{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,21]],"date-time":"2025-12-21T17:05:28Z","timestamp":1766336728675,"version":"3.37.3"},"publisher-location":"Singapore","reference-count":10,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811064418"},{"type":"electronic","value":"9789811064425"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-981-10-6442-5_10","type":"book-chapter","created":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T01:54:47Z","timestamp":1507168487000},"page":"108-116","source":"Crossref","is-referenced-by-count":2,"title":["AGSA: Anti-similarity Group Shilling Attacks"],"prefix":"10.1007","author":[{"given":"Peng","family":"Wang","sequence":"first","affiliation":[]},{"given":"Lingtao","family":"Qi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4392-3599","authenticated-orcid":false,"given":"Haiping","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Congxiang","family":"Yu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,10,6]]},"reference":[{"key":"10_CR1","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.knosys.2013.03.012","volume":"46","author":"J Bobadilla","year":"2013","unstructured":"Bobadilla, J., Ortega, F., Hernando, A., Guti\u00e9rrez, A.: Recommender systems survey. Knowl.-Based Syst. 46, 109\u2013132 (2013). doi:\n10.1016\/j.knosys.2013.03.012","journal-title":"Knowl.-Based Syst."},{"key":"10_CR2","doi-asserted-by":"publisher","unstructured":"Bhebe, W., Kogeda, O.P.: Shilling attack detection in collaborative recommender systems using a meta learning strategy. In: 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), Namibia, Windhoek, 17\u201320 May 2015, pp. 56\u201361. IEEE (May 2015). doi:\n10.1109\/ETNCC.2015.7184808","DOI":"10.1109\/ETNCC.2015.7184808"},{"key":"10_CR3","doi-asserted-by":"publisher","unstructured":"Fuguo, Z.: Analysis of profile injection attacks against recommendation algorithms on bipartite networks. In: 2014 International Conference on Management of e-Commerce and e-Government (ICMeCG), Shanghai, China, 31 October\u20132 November 2014, pp. 1\u20135. IEEE (October 2014). doi:\n10.1109\/ICMeCG.2014.10","DOI":"10.1109\/ICMeCG.2014.10"},{"key":"10_CR4","unstructured":"Zhang, Z., Kulkarni, S.R.: Detection of shilling attacks in recommender systems via spectral clustering. In: 2014 17th International Conference on Information Fusion (FUSION), Salamanca, Spain, 7\u201310 July 2014, pp. 1\u20138. IEEE (July 2014). [DBLP: \n            db\/conf\/fusion\/fusion2014.html\n            \n          ]"},{"issue":"5","key":"10_CR5","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1049\/iet-ifs.2014.0488","volume":"9","author":"F Zhang","year":"2015","unstructured":"Zhang, F., Sun, S., Yi, H.: Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator. IET Inf. Secur. 9(5), 257\u2013265 (2015). doi:\n10.1049\/iet-ifs.2014.0488","journal-title":"IET Inf. Secur."},{"key":"10_CR6","doi-asserted-by":"publisher","unstructured":"Masinde, N.W., Fatima, S.S.: Effect of varying filler-size in profile injection attacks on the Robust Weighted Slope One. In: 2014 Pan African Conference on Science, Computing and Telecommunications (PACT), Kampala, Uganda, 27\u201329 July, 2015, pp. 92\u201397. IEEE (July 2014). doi:\n10.1109\/SCAT.2014.7055125","DOI":"10.1109\/SCAT.2014.7055125"},{"key":"10_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1007\/978-3-642-35527-1_56","volume-title":"Advanced Data Mining and Applications","author":"Y Wang","year":"2012","unstructured":"Wang, Y., Wu, Z., Cao, J., Fang, C.: Towards a tricksy group shilling attack model against recommender systems. In: Zhou, S., Zhang, S., Karypis, G. (eds.) ADMA 2012. LNCS, vol. 7713, pp. 675\u2013688. Springer, Heidelberg (2012). doi:\n10.1007\/978-3-642-35527-1_56"},{"key":"10_CR8","doi-asserted-by":"publisher","unstructured":"Noh, G., Kim, C.K.: RobuRec: robust Sybil attack defense in online recommender systems. In: 2013 IEEE International Conference on Communications (ICC), Budapest, Hungary, 9\u201313 June 2013, pp. 2001\u20132005. IEEE (June 2013). doi:\n10.1109\/ICC.2013.6654818","DOI":"10.1109\/ICC.2013.6654818"},{"key":"10_CR9","doi-asserted-by":"publisher","unstructured":"Wang, Y., Zhang, L.: A comparative study of shilling attack detectors for recommender systems. In: 2015 12th International Conference on Service Systems and Service Management (ICSSSM), Guangzhou, China, June 22\u201324 2015, pp. 1\u20136. IEEE (2015). doi:\n10.1109\/ICSSSM.2015.7170330","DOI":"10.1109\/ICSSSM.2015.7170330"},{"key":"10_CR10","doi-asserted-by":"publisher","unstructured":"Hattori, S., Takama, Y.: Consideration about applicability of recommender system employing personal-value-based user model. In: 2013 Conference on Technologies and Applications of Artificial Intelligence, Taipei, Taiwan, 6\u20138 December 2013, pp. 282\u2013287. IEEE (2013). doi:\n10.1109\/TAAI.2013.63","DOI":"10.1109\/TAAI.2013.63"}],"container-title":["Communications in Computer and Information Science","Parallel Architecture, Algorithm and Programming"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-10-6442-5_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,10,5]],"date-time":"2017-10-05T01:57:23Z","timestamp":1507168643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-10-6442-5_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9789811064418","9789811064425"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-981-10-6442-5_10","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2017]]}}}