{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T00:31:03Z","timestamp":1773707463161,"version":"3.50.1"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783030009151","type":"print"},{"value":"9783030009168","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-00916-8_43","type":"book-chapter","created":{"date-parts":[[2018,9,25]],"date-time":"2018-09-25T03:45:33Z","timestamp":1537847133000},"page":"459-469","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":18,"title":["Collaborative Shilling Detection Bridging Factorization and User Embedding"],"prefix":"10.1007","author":[{"given":"Tong","family":"Dou","sequence":"first","affiliation":[]},{"given":"Junliang","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yuqi","family":"Song","sequence":"additional","affiliation":[]},{"given":"Qianqi","family":"Fang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,9,26]]},"reference":[{"key":"43_CR1","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: International Conference on World Wide Web, pp. 393\u2013402. ACM (2004)","DOI":"10.1145\/988672.988726"},{"key":"43_CR2","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1016\/j.physa.2017.04.048","volume":"483","author":"Junliang Yu","year":"2017","unstructured":"Yu, J., et al.: Hybrid attacks on model-based social recommender systems. Phys. Stat. Mech. Its Appl. 483, 171\u2013181 (2017)","journal-title":"Physica A: Statistical Mechanics and its Applications"},{"key":"43_CR3","unstructured":"Levy, O., Goldberg, Y.: Neural word embedding as implicit matrix factorization. In: Advances in Neural Information Processing Systems, vol. 3, pp. 2177\u20132185 (2014)"},{"key":"43_CR4","unstructured":"Mikolov, T., et al. : Distributed representations of words and phrases and their compositionality. In: Advances in Neural Information Processing Systems, vol. 26, pp. 3111\u20133119 (2013)"},{"key":"43_CR5","doi-asserted-by":"crossref","unstructured":"Burke, R., et al.: Classification features for attack detection in collaborative recommender systems. In: ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542\u2013547. ACM (2006)","DOI":"10.1145\/1150402.1150465"},{"key":"43_CR6","doi-asserted-by":"crossref","unstructured":"Chirita, P.-A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management. ACM (2005)","DOI":"10.1145\/1097047.1097061"},{"issue":"10","key":"43_CR7","doi-asserted-by":"publisher","first-page":"2600","DOI":"10.1587\/transinf.2015EDP7500","volume":"E99.D","author":"Wentao LI","year":"2016","unstructured":"Li, W., et al.: Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Trans. Inf. Syst. 99(10), 2600\u20132611 (2016)","journal-title":"IEICE Transactions on Information and Systems"},{"key":"43_CR8","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11891321_6","volume-title":"Advances in Web Mining and Web Usage Analysis","author":"B Mobasher","year":"2006","unstructured":"Mobasher, B., Burke, R., Williams, C., Bhaumik, R.: Analysis and detection of segment-focused attacks against collaborative recommendation. In: Nasraoui, O., Za\u00efane, O., Spiliopoulou, M., Mobasher, B., Masand, B., Yu, P.S. (eds.) WebKDD 2005. LNCS (LNAI), vol. 4198, pp. 96\u2013118. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/11891321_6"},{"key":"43_CR9","doi-asserted-by":"crossref","unstructured":"Burke, R., et al.: Segment-based injection attacks against collaborative filtering recommender systems. In: Fifth IEEE International Conference on Data Mining. IEEE (2005)","DOI":"10.1109\/ICDM.2005.127"},{"issue":"5-6","key":"43_CR10","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","volume":"16","author":"Jie Cao","year":"2012","unstructured":"Cao, J., et al.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5\u20136), 729\u2013748 (2013)","journal-title":"World Wide Web"},{"key":"43_CR11","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Kulkarni, S.R.: Graph-based detection of shilling attacks in recommender systems. In: 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP). IEEE (2013)","DOI":"10.1109\/MLSP.2013.6661953"},{"issue":"8","key":"43_CR12","doi-asserted-by":"publisher","first-page":"30","DOI":"10.1109\/MC.2009.263","volume":"42","author":"Y Koren","year":"2009","unstructured":"Koren, Y., Bell, R., Volinsky, C.: Matrix factorization techniques for recommender systems. Computer 42(8), 30\u201337 (2009)","journal-title":"Computer"},{"key":"43_CR13","unstructured":"Mikolov, T., et al.: Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)"},{"key":"43_CR14","unstructured":"Zhang, Y., et al.: Catch the black sheep: unified framework for shilling attack detection based on fraudulent action propagation. In: IJCAI (2015)"},{"issue":"1","key":"43_CR15","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","volume":"19","author":"B Mehta","year":"2009","unstructured":"Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User Adapt. Interact. 19(1), 65\u201397 (2009)","journal-title":"User Model. User Adapt. Interact."},{"issue":"1","key":"43_CR16","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1109\/MIS.2016.5","volume":"31","author":"M Jiang","year":"2016","unstructured":"Jiang, M., Cui, P., Faloutsos, C.: Suspicious behavior detection: current trends and future directions. IEEE Intell. Syst. 31(1), 31\u201339 (2016)","journal-title":"IEEE Intell. Syst."},{"issue":"7","key":"43_CR17","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1360\/972012-1712","volume":"59","author":"ZA Wu","year":"2014","unstructured":"Wu, Z.A., Wang, Y.Q., Cao, J.: A survey on shilling attack models and detection techniques for recommender systems. Chin. Sci. Bull. 59(7), 551\u2013560 (2014)","journal-title":"Chin. Sci. Bull."},{"key":"43_CR18","doi-asserted-by":"crossref","unstructured":"Wu, Z., et al.: Spammers detection from product reviews: a hybrid model. In: 2015 IEEE International Conference on Data Mining (ICDM). IEEE (2015)","DOI":"10.1109\/ICDM.2015.73"},{"key":"43_CR19","doi-asserted-by":"crossref","unstructured":"Li, X.-L., et al.: Positive unlabeled learning for data stream classification. In: Proceedings of the 2009 SIAM International Conference on Data Mining. Society for Industrial and Applied Mathematics (2009)","DOI":"10.1137\/1.9781611972795.23"},{"key":"43_CR20","doi-asserted-by":"crossref","unstructured":"Xu, C., et al.: Uncovering collusive spammers in Chinese review websites. In: ACM International Conference on Conference on Information and Knowledge Management, pp. 979\u2013988. ACM (2013)","DOI":"10.1145\/2505515.2505700"}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Collaborative Computing: Networking, Applications and Worksharing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-00916-8_43","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T16:19:17Z","timestamp":1571933957000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-00916-8_43"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030009151","9783030009168"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-00916-8_43","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"value":"1867-8211","type":"print"},{"value":"1867-822X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"CollaborateCom","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Collaborative Computing: Networking, Applications and Worksharing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Edinburgh","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Kingdom","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 December 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 December 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"colcom2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/collaboratecom.eai-conferences.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}