{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T23:42:51Z","timestamp":1743032571943,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319421018"},{"type":"electronic","value":"9783319421025"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-42102-5_6","type":"book-chapter","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T16:01:10Z","timestamp":1469116870000},"page":"53-58","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Robust Social Recommendation Techniques: A Review"],"prefix":"10.1007","author":[{"given":"Feng","family":"Jiang","sequence":"first","affiliation":[]},{"given":"Min","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,22]]},"reference":[{"issue":"2","key":"6_CR1","first-page":"72","volume":"16","author":"SS Li","year":"2015","unstructured":"Li, S.S., Karahanna, E.: Online recommendation systems in a B2C e-commerce context: a review and future directions. J. Assoc. Inf. Syst. 16(2), 72\u2013107 (2015)","journal-title":"J. Assoc. Inf. Syst."},{"issue":"4","key":"6_CR2","doi-asserted-by":"publisher","first-page":"1113","DOI":"10.1007\/s13278-013-0141-9","volume":"3","author":"J Tang","year":"2013","unstructured":"Tang, J., Hu, X., Liu, H.: Social recommendation: a review. Soc. Netw. Anal. Min. 3(4), 1113\u20131133 (2013)","journal-title":"Soc. Netw. Anal. Min."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Levandoski, J.J., Sarwat, M., Eldawy, A., Mokbel, M.F.: LARS: a location-aware recommender system. In: IEEE, pp. 450\u2013461 (2012)","DOI":"10.1109\/ICDE.2012.54"},{"issue":"1","key":"6_CR4","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.pnsc.2008.06.004","volume":"19","author":"J Liu","year":"2009","unstructured":"Liu, J., Zhou, T., Wang, B.: Progress in personalized recommender systems. Prog. Nat. Sci. 19(1), 1\u201315 (2009)","journal-title":"Prog. Nat. Sci."},{"key":"6_CR5","unstructured":"Gao, H., Tang, J., Liu, H.: Exploring social-historical ties on location-based social network. In: ICWSM (2012)"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Shrivastava, N., Majumder, A., Rastogi, R.: Mining (social) network graphs to detect random link attacks. In: Proceedings of IEEE 24th International Conference on Data Engineering, pp. 486\u2013495 (2008)","DOI":"10.1109\/ICDE.2008.4497457"},{"issue":"4","key":"6_CR7","doi-asserted-by":"publisher","first-page":"616","DOI":"10.1007\/s11390-013-1362-0","volume":"28","author":"XL Zhang","year":"2013","unstructured":"Zhang, X.L., Lee, T.M.D., Pitsilis, G.: Securing recommender systems against shilling attacks using social-based clustering. J. Comput. Sci. Technol. 28(4), 616\u2013624 (2013)","journal-title":"J. Comput. Sci. Technol."},{"key":"6_CR8","unstructured":"IBM: IBM\u2019s Black Friday report (2012). \n                    https:\/\/strme.wordpress.com\/2012\/11\/27\/ibmsblack-friday-report-says-twitter-delivered-0-percent-of-referral-traffic-and-facebooksentjust-0-68percent\/"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Ester, M.: Recommendation in social networks. In: ACM RecSys, pp. 491\u2013492 (2013)","DOI":"10.1145\/2507157.2508062"},{"key":"6_CR10","volume-title":"Recommender Systems Handbook","author":"L Rokach","year":"2011","unstructured":"Rokach, L., Shapira, B., Kantor, P.B.: Recommender Systems Handbook. Springer, New York (2011)"},{"key":"6_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/11755593_8","volume-title":"Generating Predictive Movie Recommendations from Trust in Social Networks","author":"J Golbeck","year":"2006","unstructured":"Golbeck, J.: Generating Predictive Movie Recommendations from Trust in Social Networks. Springer, Heidelberg (2006)"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Justin, J., Beegom, A.S.: Nearest neighbour based social recommendation using heat diffusion. In: Proceedings of the 6th ACM India Computing Convention, p. 10 (2013)","DOI":"10.1145\/2522548.2522607"},{"issue":"1","key":"6_CR13","doi-asserted-by":"publisher","first-page":"12","DOI":"10.1145\/2414425.2414437","volume":"4","author":"YC Chen","year":"2013","unstructured":"Chen, Y.C., Lin, Y.S., Shen, Y.C., Lin, S.D.: A modified random walk framework for handling negative ratings and generating explanations. ACM Trans. Intell. Syst. Technol. 4(1), 12 (2013)","journal-title":"ACM Trans. Intell. Syst. Technol."},{"key":"6_CR14","doi-asserted-by":"crossref","unstructured":"Zhao, T., McAuley, J., King, I.: Leveraging social connections to improve personalized ranking for collaborative filtering. In: Proceedings of the 23rd ACM International Conference on Information and Knowledge Management, pp. 261\u2013270 (2014)","DOI":"10.1145\/2661829.2661998"},{"issue":"11","key":"6_CR15","doi-asserted-by":"publisher","first-page":"2789","DOI":"10.1109\/TKDE.2014.2300487","volume":"26","author":"M Jiang","year":"2014","unstructured":"Jiang, M., Cui, P., Wang, F., Zhu, W., Yang, S.: Scalable recommendation with social contextual information. IEEE Trans. Knowl. Data Eng. 26(11), 2789\u20132802 (2014)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"6_CR16","unstructured":"Zou, B., Li, C., Tan, L., Chen, H., Wang, S.: Social recommendation based on user trust and tensor decomposition. J. Softw. 12(10), 2852\u20132864 (2014)"},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Tang, J., Gao, H., Liu, H.: mTrust: discerning multi-faceted trust in a connected world. In: Proceedings of the 5th ACM International Conference on Web Search and Data Mining, pp. 93\u2013102 (2012)","DOI":"10.1145\/2124295.2124309"},{"key":"6_CR18","unstructured":"Yeung, A.C.M., Iwata, T.: Strength of social influence in trust networks in product review sites. In: Proceedings of the 4th ACM International Conference on Web Search and Data Mining, pp. 495\u2013504 (2011)"},{"issue":"4","key":"6_CR19","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., Williams, C.: Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans. Internet Technol. 7(4), 23 (2007)","journal-title":"ACM Trans. Internet Technol."},{"issue":"8","key":"6_CR20","first-page":"1687","volume":"40","author":"Z Wu","year":"2012","unstructured":"Wu, Z., Zhuang, Y., Wang, Y., Cao, J.: Shilling attack detection based on feature selection for recommendation systems. Acta Electron. Sinica 40(8), 1687\u20131693 (2012)","journal-title":"Acta Electron. Sinica"},{"key":"6_CR21","first-page":"1067","volume":"9","author":"C Li","year":"2011","unstructured":"Li, C., Luo, Z.: A metadata-enhanced variational bayesian matrix factorization model for robust collaborative recommendation. Acta Autom. Sinica 9, 1067\u20131076 (2011)","journal-title":"Acta Autom. Sinica"},{"issue":"1","key":"6_CR22","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1287\/ijoc.1100.0440","volume":"24","author":"JS Lee","year":"2012","unstructured":"Lee, J.S., Zhu, D.: Shilling attack detection-a new approach for a trustworthy recommender system. Informs J. Comput. 24(1), 117\u2013131 (2012)","journal-title":"Informs J. Comput."},{"issue":"5\u20136","key":"6_CR23","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","volume":"16","author":"J Cao","year":"2013","unstructured":"Cao, J., Wu, Z., Mao, B., Zhang, Y.: Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system. World Wide Web 16(5\u20136), 729\u2013748 (2013)","journal-title":"World Wide Web"},{"issue":"5","key":"6_CR24","doi-asserted-by":"publisher","first-page":"823","DOI":"10.1007\/s11390-011-0181-4","volume":"26","author":"FG Zhang","year":"2011","unstructured":"Zhang, F.G.: Preventing recommendation attack in trust-based recommender systems. J. Comput. Sci. Technol. 26(5), 823\u2013828 (2011)","journal-title":"J. Comput. Sci. Technol."},{"issue":"2","key":"6_CR25","first-page":"301","volume":"37","author":"H Wang","year":"2014","unstructured":"Wang, H., Yang, W., Wang, S., Li, S.: A service recommendation method based on trustworthy community. J. Comput. 37(2), 301\u2013311 (2014)","journal-title":"J. Comput."},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Aggarwal, A., Almeida, J., Kumaraguru, P.: Detection of spam tipping behaviour on foursquare. In: Proceedings of the 22nd International Conference on World Wide Web Companion, pp. 641\u2013648 (2013)","DOI":"10.1145\/2487788.2488015"},{"key":"6_CR27","unstructured":"Limsaiprom, P., Tantatsanawong, P.: Social network anomaly and attack patterns analysis. In: Proceedings of the 6th International Conference on Networked Computing, pp. 1\u20136. IEEE (2010)"},{"key":"6_CR28","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Viswanath, B., Kooti, F., et al.: Understanding and combating link farming in the Twitter social network. In: Proceedings of the 21st International Conference on World Wide Web, pp. 61\u201370. ACM (2012)","DOI":"10.1145\/2187836.2187846"}],"container-title":["IFIP Advances in Information and Communication Technology","Socially Aware Organisations and Technologies. Impact and Challenges"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-42102-5_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,28]],"date-time":"2020-07-28T11:23:09Z","timestamp":1595935389000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-42102-5_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319421018","9783319421025"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-42102-5_6","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2016]]},"assertion":[{"value":"22 July 2016","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICISO","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Informatics and Semiotics in Organisations","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Campinas","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Brazil","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2016","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 August 2016","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 August 2016","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iciso2016","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}