Research article

Propagation of lump-type waves in nonlinear shallow water wave

  • Received: 25 August 2023 Revised: 29 September 2023 Accepted: 16 October 2023 Published: 25 October 2023
  • In this work, a new extended shallow water wave equation in (3+1) dimensions was studied, which represents abundant physical meaning in a nonlinear shallow water wave. We discussed the interaction between a lump wave and a single solitary wave, which is an inelastic collision. Further, the interaction between a lump wave and two solitary waves and the interaction between a lump wave and a periodic wave was also studied using the Hirota bilinear method. Finally, the interaction among lump, periodic and one solitary wave was investigated. The dynamic properties of the obtained results are shown and analyzed by some three-dimensional images.

    Citation: Hong-Yang Guan, Jian-Guo Liu. Propagation of lump-type waves in nonlinear shallow water wave[J]. Mathematical Biosciences and Engineering, 2023, 20(11): 19553-19564. doi: 10.3934/mbe.2023866

    Related Papers:

    [1] Xin Liu, Yingyuan Xiao, Xu Jiao, Wenguang Zheng, Zihao Ling . A novel Kalman Filter based shilling attack detection algorithm. Mathematical Biosciences and Engineering, 2020, 17(2): 1558-1577. doi: 10.3934/mbe.2020081
    [2] Hao Zhang, Lina Ge, Guifen Zhang, Jingwei Fan, Denghui Li, Chenyang Xu . A two-stage intrusion detection method based on light gradient boosting machine and autoencoder. Mathematical Biosciences and Engineering, 2023, 20(4): 6966-6992. doi: 10.3934/mbe.2023301
    [3] Muhammad Hassan Jamal, Muazzam A Khan, Safi Ullah, Mohammed S. Alshehri, Sultan Almakdi, Umer Rashid, Abdulwahab Alazeb, Jawad Ahmad . Multi-step attack detection in industrial networks using a hybrid deep learning architecture. Mathematical Biosciences and Engineering, 2023, 20(8): 13824-13848. doi: 10.3934/mbe.2023615
    [4] Kwabena Owusu-Agyemang, Zhen Qin, Appiah Benjamin, Hu Xiong, Zhiguang Qin . Insuring against the perils in distributed learning: privacy-preserving empirical risk minimization. Mathematical Biosciences and Engineering, 2021, 18(4): 3006-3033. doi: 10.3934/mbe.2021151
    [5] Bingyu Liu, Jiani Hu, Weihong Deng . Attention distraction with gradient sharpening for multi-task adversarial attack. Mathematical Biosciences and Engineering, 2023, 20(8): 13562-13580. doi: 10.3934/mbe.2023605
    [6] Kun Zhai, Qiang Ren, Junli Wang, Chungang Yan . Byzantine-robust federated learning via credibility assessment on non-IID data. Mathematical Biosciences and Engineering, 2022, 19(2): 1659-1676. doi: 10.3934/mbe.2022078
    [7] Kai Su, Xuan Zhang, Qing Liu, Bin Xiao . Strategies of similarity propagation in web service recommender systems. Mathematical Biosciences and Engineering, 2021, 18(1): 530-550. doi: 10.3934/mbe.2021029
    [8] Jin Wang, Liping Wang, Ruiqing Wang . MFFLR-DDoS: An encrypted LR-DDoS attack detection method based on multi-granularity feature fusions in SDN. Mathematical Biosciences and Engineering, 2024, 21(3): 4187-4209. doi: 10.3934/mbe.2024185
    [9] Yu Jin, Zhe Ren, Wenjie Wang, Yulei Zhang, Liang Zhou, Xufeng Yao, Tao Wu . Classification of Alzheimer's disease using robust TabNet neural networks on genetic data. Mathematical Biosciences and Engineering, 2023, 20(5): 8358-8374. doi: 10.3934/mbe.2023366
    [10] Naila Naz, Muazzam A Khan, Suliman A. Alsuhibany, Muhammad Diyan, Zhiyuan Tan, Muhammad Almas Khan, Jawad Ahmad . Ensemble learning-based IDS for sensors telemetry data in IoT networks. Mathematical Biosciences and Engineering, 2022, 19(10): 10550-10580. doi: 10.3934/mbe.2022493
  • In this work, a new extended shallow water wave equation in (3+1) dimensions was studied, which represents abundant physical meaning in a nonlinear shallow water wave. We discussed the interaction between a lump wave and a single solitary wave, which is an inelastic collision. Further, the interaction between a lump wave and two solitary waves and the interaction between a lump wave and a periodic wave was also studied using the Hirota bilinear method. Finally, the interaction among lump, periodic and one solitary wave was investigated. The dynamic properties of the obtained results are shown and analyzed by some three-dimensional images.



    In an age of information overload, the amount of data that far exceeds our processing power has permeated our society. Recommendation systems are one of the most important tools for solving information overload due to their unique technical advantages. In recent years, the application of new machine learning and deep learning techniques [1,2,3] to the recommendation systems has continued to receive attention from many academic researchers. Collaborative filtering [4] recommendation systems (CFRS) help people to make personalized choices while alleviating the problem of information overload. The subject of this paper is a recommendation system based on collaborative filtering techniques. One of the foundations for the implementation of collaborative filtering technology is the user profile file in the rating matrix. There is a positive correlation between the higher order of magnitude of the user profile and the output of the recommendation system [5]. Therefore, this requires the recommendation system to have strong open nature to facilitate different user registration ratings.

    Malicious attackers inject a percentage of fake users into the recommendation system through certain methods, with the ultimate goal of changing the rating of targeted items and gaining illicit financial gain [6]. The above operations can lead to system misclassification, causing the prediction score of the items to change and producing the recommended results expected by the malicious attacker. Past literature has also referred to profile injection attack as shilling attack, this paper takes the latter terminology. Shilling attacks can interfere with the normal output of the recommendation system, or even cause it to crash as a whole. It is important for recommendation systems to perform the task of shilling attack detection in a reasonable and efficient way.

    The attributes of all user profiles in a collaborative filtering recommender system can only be normal or fake users. Derive reasonable features and training high-performance classifiers are of great significance in improving the precision of shilling attack detection. Some past attack detection methods were used to analyze from the perspective of user ratings. But when a malicious attacker employs certain obfuscation techniques, the rating patterns of fake users and normal users will become similar. Some shilling attack detection algorithms that use features extracted from user rating values can cause misclassification for normal users. At the same time, shilling attack detection methods that rely on another single perspective also suffered from low precision problems.

    To counter the disadvantages of past methods, we propose the XGB-SAD model based on a double-view and the mathematical principle of gradient boosting. First, we analyze it from the point of view of user rating time. The time window left for the shilling attacker to complete the attack profile injection is very short due to the time cost. However, the average interval between ratings of two items by normal users is generally not less than the length of an item. The above foundation provides the basis for solving the problem of shilling attack detection from a rating time perspective. Then, we analyze it from the point of view of the way users rating item. In order to eliminate the anomalous effects of user rating values, this paper analyses the problem in terms of the boolean values of the user rating items. Based on the above double-view, we build the TPUS collection. Thirdly, related literature shows that single classifiers are less effective in detecting shilling attacks. To address this limitation, our method uses eXtreme Gradient Boosting to perform heuristic iterative optimization of the model's objective function. Then, we use the idea of ensemble learning to integrate multiple sets of base classifiers into strong classifier. Finally, we perform multi-group experiments. The results demonstrate that XGB-SAD outperforms the comparison methods in terms of small-scale attack detection and overall detection.

    In Section 2, we introduce the background of the paper; In Section 3, we introduce theoretical preparation; In Section 4, we present our approach. In Section 5, we performed an experimental evaluation; In the final section, we present a comprehensive summary of the article and describe future work.

    Malicious attackers inject fake user ratings into the rating matrix to change the target item's recommended frequency. We refer to the above actions of malicious attackers as shilling attack. The attackers will choose different types of shilling attacks depending on the specific operating environment and knowledge base. In the push attack, attacker's ultimate goal is to improve the attack item's recommended frequency. In the nuke attack, attacker's goal is the opposite. Table 1 lists the general forms used in rating matrix and shilling attacks. The user's rating values for items range from 1 to 5, with "0" representing no rating, "1" representing the lowest preference for items and "5" representing the highest preference for items. Taking push attack as an example, suppose the objective of the CFRS is to predict the rating value of user2 to item6. The principle underlying the technical implementation of the CFRS is to predict the rating of unknown items based on the similar nearest neighbours of the user. Before the push attack, the similar nearest neighbor of user2 is user1 and the system's prediction score is 1. The probability that the final recommendation list contains item6 is very low. After the push attack is executed, the malicious attacker injects the attack profiles of attacker14 into the system database. Then, the similar nearest neighbors of user2 will become attacker14 and the prediction score of the recommendation system will become 5. There is a high probability that the system will recommend the item6 to the user2. The attacker has successfully executed the push attack to reverse the system's interest in user2's items.

    Table 1.  The general rating matrix and shilling attack.
    item1 item2 item3 item4 item5 item6
    user1 0 0 4 1 0 1
    user2 2 0 4 1 0 ?
    user3 0 1 2 0 2 0
    user4 0 3 0 0 3 1
    attacker1 2 0 4 1 0 5
    attacker2 2 0 4 1 0 5
    attacker3 2 0 4 1 0 5
    attacker4 2 0 4 1 0 5

     | Show Table
    DownLoad: CSV

    Malicious attackers choose different rating items depending on their purpose. The collection of these ratings and their parameters is called an attack profile. Table 2 shows the specific components used in attack profile. IS is a collection of items selected to be scored according to the specific needs of shilling attackers. In some attack models the IS is not a necessary component. IF refers to the filler items. The purpose of its existence is to more closely match the way real users rate their behaviour. I refers to the collection of blank rating value items. IT refers to the target item. There can only be one target item in this paper.

    Table 2.  The general attack profile.
    IS IF I IT
    iS1 iSk iF1 iFl i1 iv iT1 iTl
    δ(iS1) δ(iSK) σ(iF1) σ(iFl) null null null γ(iT1) γ(iTl)

     | Show Table
    DownLoad: CSV

    Table 3 lists the parameters used in shilling attack models.

    Table 3.  Several common shilling attack models.
    Shilling attack model Push attack/Nuke attack
    Random attack IS=; IF=rran; IT=rmax/IS=; IF=rran; IT=rmin
    Average attack IS=; IF=ravg; IT=rmax/IS=; IF=ravg; IT=rmin
    Bandwagon attack IS=rmax; IF=rran; IT=rmax/IS=rmin; IF=rran; IT=rmin
    Segment attack IS=rmax; IF=rmin; IT=rmax/IS=rmin; IF=rmax; IT=rmin
    Love/Hate attack IS=; IF=rmin; IT=rmax/IS=; IF=rmax; IT=rmin

     | Show Table
    DownLoad: CSV

    ● Random attack: There is no IS in this attack model. The selection of IF and the rating values are random. IT is set to rmax in the push attack.

    ● Average attack: There is no IS in this attack model. The value of IF is set to ravg in the system. The value of IT is set to rmax in the push attack.

    ● Bandwagon attack: The value of Is is set to rmax in this attack model. The IF items in bandwagon attack are selected from the Top-N items in the recommendation system. IT is set to rmax in the push attack.

    The above models are the most widely used and impactful shilling attack models. Correct analysis and detection of the above three attack models are important for our understanding of other attack models.

    The rating matrix is the core data source for collaborative filtering recommendation systems. The user ratings behind the rating matrix represent the rating habits and rating preferences of normal users. The malicious attacker generates the user's rating by constructing a relevant attack model in bulk to simulate it. Items that are of real interest to malicious attackers are known as target item. In various shilling attack models, the target item is rated as an anomalous extreme score (highest or lowest score). However, other items are scored as average or random. Attack detection from the above perspective was the initial thinking of the researchers. The related researchers analyzed the differences between normal users and fake users in terms of user rating values and extracted classification features. The following equations show the mathematical definition of the rating matrix Eq (1) and some key classification features extracted from the user rating values in the rating matrix Eqs (2)–(7).

    Rating matrix

    Definition:

    Ri×j=[u1,u2,u3ui]T (1)

    Rating deviation from mean agreement

    Definition:

    RDMAu=Nui=0|ru,i¯ru.i|NRiNu (2)

    Weighted degree of agreement

    Definition:

    WDAu=nui=0ru,i¯riI2i (3)

    Weighted deviation from mean agreement

    Definition:

    WDMAu=nui=0|ru,iAvgi|NR2iNu (4)

    Mean variance

    Definition:

    MeanVaru=jpu,F(ru,j¯ru)2|Pu,F| (5)

    Filler mean variance

    Definition:

    FMVu=1|UFmu|iUFmu(ru,i¯ri)2 (6)

    Filler mean target difference

    Definition:

    FMTDu=|(iPu,Tru,i|Pu,T|)(kPu,Fru,kPu,F)| (7)

    Among the large group of technologies for recommender systems, CFRS is the most mature, widely implemented and theoretically well-developed technique. The technique of collaborative filtering is based on the following idea: In the rating matrix, the specific set with the most similarities to the target user is generated in a certain way. This user group is used as the basis for predicting the target user's rating value for the unrated items. Then the above results are combined to complete the recommendation to the target user. CFRS have important applications in the business world. It solves the problem of information overload for consumers and significantly reduces the economic costs for both sides of the transaction. However, the existence of shilling attacks seriously hinders the proper functioning of recommendation systems.

    Shilling attackers influence the output of the CFRS by inserting fake users into the rating matrix within the database. The existence of shilling attack poses a serious risk to the security and stability of the CFRS. If not dealt with in a timely manner, the financial interests of both the recommendation service platform and the consumer can be greatly compromised. As a result, research on shilling attacks has received a lot of attention and has become a hot topic in the recommendation systems. A well-designed shilling attack detection method maintains the stability of the overall system and protects the property of both the recommendation system service provider and the consumer. Based on the different perspectives and concepts involved, a variety of detection algorithms have been designed by those involved. There are three main research directions for attack detection algorithms.

    In the supervised learning, Chirita et al. [7] were among the first researchers to focus on shilling attacks. They first proposed the RDMA attribute and used it as the basis for a shilling attack detection algorithm. These pioneering studies provided a good basis for subsequent researchers. Burke et al. [8] extracted these detection features from the user profile and then combined them with the KNN algorithm model to perform the task of attack detection. Williams et al. [9] proposed several detection features and combine them with several machine learning algorithms. Specifically, the SVM has the best overall results. Tang et al. [10] proposed three detection factors based on rating interval as a basis for the task of shilling attack detection. Xia et al. [11] used the slope and first order derivative of the time series rating values to dynamically divide the time interval as a way to detect anomalous rating items. The above methods for identifying anomalous users or anomalous items based on rating time are mainly used to detect a large number of attacks with concentrated rating time, but the above methods are not effective for attacks with decentralized injection. Yang et al. [12] proposed three new detection features based on rating fill rate. Combining 15 existing detection features such as WDA and RDMA, the Re-scale AdaBoost algorithm is used to detect malicious users. Wu et al. [13] selected the features that work best for a specific attack type from many shilling attack features as detection features by means of feature selection for different shilling attack types. They also proposed two detection methods based on classical machine learning algorithms. Li et al. [14] proposed a method. The method uses statistical analysis of item popularity, which in turn reveals the difference in popularity distribution between fake and normal users. In the semi-supervised learning methods, Wu et al. [15] used an expectation max method to filter the rating features proposed by Williams. The method is effective in improving the detection accuracy due to the use of a more efficient subset of features. In the unsupervised learning approach, Mehta et al. [16] proposed unsupervised learning methods PCA-SelectUsers to detect malicious fake users. More importantly, this detection method requires certain information to be obtained in advance, such as the specific size of the attack, in order to intercept the attack situation based on a ranked list of principal components. Yang et al. [17] constructed an unprivileged user relationship graph, used graph mining methods to calculate user similarity, and used a clustering algorithm to detect some suspicious users. Finally, the attacking users were further screened based on target item analysis. This threshold value is difficult to determine in practical applications.

    Malicious shilling attackers change the system recommendation frequency of target item with the aim of increasing their illegal financial interests. Because of the specific implementation principle of collaborative filtering technology, this malicious change can only be accomplished if the shilling attacks reach a certain size. The time cost of the shilling attacker makes the difference between the injected fake user and the normal user. Therefore, the number of ratings of the attack profile increases significantly in a relative unit of time. The shilling attack on recommendation systems is a short-term utilitarian act. This short-term behaviour is extremely evident in the rating intervals. The relative rating time interval for a normal user of an item is not less than the length of a movie. However, the relative rating interval [18] for a malicious shilling attacker will be significantly less than that of a normal user. Unlike normal users, the purpose of the shilling attacker is to gain illegal financial interests. Therefore, the economic cost is an important consideration for the attacker. The cost of time can have a very significant impact on the expected economic benefit of a malicious attacker, which is why there is a difference in the user rating time [19] of the fake user and the normal user. On the basis of the above, we have defined A Eq (8), B Eq (9) and C Eq (10). TPUS-1 in the TPUS set is defined in Eq (11).

    A. Collection of user rating time (UTC)

    Definition: The elements in the set are the timestamps of the user's rating items, sorted in descending order. That is, the higher the serial number of the element, the closer the element's rating time is to the current time. (u refers to a particular user and n refers to the n items rated by this user)

    UTCu={t1,t2,,tn} (8)

    B. Maximum interval of user rating time (UTM)

    Definition: UTM is the subtraction of the first and last element values in the user's UTC set. (n refers to elements in the user's UTC)

    UTMu=UTCnUTC1 (9)

    C. Aggregation index of user rating time (IUT)

    Definition: IUT refers to the ratio of the user's UTM value to the total number of rated items Nu.(u refers to a particular user)

    IUTu=UTMuNu (10)

    TPUS1: Relative aggregation index of user rating time (RIUT)

    Definition: RIUT is the first component of the TPUS collection and is used to describe the relative degree of aggregation of rating time. ¯UTM is the average of the UTM values of the users within the database and ¯N is the average of all user's rated items.

    TPUS1=RIUTu=|UTMu¯UTM||Nu¯N| (11)

    Past methods have mostly analysed the rating matrix from the single perspective of user rating values. However, there are a number of problems with the above methods. When recommendation system information is obtained through public or semi-public channels, a malicious attacker will use the above basis and various obfuscation techniques to design an attack model. The attack profile generated on the basis of this attack model will be very similar to the normal user's rating value habits. As a result, such shilling attack detection methods based on rating values can misjudge normal and fake users, affecting the accuracy of the detection algorithm. In order to eliminate the anomalous effects of user rating values, this paper analyses the problem from the user rating items.

    In the rating matrix of a recommendation system, users select items based on preference and assign them different rating values. In this paper, we are not concerned with the specific rating values of the users, so we booleanize the users' rating values. The URB is defined in Eq (12). URB only cares if the user has a rating for the item, reducing the potential negative impact of obfuscation techniques on the rating value. The user rating matrix is transformed using Eq (12) to convert the original user rating values to Boolean values, and the transformed rating matrix is called the URB matrix. In the URB matrix, "1" indicates that the user has a rating action for the item and "0" indicates that the user does not have any rating action. Based on the user's URB value, we define the user's TCIB value in Eq (13). For an item in the URB matrix, TCIB calculates the sum of all non-zero URB values for the column in which the item is located. The TCIB value for each item represents how many times the item has been rated and how well it has been accepted. On the basis of the above, we have defined F Eq (14), TPUS-2 Eq (15) and TPUS-3 Eq (16).

    D. Boolean values of user rating (URB)

    Definition: To eliminate the effect of user rating values, definition URB booleans the user's rating values. Rij represents the rating value of useri to itemj in the rating matrix Rm×n. The specific definitions are as follows:

    URBij={0,Rij=01,Rij0 (12)

    E. The coefficient of item boolean (TCIB)

    Definition: TCIB is the sum of the URB values of all users in the column in which the item is located in a rating matrix (RNF) that does not contain fake user. The TCIB value for j is defined as follows.

    TCIBj=ni=1URBij (13)

    F. The set of user rating boolean item (UBS)

    Definition: Among user's rating items, if an item has a TCIB value not equal to "0", it is placed in the UBS collection. The elements in the set are arranged in ascending order. The user's UBS is defined as follows.

    UBSu={TCIB1,TCIB2,,TCIBk}={UBS1,UBS2,,UBSk} (14)

    TPUS2: Mean Index of User boolean (MIUB)

    Definition: In the user's UBS collection, the elements in the collection are first summed in order from the beginning to the end. The ratio of the summed value to the total number of users in the set is defined as TPUS2.

    TPUS2=MIUBu=1nni=1UBSi (15)

    TPUS3: Sub-Range Index of User boolean (RIUB)

    Definition: In the UBS collection of user u, subtract the value of the penultimate element from the value of the second element in the collection. n refers to the maximum number of elements in the UBS set.

    TPUS3=RIUBu=1n(UBS2UBS2) (16)

    Ensemble learning refers to a theoretical idea in which multiple base classifier models are combined with the ultimate goal of obtaining a more comprehensive model. Ensemble learning is based on the idea that even if a few weak base classifiers output incorrect predictions, most of the other base classifiers can correct the bias so that the model outputs the correct results. Compared to methods using only a single classifier, ensemble learning methods can continually minimize the error of the base classifier and output a more comprehensive and robust model. There are four common integration learning methods, namely boosting, bagging, stacking and blending. This paper focuses on the first type of method. Boosting is an important branch of ensemble learning. Specifically, each iteration of the boosting model is accompanied by the generation of a new classifier that focuses on the parts that were in error during the previous iteration. The new classifier generated by the boosting model is combined with the classifier from the previous iteration, and the process is repeated to achieve the desired learning goal and result in a more robust classifier model.

    Gradient boosting is one of a large group of boosting algorithms that can be used in machine learning for regression, classification and sorting tasks. The basic principle is as follows: the negative gradient of the loss function in the current mathematical model is first calculated and used as the basis for training the next newly added weak classifier. The trained weak classifiers are then continuously accumulated into the existing model. Gradient boosting often chooses a decision tree (usually a CART tree) as the base learner, a method known as GBDT. There are many advantages of GBDT, such as robustness of the model, high accuracy, ability to handle non-linear data, etc.

    eXtreme Gradient Boosting [20] is a specific implementation of GBDT and improves and enhances it in many ways. Since its invention, the XGBoost algorithm framework has boasted excellent performance (e.g. high accuracy rate, wide applicability, etc.) in various machine learning competitions and has gradually gained the attention of related researchers. Essentially, the idea of the XGBoost algorithm framework is ensemble learning, which is an advanced and improved version of the GBDT algorithm. The XGBoost makes important improvements to the GBDT algorithm in several ways, the most important of which is the improvement of the loss function of the GBDT algorithm. XGBoost has a number of advantages over GBDT, such as a second-order Taylor expansion of the loss function, the addition of a regular term, reduced model complexity, etc.

    eXtreme Gradient Boosting uses a heuristic algorithm to optimize the objective function in a step-by-step sequence. Figure 1 illustrates the framework of general flow framework for optimizing the XGBoost mathematical model. During this process, a new function is added to the new mathematical model each time based on the original mathematical model, and the optimal result is gradually achieved by iterations.

    Figure 1.  The general framework for the optimization of XGBoost mathematical model.

    In the following, we describe in detail the variables and parameters involved in Figure 1.

    The mathematical model of XGBoost is shown in Eq (17) below. (xi,yi) is the constituent element in the specified dataset E={(xi,yi)}. f(x) represents a specific cart tree model. Γ is the hypothesis space consisting of all base classifiers Cart Tree (Classification), defined as shown in Eq (18) below.

    φ(xi)=ˆy=Kk=1fk(xi),fkΓ (17)
    Γ={f(x)=wq(x)}(q:RmT,wRT) (18)

    The following Eq (19) represents the objective function of the model waiting to be optimized, which has two components. The first part represents the training error of the model. The second part is the regularization term, representing the sum of the complexity of all the trees. The definition of the regularization term of the objective function is shown in Eq (20) below.

    L(φ)=iι(ˆyi,yi)+kΩ(fk) (19)
    Ω(f)=γT+12λw2 (20)

    The following second-order Taylor expansion transformation is applied to the error function. In Eq (21), the prediction of the model after the tth iteration has two components, the previous (t-1) model prediction and the prediction of the t-tree. The objective function can be rewritten as the following Eq (22) below.

    ˆy(t)i=ˆy(t1)i+fi(xi) (21)
    L(t)=ni=1l(yi,ˆy(t1)i+ft(xi))+Ω(ft) (22)

    The model needs to calculate the learning is the tree ft. Changing Eq (21) into (23), gi and hi are defined in Eq (24) below.

    L(t)ni=1[l(yi,ˆy(t1))+gift(xi)+12hif2t(xi)]+Ω(ft) (23)
    gi=ˆy(t1)l(yi,ˆy(t1))hi=2ˆy(t1)l(yi,ˆy(t1)) (24)

    Removing the constant term from Eq (23) gives Eq (25) below.

    ˜L(t)=ni=1[gift(xi)+12hif2t(xi)]+Ω(ft) (25)

    Take the content of the following Eqs (26) and (27) into the (25) objective function

    fk(x)=wq(x),wRK,q:RK{1,2,,K} (26)
    Ω(f)=γT+12λw2 (27)

    The following equation is obtained.

    ˜L(t)=ni=1[giwq(xi)+12hiw2q(xi)]+γT+λ12Tj=1w2j (28)

    Defining the set of samples on each leaf node j as Ij={iq(xi)=j}. The objective function (28) can be rewritten in the cumulative form of the leaf nodes as Eqs (29) and (30) below.

    ˜L(t)=Tj=1[(iIjgi)wj+12(iIjhi+λ)w2j]+γT (29)
    ˜L(t)=Tj=1[Gjwj+12(Hj+λ)w2j]+γT (30)

    If q(x) has been determined (the structure of the tree has been determined), then the most predictive score for each leaf node can be found. The objective function is later minimised by making its derivative zero, as defined in Eq (31) below.

    wj=GjHj+λ (31)

    After substitution into the objective function, the final optimization result can be obtained, as defined in Eq (32) below.

    ˜L=12Tj=1G2jHj+λ+γT (32)

    The XGB-SAD attack detection model can be seen as a four-stage process. Figure 2 illustrates the basic framework of the ensemble detection method XGB-SAD. Module 1 is the stage where the fake user is generated using the relevant parameters and the shilling attack model. The normal users are mixed with fake users into a rating matrix which is used as input for subsequent modules. Module 2 is the stage where the analysis rating matrix is processed using a double-view. We analyzed user rating time and the prevalence of user rating items, based on which we obtained the TPUS and UFM (user feature matrix). Module 3 is the stage where the set of base classifiers is generated and the model is constructed. The mathematical principle of gradient boosting is used to complete the iterative optimization of the objective function and loss function. Module 4 is the stage where the classification of malicious fake users is completed using the integrated strong classifier.

    Figure 2.  The framework of ensemble detection model XGB-SAD.

    In Module 1, the parameters related to the shilling attack are as follows: attack size, fill size, and attack model. In this stage, we do some basic processing of the dataset in preparation for the subsequent modules. We first took some of the users from the original dataset as the data for the subsequent training set. Table 3 lists the parameters used in shilling attack models. The dataset was attacked using the attack model in Table 3 to generate the dataset required for the experiment. The set of fake users and normal users are mixed into one rating matrix. Finally, this rating matrix is used as input to subsequent modules.

    In Module 2, we will analyse and process the rating matrix. Table 4 lists the TPUS-PRE algorithm used in data pre-processing. In order to solve the problem that past methods mostly used a single angle to analyse the rating matrix, we combined the double-view perspective in the TPUS-PRE algorithm. The underlying idea of the TPUS-PRE algorithm is to use double-view to analyse the rating matrix.

    Table 4.  The algorithm of double-view data pre-processing (TPUS-PRE).
    Input: TRS (Train-Set), I (collection of items), U (collection of users), N (collection of normal users)
    Output: UFM (user feature matrix)
    Begin
    1 For each iTRS.I do
    2  For each uTRS.N do
    3    Calculate definitions A, B and C according to Eqs (8)–(10) respectively
    4    Calculate definitions D, E and F according to Eqs (12)–(14) respectively
    5  End For
    6 End For
    7 For each uTRS.U do
    8  Vt{TPUS1}
    9  Vb{TPUS2,TPUS3}
    10  VuVbVt
    11 End For
    12 UFMVu
    13 Return UFM
    End

     | Show Table
    DownLoad: CSV

    The TPUS-PRE algorithm has four inputs, TRS, I, U and N. In Sections 3.1 and 3.2, we have analysed and defined TPUS collection based on the user's time and the user rating item. The TPUS-PRE algorithm calculates benchmark definitions A, B and C in the training set based on Eqs (8)–(10), followed by benchmark definitions D, E and F based on Eqs (12)–(14). Construct a matrix Vt consisting of TPUS1 and a matrix Vb consisting of TPUS2 and TPUS3. Then, combine Vb and Vt and assign the value to Vu. The final output of the algorithm is the UFM (user feature matrix). The role of the TPUS-PRE algorithm in the detection framework is to perform further processing of the rating matrix, which is provided as output to subsequent modules.

    In Module 3, we will use the mathematical principles of eXtreme gradient boosting to construct the set of base classifiers. Table 5 lists the algorithms that use the training-set to generate the base classifier (named GCTS). The underlying idea of the GCTS algorithm uses the mathematical principle of extreme gradient boosting to construct each subtree and base classifier set. To address the problems that existed in past detection methods that mostly used a single classifier to handle attack detection, this paper considers the use of a collection of base classifiers in CGTS. We divide the training set into k subsets and use this as the basis for generating k base classifiers (Cart tree). The GCTS algorithm has four inputs, including number of iterations, train-set, base classifier cart tree and type label set. The final output of the algorithm is the base classifier set (Cart Tree Set).

    Table 5.  The algorithm for generating base classifiers set (GCTS).
    Input: NT (Number of iterations), TRS (Training-Set), CT (base classifier-Cart Tree), TLS (Type Label Set)
    Output: CTS (Cart Tree Set)
    Begin
    1 Using the TPUS-PRE algorithm in Table3, with TRS as input
    2 TRVuUFM
    3 Initialize CTS and optimization model
    4 Create mathematical model based on TRS and Eq (17)
    5 {fi(x)CTS}NULL
    6 For i = 1 to NT do
    7  L(φ)TRVu (Obtain objective function L(φ) by Eq (19) and TRV)
    8  Calculate the parameters after the second order Taylor expansion by using Eq (24)
    9  Obtain i base classifier CT subtree fi(x) according Eq (26)
    10  Optimization of loss functions for mathematical model according to Eq (32)
    11  CTS CTS {fi(x)} (Merge the trained fi(x) into CTS)
    12 End For
    13 Return CTS
    End

     | Show Table
    DownLoad: CSV

    After the start of the GCTS algorithm, we first use the TPUS-PRE algorithm in Table 4, with TRS as input. Then, we initialize the CTS set to the empty set. The mathematical model for XGBoost is given in Eqs (17)–(32) in Section 3.3, along with how to optimize the mathematical model and the loss function. The objective function is optimized using Eq (32) in Section 3.3. In each iteration, the objective function is first calculated according to Eq (19). Calculate gi and hi as parameter variables in the subsequent optimization process. Calculate fi(x) using Eq (26). After minimizing the objective function and loss function, fi(x) is incorporated into the CTS set. Execute the for loop repeatedly until N is reached. The result of the GCTS algorithm is a CTS. The role of the GCTS algorithm in the overall detection framework is to construct the set of base classifiers and prepare the predictions of subsequent base classifiers for combination.

    In Module 4, we use the TPUS-PRE and the GCTS to construct the attack detection algorithm. Table 6 lists the algorithms used for shilling attack detection (called XGB-SAD). Two disadvantages of some past methods are that they only analyze the rating matrix from a single perspective of the user's rating value, ignoring other perspectives about the user. The other is that some methods use only a single classifier to handle the classification of malicious attackers. In the meantime, we have introduced the TPUS-PRE and GCTS algorithms. So based on the above foundation and in order to deal with the above problem in a reasonable way, the underlying idea of the XGB-SAD algorithm is to use UFM and CTS to combine the predictions of all the base classifiers to obtain a strong learner.

    Table 6.  The algorithm of shilling attack detection (XGB-SAD).
    Input: TES (Test-Set), CTS (base classifiers set - Cart Tree Set), TLS (Type Label Set), THR (Threshold)
    Output: ULS (user label set)
    Begin
    1 Using the TPUS-PRE algorithm in Table3, with TES as input
    2 TEVuUFM
    3 For each u TEVu do
    4  THRINI (Initialization Threshold)
    5  For each fkCTS do
    6    fkTEVu (Prediction detection of the test-set with the trained base classifier)
    7    preipreCTSk(u) (Predicted results for the combined user u)
    8    p(u)prek
    9  End For
    10 RES(u)COM(p(u)) (Prediction results of the combined base classifier cart tree for each sample)
    11 TLS(u)RES(u)THR (Final category is determined by a combination of thresholds and res.)
    12 End For
    13 TLSrTLSr{TLS(u)}
    14 ULSTLSr
    15 Return ULS
    End

     | Show Table
    DownLoad: CSV

    There are four inputs to the XGB-SAD, namely TES, CTS, TLS and THR. First, the algorithm takes the TES as input, calls the TPUS-PRE algorithm in Table 4, gets the output and assigns it to Vu. In a double loop, initializing threshold THR and using TEVu for the prediction of classifier fk. After the predicted resultspreCTSi(u) are obtained, the predicted for each user p(u) are combined. At this point, the inner for loop is ended. Combining the prediction results and threshold THR of the base classifier (cart tree) for user u, the category TLS(u) of user u is determined. At this point, the outer for loop is terminated. Merge TLS(u) with TLSr and assign the merged result to ULS. The final output of the XGB-SAD algorithm is user label set (ULS). At the end of the XGB-SAD algorithm, the set of categories of normal user and fake user in Figure 2 is obtained.

    This subsection first describes the pre-experimental preparations, including the experimental dataset, attack size, filler size, attack model and comparison algorithms. The proposed method can be used for datasets (Netflix, Amazon, MovieLens, etc.) with various numbers of users and data sparsity. For the purpose of our study, the following dataset were extracted from Movielens-100k [21]. The Movielens-100k contains detailed rating information for 1682 items from 943 users. The user's rating values for items range from "1" to "5", with "0" representing no rating, "1" representing the lowest preference for items and "5" representing the highest preference for items. Table 7 illustrates the user-item rating matrix after simple processing of the Movielens-100k dataset.

    Table 7.  The rating matrix of Movielens-100k dataset.
    item1 item2 item3 item4 item1682
    user1 5 3 4 3 0
    user2 4 0 0 0 0
    user3 0 0 0 0 0
    user4 0 0 0 0 0
    user943 0 5 0 0 0

     | Show Table
    DownLoad: CSV

    The key parameters used in the experiments are presented in the following Eqs (33) and (34). In Eq (33), N refers to the quantity and the ratio of Nattckuser to Nu in the system database refers to the attack size. In Eq (34), N refers to the quantity. In an attack profile, the ratio of NIF to Nitem in the system refers to the filler size.

    Atacksize=NattackuserNu (33)
    Fillersize=NIFNitem (34)

    The three comparison methods used in the experiments were PCA [16], Semi [22], and BAY [23]. PCA-SAD is a method that uses the unsupervised learning method PCA-SelectUsers to detect malicious fake users. Semi-SAD is a semi-supervised learning method. BAY-SAD combines multiple sets of base classifiers and uses the combined output to detect shilling attack.

    This section lists several evaluation metrics used in this experiment to evaluate the performance of methods. Precision Eq (35) indicates the percentage of the sample with positive predicted outcomes that also had positive true cases. Recall Eq (36) indicates the percentage of all samples with positive true cases that also have a positive predicted outcome. F1-Measure Eq (37) is a weighted average of precision and recall, reflecting the comprehensive effect of the model.

    Precision=TPTP+FP (35)
    Recall=TPTP+FN (36)
    F1Measure=2PrecisionRecallPrecision+Recall (37)

    This subsection tests the evaluation metrics of the XGB-SAD under the attack models with the experimental parameters of filler size (3, 7, 10 and 15%) and attack size (3, 5, 7, 10, 12 and 15%). Figures 35 show the performance of our method for three attack models with the filler size fixed at 10%.

    Figure 3.  Precision of the three attack models when filler size is 10%.
    Figure 4.  Recall of the three attack models when filler size is 10%.
    Figure 5.  F1-Measure of the three attack models when filler size is 10%.

    The Figure 3 below illustrates an overview of the variation in precision values. What can be clearly seen in this figure is that the precision value of the algorithm keeps improving and remains above approximately 0.9. When the attack size is small, the precision values under bandwagon attack are relatively low compared to random and average attack. As the experiments continued to increase the attack size, the precision of the algorithm gradually improves and remains at a high level.

    The Figure 4 below illustrates an overview of the variation in recall values. When the size of the attack is small, the recall value of the algorithm under the random attack model is relatively low. The detection of the method under the random attack model is relatively poor compared to the other two models.

    The Figure 5 below shows the trend of F1 values under three attack model. What can be clearly seen in this figure is that the F1 value of the method keeps improving and remains above approximately 0.94. When the attack size is small, the F1-measure under the bandwagon attack model is relatively low. As the value of the attack size increases, the F1-Measure under the three attack models gradually increase and reach the same value. The F1 value represents the comprehensive detection effect of a model. So based on the experiments in Figure 5, we can conclude the following. The comprehensive detection effectiveness of the algorithm is better under average attack.

    In the above section, several sets of experiments were carried out and the results were summarized and analyzed. These experiments confirm the relatively good detection performance of our method even when the size of the attack is small. At the same time, the overall detection effectiveness of our approach can be maintained at a relatively high level in the face of three different attack models.

    This section tests the performance of several comparison algorithms under the attack models with the experimental parameters of filler size (3, 7, 10 and 15%) and attack size (3, 5, 7, 10, 12 and 15%). For a clear analysis of the experimental results, we have divided the following figures of the experimental data into two parts with filler sizes fixed at 3 and 10%. Figures 68 show one set of comparative experiments and Figures 911 show another.

    Figure 6.  Performance of different methods for random attack when fill size is 3%.
    Figure 7.  Performance of different methods for average attack when the fill size is 3%.
    Figure 8.  Performance of different methods for bandwagon attack when fill size is 3%.
    Figure 9.  Performance of different methods for random attack when filler size is 10%.
    Figure 10.  Performance of different methods for average attack when filler size is 10%.
    Figure 11.  Performance of different methods for Bandwagon Attack when filler size is 10%.

    1) When the fill size is fixed at 3%, the experimental results are as follows.

    Figure 6 illustrates the F1 values for several methods under the random attack model. When the size of the attack is small, the F1 value of the XGB-SAD method is higher than the other methods, which indicates that the detection effectiveness of our method is better at this time. With the increase in attack size, the curve of BAY-SAD shows a small fluctuation, while the F1 values of all other methods are steadily increasing. It can be seen that the XGB-SAD method is more effective in detecting random attack.

    The Figure 7 below illustrates the F1 values for several methods under average attack model. When the size of the attack is small, the F1 value of the XGB-SAD method is higher than the other methods. However, the F1 value of the BAY-SAD method is lower, which indicates that the BAY-SAD method is less effective in attack detection at this time under the average attack. With the increase in attack size, the curve of BAY-ASD and Semi-SAD show small fluctuations, while the F1 values of the other methods gradually increase converging to the same. As can be seen from the Figure 7, our approach is more effective in terms of the size of small-scale attacks and overall detection effectiveness.

    Figure 8 illustrates the F1 values for several methods under bandwagon attack model. When the size of the attack is small, the F1 are lower for the BAY-SAD method. From the graph above we can see that the bandwagon attack model has added selected items compared to the above two basic attack models, which affects the detection performance of the method.

    2) When the filler size is fixed at 10%, the experimental results are as follows.

    The Figure 9 below illustrates the F1 values for several methods under the random attack model. When the size of the attack is small, the F1 value of the XGB-SAD method is higher than the other methods. With the increase in attack size, the curve of BAY-SAD shows a small fluctuation, while the F1 values of all other methods are steadily increasing. It can be seen that the XGB-SAD method is more effective in terms of the size of small attack size and overall detection effectiveness.

    Figure 10 illustrates the F1 values for several methods under the average attack. When the size of the attack is small, the F1 values are higher for the XGB-SAD method and lower for the BAY-SAD method. With the increase in attack size, the curve of Semi-SAD shows small fluctuations, while the F1 values of the other methods gradually increase converging to the same. From the figure below we can see that the XGB-SAD method is more effective in detecting average attack.

    The Figure 11 shows the F1 values for Comparison algorithms under bandwagon attack model. When the size of the attack is small, the F1 value of the XGB-SAD method is higher than the other methods. With the increase in attack size, the curve of BAY-SAD shows small fluctuations. As shown in figure below, the XGB-SAD method is more effective in detecting bandwagon attack.

    To counter the security threat posed by the shilling attack, many detection methods are proposed. The XGB-SAD improves on the limitations of past methods that mainly used a single view and a single classifier to analyze the user rating values. Our method analyzes the rating matrix using a doubleview of user rating time and user rating item, which in turn defines the TPUS collection. Then we perform heuristic iterative optimization of the model's objective function using eXtreme gradient boosting and integrate multiple sets of base classifiers into a strong classifier using the idea of ensemble learning. Finally, the strong classifier generated in the previous stage are used to complete the identification and detection of malicious shilling attackers. The experimental results show that XGB-SAD outperforms the comparison methods in terms of overall detection and detection precision and at small attack size.

    In the future, our research has two directions, the first of which is the combination of external variables and high-performance classifiers with different settings base classifiers in our approach. Another is that although our method can theoretically be extended to other datasets, balancing the sparsity of different datasets and improving the generalizability of the method in the face of sophisticated attack models remains a key concern.

    This work is supported by the University Nursing Program for Young Scholars with Creative Talents in Heilongjiang Province (No. UNPYSCT-2018208).

    The authors declared that they have no conflicts of interest to this work. We declared that we do not have any commercial or associative interest that represents a conflict of interest in connection with the work submitted.



    [1] W. X. Ma, Lump solutions to the Kadomtsev-Petviashvili equation, Phys. Lett. A, 379 (2015), 1975–1978. https://doi.org/10.1016/j.physleta.2015.06.061 doi: 10.1016/j.physleta.2015.06.061
    [2] W. X. Ma, Y. Zhou, Lump solutions to nonlinear partial differential equations via Hirota bilinear forms, J. Differ. Equations, 264 (2018), 2633–2659. https://doi.org/10.1016/j.jde.2017.10.033 doi: 10.1016/j.jde.2017.10.033
    [3] Y. Sun, B. Tian, L. Liu, H. P. Chai, Y. Q. Yuan, Rogue waves and lump solitons of the (3+ 1)-dimensional generalized B-type Kadomtsev–Petviashvili equation for water waves, Commun. Theor. Phys., 68 (2017), 693–700. https://doi.org/10.1142/S0217984917501226 doi: 10.1142/S0217984917501226
    [4] M. Wang, B, Tian, S. H. Liu, W. R. Shan, Y. Jiang, Soliton, multiple-lump and hybrid solutions of a (2+1)-dimensional generalized Hirota-Satsuma-Ito equation for the water waves, Eur. Phys. J. Plus, 136 (2021), 635. https://doi.org/10.1140/epjp/s13360-021-01588-5 doi: 10.1140/epjp/s13360-021-01588-5
    [5] H. Yin, B. Tian, X. Zhao, C. R. Zhang, C. C. Hu, Breather-like solitons, rogue waves, quasi-periodic/chaotic states for the surface elevation of water waves, Nonlinear Dyn., 97 (2019), 21–31. https://doi.org/10.1007/s11071-019-04904-y doi: 10.1007/s11071-019-04904-y
    [6] X. Lü, W. X. Ma, S. T. Chen, M. K. Chaudry, A note on rational solutions to a Hirota-Satsuma-like equation, Appl. Math. Lett., 58 (2016), 13–18. https://doi.org/10.1016/j.aml.2015.12.019 doi: 10.1016/j.aml.2015.12.019
    [7] S. J. Chen, X. Lü, M. G. Li, F. Wang, Derivation and simulation of the M-lump solutions to two (2+1)-dimensional nonlinear equations. Phys. Scr., 96 (2021), 095201. https://doi.org/10.1088/1402-4896/abf307
    [8] X. Lü, S. J. Chen, Interaction solutions to nonlinear partial differential equations via Hirota bilinear forms: one-lump-multi-stripe and one-lump-multi-soliton types, Nonlinear Dyn., 103 (2021), 947–977. https://doi.org/10.1007/s11071-020-06068-6 doi: 10.1007/s11071-020-06068-6
    [9] J. Rao, K. W. Chow, D. Mihalache, J. He, Completely resonant collision of lumps and line solitons in the Kadomtsev-Petviashvili I equation, Stud. Appl. Math., 147 (2021), 1007–1035. https://doi.org/10.1111/sapm.12417 doi: 10.1111/sapm.12417
    [10] Y. Jiang, J. Rao, D. Mihalache, J. He, Y. Cheng, Rogue breathers and rogue lumps on a background of dark line solitons for the Maccari system, Commun. Nonlin. Sci. Numer. Simul., 102 (2021), 105943. https://doi.org/10.1016/j.cnsns.2021.105943 doi: 10.1016/j.cnsns.2021.105943
    [11] Y. L. Cao, Y. Cheng, J. S. He, Y. R. Chen, High-order breather, M-kink lump and semi-rational solutions of potential Kadomtsev-Petviashvili equation, Commun. Theor. Phys., 73 (2021), 035004. https://doi.org/10.1088/1572-9494/abdaa6 doi: 10.1088/1572-9494/abdaa6
    [12] H. T. Wang, X. Y. Wen, Modulational instability and mixed breather-lump interaction solutions in the (2+1)-dimensional KMN equation, Mod. Phys. Lett. B, 34 (2020), 2050092. https://doi.org/10.1142/S021798492050092X doi: 10.1142/S021798492050092X
    [13] Y. Q. Liu, X. Y. Wen, Soliton, breather, lump and their interaction solutions of the (2 +1)-dimensional asymmetrical Nizhnik-Novikov-Veselov equation, Adv. Differ. Equations, 1 (2019), 332. https://doi.org/10.1186/s13662-019-2271-5 doi: 10.1186/s13662-019-2271-5
    [14] Y. Q. Liu, X. Y. Wen, D. S. Wang, Novel interaction phenomena of localized waves in the generalized (3+1)-dimensional KP equation, Comput. Math. Appl., 78 (2019), 1–19. https://doi.org/10.1016/j.camwa.2019.03.005 doi: 10.1016/j.camwa.2019.03.005
    [15] J. J. Su, S. Zhang, Nth-order rogue waves for the AB system via the determinants, Appl. Math. Lett., 112 (2021), 06714. https://doi.org/10.1016/j.aml.2020.106714 doi: 10.1016/j.aml.2020.106714
    [16] J. J. Su, G. F. Deng, Quasi-periodic waves and irregular solitary waves of the AB system, Waves Random Complex Medium, 32 (2022), 856–866. https://doi.org/10.1080/17455030.2020.1804091 doi: 10.1080/17455030.2020.1804091
    [17] J. J. Su, Y. T. Gao, G. F. Deng, T. T. Jia, Solitary waves, breathers, and rogue waves modulated by long waves for a model of a baroclinic shear flow, Phys. Rev. E, 100 (2019), 042210. https://doi.org/10.1103/PhysRevE.100.042210 doi: 10.1103/PhysRevE.100.042210
    [18] R. F. Zhang, M. C. Li, M. Albishari, F. C. Zheng, Z. Z. Lan, Generalized lump solutions, classical lump solutions and rogue waves of the (2+1)-dimensional Caudrey-Dodd-Gibbon-Kotera-Sawada-like equation, Appl. Math. Comput., 403 (2021), 126201. https://doi.org/10.1016/j.amc.2021.126201 doi: 10.1016/j.amc.2021.126201
    [19] Z. Z. Lan, J. J. Su, Solitary and rogue waves with controllable backgrounds for the non-autonomous generalized AB system, Nonlinear Dyn., 96 (2019), 2535–2546. https://doi.org/10.1007/s11071-019-04939-1 doi: 10.1007/s11071-019-04939-1
    [20] Z. Z. Lan, Periodic, breather and rogue wave solutions for a generalized (3+1)-dimensional variable-coefficient B-type Kadomtsev-Petviashvili equation in fluid dynamics, Appl. Math. Lett., 94 (2019), 126–132. https://doi.org/10.1016/j.aml.2018.12.005 doi: 10.1016/j.aml.2018.12.005
    [21] Z. L. Zhao, Y. Chen, B. Han, Lump soliton, mixed lump stripe and periodic lump solutions of a (2+1)-dimensional asymmetrical Nizhnik-Novikov-Veselov equation, Mod. Phys. Lett. B, 31 (2017), 1750157. https://doi.org/10.1142/S0217984917501573 doi: 10.1142/S0217984917501573
    [22] Y. F. Yue, Y. Chen, Dynamics of localized waves in a (3+1)-dimensional nonlinear evolution equation, Mod. Phys. Lett. B, 33 (2019), 1950101. https://doi.org/10.1142/S021798491950101X doi: 10.1142/S021798491950101X
    [23] X. L. Tang, Y. Chen, Lumps, breathers, rogue waves and interaction solutions to a (3+1)-dimensional Kudryashov-Sinelshchikov equation, Mod. Phys. Lett. B, 34 (2020), 2050117. https://doi.org/10.1142/S0217984920501171 doi: 10.1142/S0217984920501171
    [24] B. Q. Li, Y. L. Ma, Hybrid soliton and breather waves, solution molecules and breather molecules of a (3+1)-dimensional Geng equation, Phys. Lett. A, 463 (2023), 128672. https://doi.org/10.1016/j.physleta.2023.128672 doi: 10.1016/j.physleta.2023.128672
    [25] B. Q. Li, Y. L. Ma, Breather, soliton molecules, soliton fusions and fissions, and lump wave of the Caudrey-Dodd-Gibbon equation, Phys. Scr., 98 (2023), 095214. https://doi.org/10.1088/1402-4896/aceb25 doi: 10.1088/1402-4896/aceb25
    [26] B. Q. Li, Loop-like kink breather and its transition phenomena for the Vakhnenko equation arising from high-frequency wave propagation in electromagnetic physics, Appl. Math. Lett., 112 (2021), 106822. https://doi.org/10.1016/j.aml.2020.106822 doi: 10.1016/j.aml.2020.106822
    [27] Y. L. Ma, B. Q. Li, Interaction behaviors between solitons, breathers and their hybrid forms for a short pulse equation, Qual. Theory Dyn. Syst., 22 (2023), 146. https://doi.org/10.1007/s12346-023-00844-6 doi: 10.1007/s12346-023-00844-6
    [28] Y. L. Ma, A. M. Wazwaz, B. Q. Li, Soliton resonances, soliton molecules, soliton oscillations and heterotypic solitons for the nonlinear Maccari system, Nonlinear Dyn., 111 (2023), 18331–18344. https://doi.org/10.1007/s11071-023-08798-9 doi: 10.1007/s11071-023-08798-9
    [29] C. R. Gilson, J. J. C. Nimmo, R. Willox, A (2+1)-dimensional generalization of the AKNS shallow water wave equation, Phys. Lett. A, 180 (1993), 337–345. https://doi.org/10.1016/0375-9601(93)91187-A doi: 10.1016/0375-9601(93)91187-A
    [30] A. C. Petter, L. M. Elizabeth, Symmetry reductions and exact solutions of shallow water wave equations, Acta Appl. Math., 39 (1995), 245–276. https://doi.org/10.1007/BF00994636 doi: 10.1007/BF00994636
    [31] A. M. Wazwaz, New integrable (2+1)-and (3+1)-dimensional shallow water wave equations: multiple soliton solutions and lump solutions, Int. J. Numer. Methods Heat Fluid Flow, 32 (2022), 138–149. https://doi.org/10.1108/HFF-01-2021-0019 doi: 10.1108/HFF-01-2021-0019
    [32] G. Q. Xu, Y. P. Liu, W. Y. Cui, Painlevé analysis, integrability property and multiwave interaction solutions for a new (4+1)-dimensional KdV-Calogero-Bogoyavlenkskii-Schiff equation, Appl. Math. Lett., 132 (2022), 108184. https://doi.org/10.1016/j.aml.2022.108184 doi: 10.1016/j.aml.2022.108184
    [33] A. M. Wazwaz, Two new Painlevé integrable KdV-Calogero-Bogoyavlenskii-Schiff (KdV-CBS) equation and new negative-order KdV-CBS equation, Nonlinear Dyn., 104 (2021), 4311–4315. https://doi.org/10.1007/s11071-021-06537-6 doi: 10.1007/s11071-021-06537-6
    [34] K. J. Wang, J. H. Liu, Diverse optical solitons to the nonlinear Schrödinger equation via two novel techniques, Eur. Phys. J. Plus, 138 (2023), 74. https://doi.org/10.1140/epjp/s13360-023-03710-1 doi: 10.1140/epjp/s13360-023-03710-1
    [35] Y. L. Ma, A. M. Wazwaz, B. Q. Li, A new (3+1)-dimensional Kadomtsev-Petviashvili equation and its integrability, multiple-solitons, breathers and lump waves, Math. Comput. Simulat., 187 (2021), 505–519. https://doi.org/10.1016/j.matcom.2021.03.012 doi: 10.1016/j.matcom.2021.03.012
    [36] F. Baronio, S. Wabnitz, Y. Kodama, Optical Kerr spatiotemporal dark-lump dynamics of hydrodynamic origin, Phys. Rev. Lett., 116 (2016), 173901. https://doi.org/10.1103/PhysRevLett.116.173901 doi: 10.1103/PhysRevLett.116.173901
    [37] Y. L. Ma, B. Q. Li, Bifurcation solitons and breathers for the nonlocal Boussinesq equations, Appl. Math. Lett., 124 (2023), 107677. https://doi.org/10.1016/j.aml.2021.107677 doi: 10.1016/j.aml.2021.107677
    [38] R. F. Zhang, M. C. Li, H. M. Yin, Rogue wave solutions and the bright and dark solitons of the (3+1)-dimensional Jimbo-Miwa equation, Nonlinear Dyn., 103 (2021), 1071–1079. https://doi.org/10.1007/s11071-020-06112-5 doi: 10.1007/s11071-020-06112-5
    [39] Y. L. Ma, B. Q. Li, Mixed lump and soliton solutions for a generalized (3+1)-dimensional Kadomtsev-Petviashvili equation, AIMS Math., 5 (2020), 1162–1176. https://doi.org/10.3934/math.2020080 doi: 10.3934/math.2020080
    [40] Y. Y. Gu, L. W. Liao, Closed form solutions of Gerdjikov-Ivanov equation in nonlinear fiber optics involving the beta derivatives, Int. J. Mod. Phys. B, 36 (2022), 2250116. https://doi.org/10.1142/S0217979222501168 doi: 10.1142/S0217979222501168
    [41] B. Q. Li, Y. L. Ma, Multiple-lump waves for a (3+1)-dimensional Boiti-Leon-Manna-Pempinelli equation arising from incompressible fluid, Comput. Math. Appl., 76 (2023), 204–214. https://doi.org/10.1016/j.camwa.2018.04.015 doi: 10.1016/j.camwa.2018.04.015
    [42] Y. Y. Gu, C. F. Wu, X. Yao, W. J. Yuan, Characterizations of all real solutions for the KdV equation and WR, Appl. Math. Lett., 107 (2020), 106446. https://doi.org/10.1016/j.aml.2020.106446 doi: 10.1016/j.aml.2020.106446
    [43] Y. L. Ma, A. M. Wazwaz, B. Q. Li, New extended Kadomtsev-Petviashvili equation: multiple soliton solutions, breather, lump and interaction solutions, Nonlinear Dyn., 104 (2021), 1581–1594. https://doi.org/10.1007/s11071-021-06357-8 doi: 10.1007/s11071-021-06357-8
    [44] Y. Y. Gu, W. J. Yuan, N. Aminakbari, J. M. Lin, Meromorphic solutions of some algebraic differential equations related Painleve equation IV and its applications, Math. Methods Appl. Sci., 41 (2018), 3832–3840. https://doi.org/10.1002/mma.4869 doi: 10.1002/mma.4869
    [45] B. Q. Li, Y. L. Ma, Extended generalized Darboux transformation to hybrid rogue wave and breather solutions for a nonlinear Schrödinger equation, Appl. Math. Comput., 386 (2020), 125469. https://doi.org/10.1016/j.amc.2020.125469 doi: 10.1016/j.amc.2020.125469
    [46] B. Q. Li, Y. L. Ma, Interaction dynamics of hybrid solitons and breathers for extended generalization of Vakhnenko equation, Nonlinear Dyn., 102 (2020), 1787–1799. https://doi.org/10.1007/s11071-020-06024-4 doi: 10.1007/s11071-020-06024-4
    [47] B. Q. Li, Hybrid breather and rogue wave solution for a (2+1)-dimensional ferromagnetic spin chain system with variable coefficients, Int. J. Comput. Math., 99 (2022), 506–519. https://doi.org/10.1080/00207160.2021.1922678 doi: 10.1080/00207160.2021.1922678
    [48] Y. L. Ma, B. Q. Li, Hybrid rogue wave and breather solutions for a complex mKdV equation in few-cycle ultra-short pulse optics, Eur. Phys. J. Plus, 137 (2022), 861. https://doi.org/10.1140/epjp/s13360-022-03080-0 doi: 10.1140/epjp/s13360-022-03080-0
  • This article has been cited by:

    1. Lingvue Su, Yongli Wang, 2023, High-knowledge shilling attack detection method based on genetic co-forest, 979-8-3503-8199-3, 660, 10.1109/TrustCom60117.2023.00100
    2. Reda A. Zayed, Lamiaa Fattouh Ibrahim, Hesham A. Hefny, Hesham A. Salman, Abdulaziz AlMohimeed, Using Ensemble Method to Detect Attacks in the Recommender System, 2023, 11, 2169-3536, 111315, 10.1109/ACCESS.2023.3321322
    3. P.Alwin Infant, P.Mohan Kumar, , 2024, Protecting Recommendations: Combating BIAS and Manipulation in Recommendation, 979-8-3503-7642-5, 1216, 10.1109/I-SMAC61858.2024.10714772
    4. Sarika Gambhir, Sanjeev Dhawan, Kulvinder Singh, Enhancing Recommendation Systems with Skew Deviation Bias for Shilling Attack Detection, 2025, 18, 23520965, 212, 10.2174/0123520965265325231206094044
    5. Clayton Barnett, Rasha Kashef, 2024, GraphAush: Combining Adversarial Learning and Graph Embedding for a Novel Shilling Attack Model Towards Robust Recommender Systems, 979-8-3503-6730-0, 73, 10.1109/BDCAT63179.2024.00022
  • Reader Comments
  • © 2023 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1142) PDF downloads(44) Cited by(0)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog