• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4598977)   Today's Articles (1346)   Subscriber (49356)
For: Zhou W, Wen J, Xiong Q, Gao M, Zeng J. SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems. Neurocomputing 2016. [DOI: 10.1016/j.neucom.2015.12.137] [Citation(s) in RCA: 53] [Impact Index Per Article: 6.6] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
Number Cited by Other Article(s)
1
Alhijawi B, Abo Alrub M, Al-Fayoumi M. Generalized Ethereum Blockchain-based recommender system framework. INFORM SYST 2023. [DOI: 10.1016/j.is.2022.102113] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
2
A detection method for hybrid attacks in recommender systems. INFORM SYST 2022. [DOI: 10.1016/j.is.2022.102154] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/12/2022]
3
El Moutaouakil K, Roudani M, El Ouissari A. Optimal Entropy Genetic Fuzzy-C-Means SMOTE (OEGFCM-SMOTE). Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2022.110235] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 12/29/2022]
4
Detecting shilling groups in online recommender systems based on graph convolutional network. Inf Process Manag 2022. [DOI: 10.1016/j.ipm.2022.103031] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
5
Wang J, Gao M, Wang Z, Lin C, Zhou W, Wen J. Ada: Adversarial learning based data augmentation for malicious users detection. Appl Soft Comput 2022. [DOI: 10.1016/j.asoc.2022.108414] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
6
Zhou Q, Duan L. Semi-supervised recommendation attack detection based on Co-Forest. Comput Secur 2021. [DOI: 10.1016/j.cose.2021.102390] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
7
Rezaimehr F, Dadkhah C. A survey of attack detection approaches in collaborative filtering recommender systems. Artif Intell Rev 2020. [DOI: 10.1007/s10462-020-09898-3] [Citation(s) in RCA: 15] [Impact Index Per Article: 3.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
8
Hao Y, Zhang F. An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft comput 2020. [DOI: 10.1007/s00500-020-05162-6] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/23/2022]
9
Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2020.105984] [Citation(s) in RCA: 11] [Impact Index Per Article: 2.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/19/2022]
10
Zhou Q, Wu J, Duan L. Recommendation attack detection based on deep learning. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020. [DOI: 10.1016/j.jisa.2020.102493] [Citation(s) in RCA: 12] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
11
LR-SMOTE — An improved unbalanced data set oversampling based on K-means and SVM. Knowl Based Syst 2020. [DOI: 10.1016/j.knosys.2020.105845] [Citation(s) in RCA: 78] [Impact Index Per Article: 19.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
12
Unsupervised and supervised methods for the detection of hurriedly created profiles in recommender systems. INT J MACH LEARN CYB 2020. [DOI: 10.1007/s13042-020-01108-4] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
13
Harth A, Kirrane S, Ngonga Ngomo AC, Paulheim H, Rula A, Gentile AL, Haase P, Cochez M. SAShA: Semantic-Aware Shilling Attacks on Recommender Systems Exploiting Knowledge Graphs. THE SEMANTIC WEB 2020. [PMCID: PMC7250597 DOI: 10.1007/978-3-030-49461-2_18] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Indexed: 11/27/2022]
14
Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl Based Syst 2019. [DOI: 10.1016/j.knosys.2019.04.001] [Citation(s) in RCA: 21] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/23/2022]
15
Shilling attacks against collaborative recommender systems: a review. Artif Intell Rev 2018. [DOI: 10.1007/s10462-018-9655-x] [Citation(s) in RCA: 36] [Impact Index Per Article: 6.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
16
Collaborative filtering recommendation based on trust and emotion. J Intell Inf Syst 2018. [DOI: 10.1007/s10844-018-0517-4] [Citation(s) in RCA: 14] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/28/2022]
17
Zhou W, Wen J, Qu Q, Zeng J, Cheng T. Shilling attack detection for recommender systems based on credibility of group users and rating time series. PLoS One 2018;13:e0196533. [PMID: 29742134 PMCID: PMC5942815 DOI: 10.1371/journal.pone.0196533] [Citation(s) in RCA: 16] [Impact Index Per Article: 2.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Grants] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 12/03/2017] [Accepted: 03/09/2018] [Indexed: 11/21/2022]  Open
18
Zhang F, Zhang Z, Zhang P, Wang S. UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl Based Syst 2018. [DOI: 10.1016/j.knosys.2018.02.032] [Citation(s) in RCA: 21] [Impact Index Per Article: 3.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/18/2022]
19
Long-term performance of collaborative filtering based recommenders in temporally evolving systems. Neurocomputing 2017. [DOI: 10.1016/j.neucom.2017.06.026] [Citation(s) in RCA: 22] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
20
Yang Z, Cai Z, Yang Y. Spotting anomalous ratings for rating systems by analyzing target users and items. Neurocomputing 2017. [DOI: 10.1016/j.neucom.2017.02.052] [Citation(s) in RCA: 13] [Impact Index Per Article: 1.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA