classifier built with them can be highly successful at identifying attack profiles. In this paper, we extend our work through a more detailed analysis of the information gain associated with these attributes across the dimensions of attack type and profile size. We then evaluate their combined effectiveness at improving the robustness of user based recommender systems.


international conference on mobile and ubiquitous systems: networking and services | 2008

Mining sequential association rules for traveler context prediction

Chad Williams; Abolfazl Mohammadian; Peter C. Nelson; Sean T. Doherty

Recent work has focused on creating models for generating traveler behavior for micro simulations. With the increase in hand held computers and GPS devices, there is likely to be an increasing demand for extending this idea to predicting an individuals future travel plans for devices such as a smart travelers assistant. In this work, we introduce a technique based on sequential data mining for predicting multiple aspects of an individuals next activity using a combination of user history and their similarity to other travelers. The proposed technique is empirically shown to perform better than more traditional approaches to this problem.


international conference on data mining | 2009

Attribute Constrained Rules for Partially Labeled Sequence Completion

Chad Williams; Peter C. Nelson; Abolfazl Mohammadian

Sequential pattern and rule mining have been the focus of much research, however predicting missing sets of elements within a sequence remains a challenge. Recent work in survey design suggests that if these missing elements can be inferred with a higher degree of certainty, it could greatly reduce the time burden on survey participants. To address this problem and the more general problem of missing sensor data, we introduce a new form of constrained sequential rules that use attribute presence to better capture rule confidence in sequences with missing data than previous constraint based techniques. Specifically we examine the problem of given a partially labeled sequence of sets, how well can the missing attributes be inferred. Our study shows this technique significantly improves prediction robustness when even large amounts of data are missing compared to traditional techniques.


Archive | 2005

Effective Attack Models for Shilling Item-Based Collaborative Filtering Systems

Bamshad Mobasher; Robin D. Burke; Runa Bhaumik; Chad Williams

Collaboration


Dive into the Chad Williams's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Runa Bhaumik

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Peter C. Nelson

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Abolfazl Mohammadian

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Sean T. Doherty

Wilfrid Laurier University

View shared research outputs
Top Co-Authors

Avatar

Joshua Auld

University of Illinois at Chicago

View shared research outputs
Top Co-Authors

Avatar

Martina Z. Frignani

University of Illinois at Chicago

View shared research outputs
Researchain Logo
Decentralizing Knowledge