{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,10]],"date-time":"2025-03-10T04:02:41Z","timestamp":1741579361414,"version":"3.38.0"},"publisher-location":"Berlin, Heidelberg","reference-count":32,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642236402"},{"type":"electronic","value":"9783642236419"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-23641-9_25","type":"book-chapter","created":{"date-parts":[[2011,8,24]],"date-time":"2011-08-24T02:26:20Z","timestamp":1314152780000},"page":"295-309","source":"Crossref","is-referenced-by-count":3,"title":["AdPriRec: A Context-Aware Recommender System for User Privacy in MANET Services"],"prefix":"10.1007","author":[{"given":"Zheng","family":"Yan","sequence":"first","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"25_CR1","doi-asserted-by":"publisher","first-page":"305","DOI":"10.1109\/JSAC.2005.861389","volume":"24","author":"Y. Sun","year":"2006","unstructured":"Sun, Y., Yu, W., Han, Z., Liu, K.J.R.: Information Theoretic Tramework of Trust Modeling and Evaluation for Ad Hoc Networks. IEEE Journal on Selected Area in Communications\u00a024(2), 305\u2013317 (2006)","journal-title":"IEEE Journal on Selected Area in Communications"},{"issue":"2","key":"25_CR2","doi-asserted-by":"publisher","first-page":"318","DOI":"10.1109\/JSAC.2005.861390","volume":"24","author":"G. Theodorakopoulos","year":"2006","unstructured":"Theodorakopoulos, G., Baras, J.S.: On Trust Models and Trust Evaluation Metrics for Ad Hoc Networks. IEEE Journal on Selected Areas in Communications\u00a024(2), 318\u2013328 (2006)","journal-title":"IEEE Journal on Selected Areas in Communications"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Raya, M., Papadimitratos, P., Gligory, V.D., Hubaux, J.-P.: On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks. In: IEEE INFOCOM, pp. 1912\u20131920 (2008)","DOI":"10.1109\/INFOCOM.2008.180"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Zouridaki, C., Mark, B.L., Hejmo, M., Thomas, K.R.: Robust Cooperative Trust Establishment for MANETs. In: SASN 2006: Proceedings of the Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 23\u201334(2006)","DOI":"10.1145\/1180345.1180349"},{"issue":"3","key":"25_CR5","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1145\/245108.245121","volume":"40","author":"P. Resnick","year":"1997","unstructured":"Resnick, P., Varian, H.R.: Recommender Systems. Communications of the ACM\u00a040(3), 56\u201358 (1997)","journal-title":"Communications of the ACM"},{"key":"25_CR6","first-page":"449","volume-title":"Proceedings of the ACM CHI 2007","author":"J.T. Hancock","year":"2007","unstructured":"Hancock, J.T., Toma, C., Ellison, N.: The Truth about Lying in Online Dating Profiles. In: Proceedings of the ACM CHI 2007, pp. 449\u2013452. ACM, New York (2007)"},{"key":"25_CR7","doi-asserted-by":"crossref","unstructured":"Su, X., Khoshgoftaar, T.M.: A Survey of Collaborative Filtering Techniques. In: Advances in Artificial Intelligence\u00a0vol. 19 (2009), doi:10.1155\/2009\/421425","DOI":"10.1155\/2009\/421425"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., Smyth, B.: Trust in Recommender Systems. In: IUI 2005, pp. 167\u2013174 (2005)","DOI":"10.1145\/1040830.1040870"},{"key":"25_CR9","doi-asserted-by":"crossref","unstructured":"Polat, H., Du, W.L.: Privacy-Preserving Top-N Recommendation on Horizontally Partitioned Data. In: The 2005 IEEE\/WIC\/ACM International Conference on Web Intelligence, 725\u2013731 (2005)","DOI":"10.1109\/WI.2005.117"},{"key":"25_CR10","doi-asserted-by":"crossref","unstructured":"Luo, Y., Le, J., Chen, H.: A Privacy-Preserving Book Recommendation Model Based on Multi-agent. In: WCSE 2009, pp. 323\u2013327 (2009)","DOI":"10.1109\/WCSE.2009.822"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Li, T., Gao, C., Du, J.: A NMF-Based Privacy-Preserving Recommendation Algorithm. In: ICISE 2009, pp. 754\u2013757 (2009)","DOI":"10.1109\/ICISE.2009.107"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Bilge, A., Polat, H.: Improving Privacy-Preserving NBC-Based Recommendations by Preprocessing. In: WI-IAT 2010, pp. 143\u2013147 (2010)","DOI":"10.1109\/WI-IAT.2010.109"},{"key":"25_CR13","doi-asserted-by":"crossref","unstructured":"Ahn, J., Amatriain, X: Towards Fully Distributed and Privacy-Preserving Recommendations via Expert Collaborative Filtering and RESTful Linked Data. In: WI-IAT 2010, pp. 66\u201373 (2010)","DOI":"10.1109\/WI-IAT.2010.53"},{"key":"25_CR14","doi-asserted-by":"crossref","unstructured":"Tada, M., Kikuchi, H., Puntheeranurak, S.: Privacy-Preserving Collaborative Filtering Protocol Based on Similarity between Items. In: AINA 2010, pp. 573\u2013578 (2010)","DOI":"10.1109\/AINA.2010.159"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Kikuchi, H., Kizawa, H., Tada, M.: Privacy-Preserving Collaborative Filtering Schemes. In: ARES 2009, pp. 911\u2013916 (2009)","DOI":"10.1109\/ARES.2009.148"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Katzenbeisser, S., Petkovic, M.: Privacy-Preserving Recommendation Systems for Consumer Healthcare Services. In: ARES 2008, pp. 889\u2013895 (2008)","DOI":"10.1109\/ARES.2008.85"},{"issue":"3","key":"25_CR17","doi-asserted-by":"publisher","first-page":"68","DOI":"10.1109\/MPRV.2006.61","volume":"5","author":"Z. Yu","year":"2006","unstructured":"Yu, Z., Zhou, X., Zhang, D., Chin, C., Wang, X., Men, J.: Supporting Context-Aware Media Recommendations for Smart Phones. IEEE Pervasive Computing\u00a05(3), 68\u201375 (2006)","journal-title":"IEEE Pervasive Computing"},{"issue":"7","key":"25_CR18","doi-asserted-by":"publisher","first-page":"977","DOI":"10.1109\/TKDE.2007.1065","volume":"19","author":"G. Yap","year":"2007","unstructured":"Yap, G., Tan, A., Pang, H.: Discovering and Exploiting Causal Dependencies for Robust Mobile Context-Aware Recommenders. IEEE Transactions on Knowledge and Data Engineering\u00a019(7), 977\u2013992 (2007)","journal-title":"IEEE Transactions on Knowledge and Data Engineering"},{"key":"25_CR19","doi-asserted-by":"crossref","unstructured":"Wang, J., Kodama, E., Takada, T., Li, J.: Mining context-related sequential patterns for recommendation systems. In: CAMP 2010, pp. 270\u2013275 (2010)","DOI":"10.1109\/INFRKM.2010.5466905"},{"key":"25_CR20","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yu, Z.: Spontaneous and Context-Aware Media Recommendation in Heterogeneous Spaces. In: IEEE VTC 2007, pp. 267\u2013271 (2007)","DOI":"10.1109\/VETECS.2007.67"},{"key":"25_CR21","doi-asserted-by":"crossref","unstructured":"Chuong, C., Torabi, T., Loke, S.W.: Towards Context-aware Task Recommendation. In: JCPC 2009, pp. 289\u2013292 (2009)","DOI":"10.1109\/JCPC.2009.5420173"},{"key":"25_CR22","doi-asserted-by":"crossref","unstructured":"Liiv, I., Tammet, T., Ruotsalo, T., Kuusik, A.: Personalized Context-Aware Recommendations in SMARTMUSEUM: Combining Semantics with Statistics. In: SEMAPRO 2009, pp. 50\u201355 (2009)","DOI":"10.1109\/SEMAPRO.2009.25"},{"key":"25_CR23","doi-asserted-by":"crossref","unstructured":"Liu, D., Meng, X., Chen, J.: A Framework for Context-Aware Service Recommendation. In: ICACT 2008, pp. 2131\u20132134 (2008)","DOI":"10.1109\/ICACT.2008.4494210"},{"key":"25_CR24","doi-asserted-by":"crossref","unstructured":"Xiao, H., Zou, Y., Ng, J., Nigul, L.: An Approach for Context-Aware Service Discovery and Recommendation. In: IEEE ICWS 2010, pp. 163\u2013170 (2010)","DOI":"10.1109\/ICWS.2010.95"},{"key":"25_CR25","doi-asserted-by":"crossref","unstructured":"Seetharam, A., Ramakrishnan, R.: A context sensitive, yet private experience towards a contextually apt recommendation of service. In: IMSAA 2008, pp. 1\u20136 (2008)","DOI":"10.1109\/IMSAA.2008.4753941"},{"key":"25_CR26","doi-asserted-by":"crossref","unstructured":"Berkovsky, S., De Luca, E.W., Said, A.: Proceedings of the Workshop on Context-Aware Movie Recommendation (2010)","DOI":"10.1145\/1869652"},{"issue":"3","key":"25_CR27","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MVT.2009.933475","volume":"4","author":"A. Ahtiainen","year":"2009","unstructured":"Ahtiainen, A., Kalliojarvi, K., Kasslin, M., Leppanen, K., Richter, A., Ruuska, P., Wijting, C.: Awareness Networking in Wireless Environments: Means of Exchanging Information. IEEE Vehicular Technology Magazine\u00a04(3), 48\u201354 (2009)","journal-title":"IEEE Vehicular Technology Magazine"},{"key":"25_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"414","DOI":"10.1007\/978-3-642-16355-5_33","volume-title":"Ubiquitous Intelligence and Computing","author":"Z. Yan","year":"2010","unstructured":"Yan, Z., Chen, Y.: AdContRep: A privacy enhanced reputation system for MANET content services. In: Yu, Z., Liscano, R., Chen, G., Zhang, D., Zhou, X. (eds.) UIC 2010. LNCS, vol.\u00a06406, pp. 414\u2013429. Springer, Heidelberg (2010)"},{"issue":"3","key":"25_CR29","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1109\/MIS.2010.33","volume":"26","author":"J. Wang","year":"2011","unstructured":"Wang, J., Wang, F., Yan, Z., Huang, B.: Message Receiver Determination in Multiple Simultaneous IM Conversations. IEEE Intelligent Systems\u00a026(3), 24\u201331 (2011)","journal-title":"IEEE Intelligent Systems"},{"key":"25_CR30","unstructured":"Yan, Z., Liu, C., Niemi, V., Yu, G.: Trust information indication: effects of displaying trust information on mobile application usage. Technical Report NRC-TR-2009-004, Nokia Research Center, http:\/\/research.nokia.com\/files\/NRCTR2009004.pdf"},{"key":"25_CR31","doi-asserted-by":"crossref","unstructured":"Hu, J., Burmester, M.: LARS: A locally Aware Reputation System for Mobile Ad Hoc Networks. In: Proc. of the 44th ACM Annual Southeast Regional Conf., pp. 119\u2013123 (2006)","DOI":"10.1145\/1185448.1185475"},{"key":"25_CR32","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Peer-to-Peer Systems","author":"J.R. Douceur","year":"2002","unstructured":"Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.\u00a02429, pp. 251\u2013260. Springer, Heidelberg (2002)"}],"container-title":["Lecture Notes in Computer Science","Ubiquitous Intelligence and Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-23641-9_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,9]],"date-time":"2025-03-09T05:57:27Z","timestamp":1741499847000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-23641-9_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642236402","9783642236419"],"references-count":32,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-23641-9_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}