{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T00:21:01Z","timestamp":1767140461852,"version":"build-2238731810"},"reference-count":23,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T00:00:00Z","timestamp":1494633600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["71403151"],"award-info":[{"award-number":["71403151"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Appl Intell"],"published-print":{"date-parts":[[2017,12]]},"DOI":"10.1007\/s10489-017-0944-x","type":"journal-article","created":{"date-parts":[[2017,5,13]],"date-time":"2017-05-13T00:56:27Z","timestamp":1494636987000},"page":"1115-1131","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks"],"prefix":"10.1007","volume":"47","author":[{"given":"Shujuan","family":"Ji","sequence":"first","affiliation":[]},{"given":"Haiyan","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Yongquan","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Hofung","family":"Leung","sequence":"additional","affiliation":[]},{"given":"Chunjin","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,13]]},"reference":[{"key":"944_CR1","doi-asserted-by":"crossref","unstructured":"Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Hawaii international conference on system science. IEEE Computer Society, vol 6, p 6007","DOI":"10.1109\/HICSS.2000.926814"},{"issue":"12","key":"944_CR2","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1007\/3-540-45547-7_3","volume":"107","author":"DH McKnight","year":"2001","unstructured":"McKnight D H, Chervany N L (2001) Trust and distrust definitions: one bite at a time. Lect Notes Comput Sci 107(12):27\u201354","journal-title":"Lect Notes Comput Sci"},{"key":"944_CR3","doi-asserted-by":"crossref","unstructured":"McKnight D H, Choudhury V (2006) Distrust and trust in B2C e-commerce: do they differ? International Conference on Electronic Commerce: the New E-Commerce - Innovations for Conquering Current Barriers, Obstacles and Limitations to Conducting Successful Business on the Internet, 2006, Fredericton, New Brunswick, Canada, pp 482\u2013491","DOI":"10.1145\/1151454.1151527"},{"issue":"C","key":"944_CR4","doi-asserted-by":"crossref","first-page":"37","DOI":"10.1016\/j.dss.2015.01.005","volume":"71","author":"H Fang","year":"2015","unstructured":"Fang H, Guo G, Zhang J (2015) Multi-faceted trust and distrust prediction for recommender systems. Decis Support Syst 71(C):37\u201347","journal-title":"Decis Support Syst"},{"issue":"C","key":"944_CR5","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.knosys.2016.03.015","volume":"103","author":"S Ji","year":"2016","unstructured":"Ji S, Ma H, Zhang S, Leung H F, Chiu D, Zhang CJ, et al. (2016) A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks. Knowl-Based Syst 103(C):1\u201318","journal-title":"Knowl-Based Syst"},{"key":"944_CR6","unstructured":"Jiang S, Zhang J, Ong Y (2013) An evolutionary model for constructing robust trust networks. In: Proceedings of the 12th international conference on autonomous agents and multiagent systems (AAMAS), pp 813\u2013820"},{"key":"944_CR7","doi-asserted-by":"crossref","unstructured":"J\u00f8sang A (2012) Robustness of trust and reputation systems: does it matter? Ifip Advances in Information & Communication Technology, pp 253\u2013262","DOI":"10.1007\/978-3-642-29852-3_21"},{"key":"944_CR8","unstructured":"J\u00f8sang A, Gray E, Kinateder M (2003) Analysing topologies of transitive trust. In: Proceedings of the workshop of formal aspects of security & trust"},{"key":"944_CR9","unstructured":"J\u00f8sang A., Ismail R. (2002). The beta reputation system. Bled Conference on Electronic Commerce. pp. 324\u2013337."},{"issue":"3","key":"944_CR10","doi-asserted-by":"crossref","first-page":"438","DOI":"10.5465\/amr.1998.926620","volume":"23","author":"RJ Lewicki","year":"1998","unstructured":"Lewicki R J, Mcallister D J, Bies RJ (1998) Trust and distrust: new relationships and realities. Acad Manag Rev 23(3):438\u2013458","journal-title":"Acad Manag Rev"},{"key":"944_CR11","first-page":"1151","volume":"3","author":"AC Kot","year":"2011","unstructured":"Liu S, Zhang J, Miao C, Theng Y, Kot AC (2011) ICLUB: an integrated clustering-based approach to improve the robustness of reputation systems. Inter Conf Auton Agents Multiagent Syst 3:1151\u20131152","journal-title":"Inter Conf Auton Agents Multiagent Syst"},{"issue":"2","key":"944_CR12","doi-asserted-by":"crossref","first-page":"316","DOI":"10.1111\/j.1467-8640.2012.00464.x","volume":"30","author":"S Liu","year":"2014","unstructured":"Liu S, Zhang J, Miao C, Theng Y, Kot AC (2014) An integrated clustering-based approach to filtering unfair multi-nominal testimonies. Comput Intell 30(2):316\u2013341","journal-title":"Comput Intell"},{"issue":"13","key":"944_CR13","doi-asserted-by":"crossref","first-page":"1462","DOI":"10.1016\/j.patrec.2013.05.017","volume":"34","author":"X Liu","year":"2013","unstructured":"Liu X, Wang Y, Zhu S, Lin H (2013) Combating Web spam through trust\u2013distrust propagation with confidence. Pattern Recogn Lett 34(13):1462\u20131469","journal-title":"Pattern Recogn Lett"},{"issue":"1","key":"944_CR14","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MIS.2011.22","volume":"26","author":"P Victor","year":"2011","unstructured":"Victor P, Cornelis C, Cock M D, et al. (2011) Trust-and Distrust-based recommendations for controversial reviews. IEEE Intell Syst 26(1):48\u201355","journal-title":"IEEE Intell Syst"},{"issue":"2","key":"944_CR15","first-page":"42","volume":"7","author":"P Victor","year":"2013","unstructured":"Victor P, Verbiest N, Cornelis C, Cock M D (2013) Enhancing the trust-based recommendation process with explicit distrust. ACM Trans Web (TWEB) 7(2):42\u201359","journal-title":"ACM Trans Web (TWEB)"},{"issue":"2","key":"944_CR16","first-page":"85","volume":"2","author":"S Singh","year":"2007","unstructured":"Singh S, Bawa S (2007) Privacy, trust and policy based authorization framework for services in distributed environment. Int J Comput Sci 2(2):85\u201392","journal-title":"Int J Comput Sci"},{"issue":"2","key":"944_CR17","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1037\/0022-3514.90.2.210","volume":"90","author":"NK Smith","year":"2006","unstructured":"Smith NK, Larsen JT, Chartrand TL, Cacioppo JT, Katafiasz HA, Moran KE (2006) Being bad isn\u2019t always good: affective context moderates the attention bias toward negative information. J Pers Soc Psychol 90(2):210\u201320","journal-title":"J Pers Soc Psychol"},{"issue":"2","key":"944_CR18","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10458-006-5952-x","volume":"12","author":"WTL Teacy","year":"2006","unstructured":"Teacy W T L, Patel J (2006) TRAVOS: Trust and reputation in the context of inaccurate information sources. Auton Agent Multi-Agent Syst 12(2):183\u2013198","journal-title":"Auton Agent Multi-Agent Syst"},{"issue":"3","key":"944_CR19","first-page":"106","volume":"37","author":"A Whitby","year":"2004","unstructured":"Whitby A, J\u00f8sang A, Indulska J (2004) Filtering out unfair ratings in Bayesian reputation systems. Int Joint Conf Auton Agent Syst 37(3):106\u2013117","journal-title":"Int Joint Conf Auton Agent Syst"},{"key":"944_CR20","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2002) Detecting deception in reputation management Second International Joint Conference on Autonomous Agents & Multiagent Systems, vol 2, pp 73\u201380","DOI":"10.1145\/860586.860588"},{"key":"944_CR21","doi-asserted-by":"crossref","unstructured":"Yu B, Singh MP (2002). An evidential model of distributed reputation management. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part. ACM pp 294\u2013301","DOI":"10.1145\/544741.544809"},{"issue":"2","key":"944_CR22","first-page":"55","volume":"4","author":"J Zhang","year":"2011","unstructured":"Zhang J, Cohen R (2011) A framework for trust modeling in multiagent electronic marketplaces with buying advisors to consider varying seller behavior and the limiting of seller bids. ACM Trans Intell Syst Technol 4(2):55\u201373","journal-title":"ACM Trans Intell Syst Technol"},{"key":"944_CR23","doi-asserted-by":"crossref","unstructured":"Zhang L, Jiang S, Zhang J, Ng WK (2012). Robustness of trust models and combinations for handling unfair ratings. In: Ifip advances in information & communication technology, pp 36\u201351","DOI":"10.1007\/978-3-642-29852-3_3"}],"updated-by":[{"DOI":"10.1007\/s10489-018-1195-1","type":"correction","label":"Correction","source":"publisher","updated":{"date-parts":[[2018,5,12]],"date-time":"2018-05-12T00:00:00Z","timestamp":1526083200000}}],"container-title":["Applied Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10489-017-0944-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0944-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10489-017-0944-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,24]],"date-time":"2019-09-24T12:03:25Z","timestamp":1569326605000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10489-017-0944-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,5,13]]},"references-count":23,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,12]]}},"alternative-id":["944"],"URL":"https:\/\/doi.org\/10.1007\/s10489-017-0944-x","relation":{},"ISSN":["0924-669X","1573-7497"],"issn-type":[{"value":"0924-669X","type":"print"},{"value":"1573-7497","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,5,13]]}}}