{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:17:02Z","timestamp":1725567422783},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642165665"},{"type":"electronic","value":"9783642165672"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-16567-2_10","type":"book-chapter","created":{"date-parts":[[2010,10,13]],"date-time":"2010-10-13T07:51:38Z","timestamp":1286956298000},"page":"125-139","source":"Crossref","is-referenced-by-count":11,"title":["Social Manipulation of Online Recommender Systems"],"prefix":"10.1007","author":[{"given":"Juan","family":"Lang","sequence":"first","affiliation":[]},{"given":"Matt","family":"Spear","sequence":"additional","affiliation":[]},{"given":"S. Felix","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","doi-asserted-by":"crossref","first-page":"542","DOI":"10.1145\/1150402.1150465","volume-title":"KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","author":"R. Burke","year":"2006","unstructured":"Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: KDD 2006: Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 542\u2013547. ACM, New York (2006)"},{"key":"10_CR2","first-page":"67","volume-title":"WIDM 2005: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management","author":"P.A. Chirita","year":"2005","unstructured":"Chirita, P.A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: WIDM 2005: Proceedings of the 7th Annual ACM International Workshop on Web Information and Data Management, pp. 67\u201374. ACM, New York (2005)"},{"key":"10_CR3","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1109\/CSE.2009.444","volume-title":"CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering","author":"D. DeFigueiredo","year":"2009","unstructured":"DeFigueiredo, D., Barr, E., Wu, S.F.: Trust is in the eye of the beholder. In: CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 100\u2013108. IEEE Computer Society, Washington (2009)"},{"key":"10_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/11755593_8","volume-title":"Trust Management","author":"J. Golbeck","year":"2006","unstructured":"Golbeck, J.: Generating predictive movie recommendations from trust in social networks. In: St\u00f8len, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol.\u00a03986, pp. 93\u2013104. Springer, Heidelberg (2006)"},{"issue":"12","key":"10_CR5","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1145\/138859.138867","volume":"35","author":"D. Goldberg","year":"1992","unstructured":"Goldberg, D., Nichols, D., Oki, B.M., Terry, D.: Using collaborative filtering to weave an information tapestry. ACM Commun.\u00a035(12), 61\u201370 (1992)","journal-title":"ACM Commun."},{"key":"10_CR6","volume-title":"Probability and Statistical Inference","author":"R.V. Hogg","year":"2009","unstructured":"Hogg, R.V., Tanis, E.A.: Probability and Statistical Inference. Prentice-Hall, Englewood Cliffs (2009)"},{"key":"10_CR7","doi-asserted-by":"publisher","first-page":"90","DOI":"10.1109\/CSE.2009.109","volume-title":"CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering","author":"C.F. Hsu","year":"2009","unstructured":"Hsu, C.F., Khabiri, E., Caverlee, J.: Ranking comments on the social web. In: CSE 2009: Proceedings of the 2009 International Conference on Computational Science and Engineering, pp. 90\u201397. IEEE Computer Society, Washington (2009)"},{"key":"10_CR8","first-page":"393","volume-title":"WWW 2004: Proceedings of the 13th International Conference on World Wide Web","author":"S.K. Lam","year":"2004","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: WWW 2004: Proceedings of the 13th International Conference on World Wide Web, pp. 393\u2013402. ACM, New York (2004)"},{"key":"10_CR9","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1145\/1397735.1397738","volume-title":"WOSP 2008: Proceedings of the First Workshop on Online Social Networks","author":"K. Lerman","year":"2008","unstructured":"Lerman, K., Galstyan, A.: Analysis of social voting patterns on digg. In: WOSP 2008: Proceedings of the First Workshop on Online Social Networks, pp. 7\u201312. ACM, New York (2008)"},{"key":"10_CR10","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1297231.1297235","volume-title":"RecSys 2007: Proceedings of the 2007 ACM Conference on Recommender Systems","author":"P. Massa","year":"2007","unstructured":"Massa, P., Avesani, P.: Trust-aware recommender systems. In: RecSys 2007: Proceedings of the 2007 ACM Conference on Recommender Systems, pp. 17\u201324. ACM, New York (2007)"},{"key":"10_CR11","first-page":"14","volume-title":"IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces","author":"B. Mehta","year":"2007","unstructured":"Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: IUI 2007: Proceedings of the 12th International Conference on Intelligent User Interfaces, pp. 14\u201321. ACM, New York (2007)"},{"key":"10_CR12","first-page":"167","volume-title":"IUI 2005: Proceedings of the 10th International Conference on Intelligent User Interfaces","author":"J. O\u2019Donovan","year":"2005","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in recommender systems. In: IUI 2005: Proceedings of the 10th International Conference on Intelligent User Interfaces, pp. 167\u2013174. ACM, New York (2005)"},{"issue":"4","key":"10_CR13","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M. O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony, M., Hurley, N., Kushmerick, N., Silvestre, G.: Collaborative recommendation: A robustness analysis. ACM Trans. Internet Technol.\u00a04(4), 344\u2013377 (2004)","journal-title":"ACM Trans. Internet Technol."},{"key":"10_CR14","volume-title":"C4.5: programs for machine learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: programs for machine learning. Morgan Kaufmann Publishers Inc., San Francisco (1993)"},{"key":"10_CR15","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1145\/1297231.1297236","volume-title":"RecSys 2007: Proceedings of the 2007 ACM conference on Recommender systems","author":"P. Resnick","year":"2007","unstructured":"Resnick, P., Sami, R.: The influence limiter: provably manipulation-resistant recommender systems. In: RecSys 2007: Proceedings of the 2007 ACM conference on Recommender systems, pp. 25\u201332. ACM, New York (2007)"},{"issue":"3","key":"10_CR16","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender systems. ACM Commun.\u00a040(3), 56\u201358 (1997)","journal-title":"ACM Commun."}],"container-title":["Lecture Notes in Computer Science","Social Informatics"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-16567-2_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,3]],"date-time":"2023-06-03T16:04:22Z","timestamp":1685808262000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-16567-2_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642165665","9783642165672"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-16567-2_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}