{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:42:40Z","timestamp":1760708560459},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,4,24]],"date-time":"2013-04-24T00:00:00Z","timestamp":1366761600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,4,24]],"date-time":"2013-04-24T00:00:00Z","timestamp":1366761600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Inf Retrieval"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s10791-013-9224-5","type":"journal-article","created":{"date-parts":[[2013,5,1]],"date-time":"2013-05-01T23:21:19Z","timestamp":1367450479000},"page":"137-152","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":25,"title":["Defending recommender systems by influence analysis"],"prefix":"10.1007","volume":"17","author":[{"given":"Mohammad Amin","family":"Morid","sequence":"first","affiliation":[]},{"given":"Mehdi","family":"Shajari","sequence":"additional","affiliation":[]},{"given":"Ali Reza","family":"Hashemi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,4,24]]},"reference":[{"key":"9224_CR1","doi-asserted-by":"crossref","unstructured":"Adomavicius, G., & Zhang, J. (2010). On the stability of recommendation algorithms. In Proceedings of the fourth\n                           ACM conference on recommender systems, pp. 47\u201354.","DOI":"10.1145\/1864708.1864722"},{"issue":"4","key":"9224_CR2","doi-asserted-by":"publisher","first-page":"3055","DOI":"10.1016\/j.eswa.2009.09.025","volume":"37","author":"HJ Ahn","year":"2010","unstructured":"Ahn, H. J., Kanga, H., & Lee, J. (2010). Selecting a small number of products for effective user profiling in collaborative filtering. Expert Systems with Applications,\n                           37(4), 3055\u20133062.","journal-title":"Expert Systems with Applications"},{"key":"9224_CR3","first-page":"1589","volume-title":"ACM symposium on Applied computing","author":"Avesani, P., Massa, P., Tiella, R., (2005). A trust-enhanced recommender system application: Moleskiing. In SAC\u201905: Proceedings of the","year":"2005","unstructured":"Avesani, P., Massa, P., Tiella, R., (2005). A trust-enhanced recommender system application: Moleskiing. In SAC\u201905: Proceedings of the. (2005). ACM symposium on Applied computing (pp. 1589\u20131593). New York: NY, USA."},{"key":"9224_CR4","doi-asserted-by":"crossref","unstructured":"Bryan, K., O\u2019mahony, M., & Cunningham, P. (2008). Unsupervised retrieval of attack profiles in collaborative recommender systems. In Proceedings of the 2008 ACM conference on recommender systems.","DOI":"10.1145\/1454008.1454034"},{"key":"9224_CR5","unstructured":"Burke, R., Mobasher, B., & Bhaumik, R. (2005). Limited knowledge shilling attacks in collaborative filtering systems. In Proceedings of the 3rd IJCAI workshop in intelligent techniques for personalization. Edinburgh, Scotland."},{"key":"9224_CR6","doi-asserted-by":"crossref","unstructured":"Burke, R., Mobasher, B., Williams, C., & Bhaumik, R. (2006). Classification features for attack detection in collaborative recommender systems. In Proceedings of the ACM SIGKDD conference on knowledge discovery and data mining (KDD\u201906).","DOI":"10.1145\/1150402.1150465"},{"key":"9224_CR7","doi-asserted-by":"crossref","unstructured":"Chirita, P., Nejdl, W. & Zamfir, C. (2005). Preventing shilling attacks in online recommender systems, In Proceedings of the 7th annual ACM international workshop on Web information and data management.","DOI":"10.1145\/1097047.1097061"},{"key":"9224_CR8","doi-asserted-by":"crossref","unstructured":"Herlocker, J., Konstan, J., Borchers, A., & Riedl, J. (1999). An algorithmic framework for performing collaborative filtering. In Proceedings of the 22nd ACM conference on research and development in information retrieval (SIGIR\u201999). Berkeley, CA.","DOI":"10.1145\/312624.312682"},{"issue":"1","key":"9224_CR9","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/963770.963772","volume":"22","author":"J Herlocker","year":"2004","unstructured":"Herlocker, J., Konstan, J., Tervin, L. G., & Riedl, J. (2004). Evaluating collaborative filtering recommender systems. ACM Transactions on Information Systems,\n                           22(1), 5\u201353.","journal-title":"ACM Transactions on Information Systems"},{"key":"9224_CR10","doi-asserted-by":"crossref","unstructured":"Jamali, M., & Ester, M. (2009). Trustwalker: A random walk model for combining trust-based and item-based recommendation. In Proceeding of KDD\u201909, 397\u2013406.","DOI":"10.1145\/1557019.1557067"},{"key":"9224_CR11","first-page":"135","volume":"2010","author":"M Jamali","year":"2010","unstructured":"Jamali, M., & Ester, M. (2010). A matrix factorization technique with trust propagation for recommendation in social networks. In Proceeding of RecSys,\n                           2010, 135\u2013142.","journal-title":"In Proceeding of RecSys"},{"issue":"3","key":"9224_CR12","doi-asserted-by":"crossref","first-page":"45","DOI":"10.1080\/10864415.2001.11044215","volume":"5","author":"JW Kim","year":"2001","unstructured":"Kim, J. W., Lee, B. H., Shaw, M. J., Chang, H., & Nelson, M. (2001). Application of decision tree induction techniques to personalized advertisements on Internet storefront. International Journal of Electronic Commerce,\n                           5(3), 45\u201362.","journal-title":"International Journal of Electronic Commerce"},{"key":"9224_CR13","doi-asserted-by":"crossref","unstructured":"Kolbe, D., Zhu, Q., & Pramanik, S. (2010). Efficient k-nearest neighbor searching in non-ordered discrete data spaces. ACM Transactions on Information Systems, 28(2).","DOI":"10.1145\/1740592.1740595"},{"key":"9224_CR14","doi-asserted-by":"crossref","unstructured":"Lam, S. & Riedl, J. (2004). Shilling recommender systems for fun and profit. In Proceedings of the 13th international conference on world wide web.","DOI":"10.1145\/988672.988726"},{"key":"9224_CR15","doi-asserted-by":"crossref","unstructured":"Lang, J., Spear, M., & Wu, S. F. (2010). Social manipulation of online recommender systems. In Proceedings of the 2nd international conference on social informatics, Laxenburg, Austria.","DOI":"10.1007\/978-3-642-16567-2_10"},{"key":"9224_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y. K., & Lui, J. C. S. (2011). Friends or foes: Detecting dishonest recommenders in online social networks. In IEEE 20th international conference on computer communication networks (ICCCN).","DOI":"10.1109\/ICCCN.2011.6005877"},{"issue":"24","key":"9224_CR17","doi-asserted-by":"publisher","first-page":"4929","DOI":"10.1016\/j.ins.2010.08.044","volume":"180","author":"Q Li","year":"2010","unstructured":"Li, Q., Wang, J., Chen, Y., & Lin, Zh. (2010). User comments for news recommendation in forum-based social media. Information Sciences,\n                           180(24), 4929\u20134939.","journal-title":"Information Sciences"},{"issue":"20","key":"9224_CR18","doi-asserted-by":"publisher","first-page":"3505","DOI":"10.1016\/j.ins.2009.06.004","volume":"179","author":"D Liu","year":"2009","unstructured":"Liu, D., Lai, Ch., & Lee, W. (2009). A hybrid of sequential rules and collaborative filtering for product recommendation. Information Sciences,\n                           179(20), 3505\u20133519.","journal-title":"Information Sciences"},{"issue":"7","key":"9224_CR19","doi-asserted-by":"publisher","first-page":"4772","DOI":"10.1016\/j.eswa.2009.12.061","volume":"37","author":"F Liu","year":"2010","unstructured":"Liu, F., & Lee, H. (2010). Use of social network information to enhance collaborative filtering performance. Expert Systems with Applications,\n                           37(7), 4772\u20134778.","journal-title":"Expert Systems with Applications"},{"key":"9224_CR20","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1145\/1297231.1297235","volume-title":"Trust-aware recommender systems, In Proceedings of the 2007 ACM conference on Recommender systems","author":"P Massa","year":"2007","unstructured":"Massa, P., & Avesani, P. (2007). Trust-aware recommender systems, In Proceedings of the 2007 ACM conference on Recommender systems (pp. 17\u201324). New York: USA."},{"key":"9224_CR21","volume-title":"WebKDD workshop","author":"Mobasher, B., Burke, R., Williams, C. & Bhaumik, R. (2006). Analysis and detection of segment-focused attacks against collaborative recommendation. In Lecture notes in computer science: Proceedings of the","year":"2005","unstructured":"Mobasher, B., Burke, R., Williams, C. & Bhaumik, R. (2006). Analysis and detection of segment-focused attacks against collaborative recommendation. In Lecture notes in computer science: Proceedings of the. (2005). WebKDD workshop. Heidelberg: Springer."},{"issue":"4","key":"9224_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007). Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology,\n                           7(4), 1\u201323.","journal-title":"ACM Transactions on Internet Technology"},{"key":"9224_CR23","doi-asserted-by":"crossref","unstructured":"Morid, M.A., Shajari, M., & Hashemi, A. R. (2011). Who are the most influential users in a recommender system? In Proceedings of the 13th international conference on electronic commerce, August 3\u20135, Liverpool, England.","DOI":"10.1145\/2378104.2378123"},{"issue":"4","key":"9224_CR24","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M O\u2019mahony","year":"2004","unstructured":"O\u2019mahony, M., Hurley, N., Kushmerick, N., & Silvestre, G. (2004). Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology,\n                           4(4), 344\u2013377.","journal-title":"ACM Transactions on Internet Technology"},{"key":"9224_CR25","volume-title":"Mining Influence in Recommender Systems","author":"AM Rashid","year":"2007","unstructured":"Rashid, A. M. (2007). Mining Influence in Recommender Systems. Ph.D: Dissertation, University of MINNESOTA, USA."},{"key":"9224_CR26","volume-title":"& Riedl, J","author":"AM Rashid","year":"2005","unstructured":"Rashid, A. M., & Karypis, G. (2005). & Riedl, J. Influence in Ratings-Based Recommender Systems: An Algorithm-Independent Approach. Proceedings of SIAM International Conference on Data Mining."},{"key":"9224_CR27","volume-title":"Learning Preferences of New Users in Recommender Systems: An Information Theoretic Approach","author":"AM Rashid","year":"2008","unstructured":"Rashid, A. M., Karypis, G., & Riedl, J. (2008). Learning Preferences of New Users in Recommender Systems: An Information Theoretic Approach. Las Vegas, Nevada, USA: Web Mining and Web Usage Analysis."},{"key":"9224_CR28","doi-asserted-by":"crossref","unstructured":"Sandvig, J., Mobasher, B., & Burke, R. (2007). Robustness of collaborative recommendation based on association rule mining. In Proceedings of the 2007 ACM conference on recommender systems.","DOI":"10.1145\/1297231.1297249"},{"key":"9224_CR29","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., & Riedl, J. (2001). Item-based collaborative filtering recommendation algorithms. In Proceedings of the WWW10, Hong Kong, pp. 285\u2013295","DOI":"10.1145\/371920.372071"},{"issue":"1","key":"9224_CR30","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1016\/j.ins.2009.08.005","volume":"180","author":"J Su","year":"2010","unstructured":"Su, J., Wang, B., Hsiao, Ch., & Tseng, V. (2010). Personalized rough-set-based recommendation by integrating multiple contents and collaborative information. Information Sciences,\n                           180(1), 113\u2013131.","journal-title":"Information Sciences"},{"issue":"4","key":"9224_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1721831.1721835","volume":"17","author":"J Teevan","year":"2010","unstructured":"Teevan, J., Dumais, S., & Horvitz, E. (2010). Potential for personalization. ACM Transactions on Computer-Human Interaction,\n                           17(4), 1\u201331.","journal-title":"ACM Transactions on Computer-Human Interaction"},{"key":"9224_CR32","first-page":"207","volume":"10","author":"K Weinberger","year":"2009","unstructured":"Weinberger, K., & Saul, L. (2009). Distance metric learning for large margin nearest neighbor classification. The Journal of Machine Learning Research,\n                           10, 207\u2013244.","journal-title":"The Journal of Machine Learning Research"},{"issue":"3","key":"9224_CR33","doi-asserted-by":"publisher","first-page":"232","DOI":"10.1016\/j.knosys.2009.12.004","volume":"23","author":"Y Weiwei","year":"2010","unstructured":"Weiwei, Y., Donghai, G., Young-koo, L., Sungyoung, L., & Sung, J. H. (2010). Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems, Elsevier,\n                           23(3), 232\u2013238.","journal-title":"Knowledge-Based Systems, Elsevier"},{"issue":"3","key":"9224_CR34","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","volume":"4","author":"CA Williams","year":"2007","unstructured":"Williams, C. A., Mobasher, B., & Burke, R. (2007). Defending recommender systems: Detection of profile injection attacks. Service Oriented Computing and Applications,\n                           4(3), 157\u2013170.","journal-title":"Service Oriented Computing and Applications"},{"issue":"13","key":"9224_CR35","doi-asserted-by":"publisher","first-page":"2787","DOI":"10.1016\/j.ins.2011.03.001","volume":"181","author":"D Yu","year":"2011","unstructured":"Yu, D., Yu, X., Hu, Q., Liu, J., & Wu, A. (2011). Dynamic time warping constraint learning for large margin nearest neighbor classification. Information Sciences,\n                           181(13), 2787\u20132796.","journal-title":"Information Sciences"},{"key":"9224_CR36","doi-asserted-by":"publisher","first-page":"588","DOI":"10.1109\/ICIII.2009.601","volume":"4","author":"F Zhang","year":"2009","unstructured":"Zhang, F. (2009). Average shilling attack against trust-based recommender systems. International Conference on Information Management, Innovation Management and Industrial Engineering,\n                           4, 588\u2013591.","journal-title":"International Conference on Information Management, Innovation Management and Industrial Engineering"},{"key":"9224_CR37","first-page":"318","volume":"4","author":"F Zhang","year":"2010","unstructured":"Zhang, F. (2010). Analysis of love-hate shilling attack against e-commerce recommender system. International Conference of Information Science and Management Engineering (ISME),\n                           4, 318\u2013321.","journal-title":"International Conference of Information Science and Management Engineering (ISME)"}],"container-title":["Information Retrieval"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-013-9224-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10791-013-9224-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-013-9224-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10791-013-9224-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,2]],"date-time":"2024-01-02T14:08:53Z","timestamp":1704204533000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10791-013-9224-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4,24]]},"references-count":37,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["9224"],"URL":"https:\/\/doi.org\/10.1007\/s10791-013-9224-5","relation":{},"ISSN":["1386-4564","1573-7659"],"issn-type":[{"value":"1386-4564","type":"print"},{"value":"1573-7659","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4,24]]},"assertion":[{"value":"9 November 2012","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 March 2013","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"24 April 2013","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}