{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T21:34:59Z","timestamp":1757626499752,"version":"3.44.0"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031944574"},{"type":"electronic","value":"9783031944581"}],"license":[{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T00:00:00Z","timestamp":1756598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-94458-1_15","type":"book-chapter","created":{"date-parts":[[2025,8,30]],"date-time":"2025-08-30T15:55:22Z","timestamp":1756569322000},"page":"305-330","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Enhancing Reliability in Open Rating Systems: A Trust-Aware Filtering Approach"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7686-2000","authenticated-orcid":false,"given":"Jun","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Amine","family":"Lamouchi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1982-7134","authenticated-orcid":false,"given":"Houda","family":"Labiod","sequence":"additional","affiliation":[]},{"given":"Dimitri","family":"Korkotashvili","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,31]]},"reference":[{"key":"15_CR1","unstructured":"Amazon. https:\/\/www.amazon.com"},{"key":"15_CR2","unstructured":"IMDb. https:\/\/www.imdb.com"},{"key":"15_CR3","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd annual Hawaii international conference on system sciences, p. 9. IEEE (2000)","DOI":"10.1109\/HICSS.2000.926814"},{"key":"15_CR4","doi-asserted-by":"crossref","unstructured":"Blondel, V.D., Guillaume, J., Lambiotte, R., Lefebvre, E.: Fast unfolding of communities in large networks. J. Stat. Mech. Theory Exp. 2008(10), P10008 (2008)","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"15_CR5","doi-asserted-by":"crossref","unstructured":"Breunig, M.M., Kriegel, H., Ng, R.T., Sander, J.: LOF: identifying density-based local outliers. In: ACM SIGMOD Conference (2000)","DOI":"10.1145\/342009.335388"},{"issue":"3","key":"15_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1541880.1541882","volume":"41","author":"V Chandola","year":"2009","unstructured":"Chandola, V., Banerjee, A., Kumar, V.: Anomaly detection: a survey. ACM comput. Surv. (CSUR) 41(3), 1\u201358 (2009)","journal-title":"ACM comput. Surv. (CSUR)"},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Douceur, J.R: The sybil attack. In: International workshop on peer-to-peer systems, pp. 251\u2013260. Springer (2002)","DOI":"10.1007\/3-540-45748-8_24"},{"key":"15_CR8","unstructured":"Ramanathan Guha. Open rating systems (2003)"},{"issue":"2","key":"15_CR9","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2856037","volume":"10","author":"G Guo","year":"2016","unstructured":"Guo, G., Zhang, J., Yorke-Smith, N.: A novel evidence-based Bayesian similarity measure for recommender systems. ACM Trans. Web (TWEB) 10(2), 1\u201330 (2016)","journal-title":"ACM Trans. Web (TWEB)"},{"key":"15_CR10","doi-asserted-by":"crossref","unstructured":"Hawkins, D.M.: Identification of outliers, vol. 11. Springer (1980)","DOI":"10.1007\/978-94-015-3994-4"},{"key":"15_CR11","doi-asserted-by":"crossref","unstructured":"Hooi, B., et al.: FRAUDAR: bounding graph fraud in the face of camouflage. In: Proceedings of the 22nd ACM SIGKDD international conference on knowledge discovery and data mining, pp. 895\u2013904 (2016)","DOI":"10.1145\/2939672.2939747"},{"issue":"2","key":"15_CR12","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618\u2013644 (2007)","journal-title":"Decis. Support Syst."},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kanungo, T., et al.: An efficient k-means clustering algorithm: analysis and implementation. IEEE Trans. Pattern Anal. Mach. Intell. 24(7), 881\u2013892 (2002)","DOI":"10.1109\/TPAMI.2002.1017616"},{"key":"15_CR14","doi-asserted-by":"crossref","unstructured":"Mukherjee, A., Liu, B., Glance,N.: Spotting fake reviewer groups in consumer reviews. In: Proceedings of the 21st international conference on World Wide Web, pp. 191\u2013200 (2012)","DOI":"10.1145\/2187836.2187863"},{"key":"15_CR15","unstructured":"Lawrence Page, Sergey Brin, Rajeev Motwani, Terry Winograd, et\u00a0al. The pagerank citation ranking: Bringing order to the web"},{"key":"15_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"284","DOI":"10.1007\/11569596_31","volume-title":"Computer and Information Sciences - ISCIS 2005","author":"P Pons","year":"2005","unstructured":"Pons, P., Latapy, M.: Computing Communities in Large Networks Using Random Walks. In: Yolum, I., G\u00fcng\u00f6r, T., G\u00fcrgen, F., \u00d6zturan, C. (eds.) ISCIS 2005. LNCS, vol. 3733, pp. 284\u2013293. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11569596_31"},{"issue":"12","key":"15_CR17","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1145\/355112.355122","volume":"43","author":"P Resnick","year":"2000","unstructured":"Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Commun. ACM 43(12), 45\u201348 (2000)","journal-title":"Commun. ACM"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Rosvall, M., Bergstrom, C.T.: Maps of random walks on complex networks reveal community structure. In: Proceedings of the national academy of sciences, vol. 105 no. 4, pp. 1118\u20131123 (2008)","DOI":"10.1073\/pnas.0706851105"},{"key":"15_CR19","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s10462-004-0041-5","volume":"24","author":"J Sabater","year":"2005","unstructured":"Sabater, J., Sierra, C.: Review on computational trust and reputation models. Artif. Intell. Rev. 24, 33\u201360 (2005)","journal-title":"Artif. Intell. Rev."},{"key":"15_CR20","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web, pp. 285\u2013295 (2001)","DOI":"10.1145\/371920.372071"},{"issue":"1","key":"15_CR21","doi-asserted-by":"publisher","first-page":"5233","DOI":"10.1038\/s41598-019-41695-z","volume":"9","author":"VA Traag","year":"2019","unstructured":"Traag, V.A., Waltman, L., Eck, N.J.V.: From Louvain to Leiden: guaranteeing well-connected communities. Sci. Rep. 9(1), 5233 (2019)","journal-title":"Sci. Rep."},{"issue":"4","key":"15_CR22","doi-asserted-by":"publisher","first-page":"853","DOI":"10.1007\/s00442-010-1812-0","volume":"164","author":"H Tuomisto","year":"2010","unstructured":"Tuomisto, H.: A consistent terminology for quantifying species diversity? Yes, it does exist. Oecologia 164(4), 853\u2013860 (2010)","journal-title":"Oecologia"},{"key":"15_CR23","doi-asserted-by":"publisher","first-page":"395","DOI":"10.1007\/s11222-007-9033-z","volume":"17","author":"U Von Luxburg","year":"2007","unstructured":"Von Luxburg, U.: A tutorial on spectral clustering. Stat. Comput. 17, 395\u2013416 (2007)","journal-title":"Stat. Comput."}],"container-title":["Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering","Security and Privacy in Communication Networks"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-94458-1_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T22:42:31Z","timestamp":1757457751000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-94458-1_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,31]]},"ISBN":["9783031944574","9783031944581"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-94458-1_15","relation":{},"ISSN":["1867-8211","1867-822X"],"issn-type":[{"type":"print","value":"1867-8211"},{"type":"electronic","value":"1867-822X"}],"subject":[],"published":{"date-parts":[[2025,8,31]]},"assertion":[{"value":"31 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SecureComm","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Security and Privacy in Communication Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dubai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"United Arab Emirates","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"securecomm2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/securecomm.eai-conferences.org\/2024\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}