{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:48:09Z","timestamp":1760708889869},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2015,8,14]],"date-time":"2015-08-14T00:00:00Z","timestamp":1439510400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2016,4]]},"DOI":"10.1007\/s10844-015-0375-2","type":"journal-article","created":{"date-parts":[[2015,8,13]],"date-time":"2015-08-13T01:20:16Z","timestamp":1439428816000},"page":"349-367","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["Robust recommendation method based on suspicious users measurement and multidimensional trust"],"prefix":"10.1007","volume":"46","author":[{"given":"Huawei","family":"Yi","sequence":"first","affiliation":[]},{"given":"Fuzhi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,8,14]]},"reference":[{"key":"375_CR1","doi-asserted-by":"crossref","unstructured":"Aghili, G., Shajari, M., Khadivi, S., & Morid, M.A. (2011). Using genre interest of users to detect profile injection attacks in movie recommender systems. In Proceedings of the 10th international conference on Machine Learning and Applications and Workshops (pp. 49\u201352).","DOI":"10.1109\/ICMLA.2011.151"},{"key":"375_CR2","doi-asserted-by":"crossref","unstructured":"Burke, R., Mobasher, B., Williams, C., & Bhaumik, R. (2006). Classification features for attack detection in collaborative recommender systems. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining (pp. 542\u2013547).","DOI":"10.1145\/1150402.1150465"},{"key":"375_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, Z., & Hurley, N. (2010). Robust collaborative recommendation by least trimmed squares matrix factorization. In Proceedings of the 22nd IEEE international conference on tools with artificial intelligence (pp. 105\u2013112).","DOI":"10.1109\/ICTAI.2010.90"},{"issue":"2","key":"375_CR4","doi-asserted-by":"crossref","first-page":"99","DOI":"10.1016\/0167-9236(92)90003-8","volume":"8","author":"RF Dyer","year":"1992","unstructured":"Dyer, R.F. (1992). Group decision support with the analytic hierarchy process. Decision Support Systems, 8(2), 99\u2013124.","journal-title":"Decision Support Systems"},{"issue":"4","key":"375_CR5","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","volume":"42","author":"I Gunes","year":"2014","unstructured":"Gunes, I., Kaleli, C., Bilge, A., & Polat, H. (2014). Shilling attacks against recommender systems: a comprehensive survey. Artificial Intelligence Review, 42(4), 767\u2013799.","journal-title":"Artificial Intelligence Review"},{"issue":"3","key":"375_CR6","doi-asserted-by":"crossref","first-page":"64","DOI":"10.1109\/MIS.2007.44","volume":"22","author":"NJ Hurley","year":"2007","unstructured":"Hurley, N.J., O\u2019Mahony, M.P., & Silvestre, G.C. (2007). Attacking recommender systems: A cost-benefit analysis. IEEE Intelligent Systems, 22(3), 64\u201368.","journal-title":"IEEE Intelligent Systems"},{"key":"375_CR7","unstructured":"Kantor, P.B., Rokach, L., Ricci, F., & Shapira, B. (2011). Recommender systems handbook: Springer."},{"issue":"3","key":"375_CR8","doi-asserted-by":"crossref","first-page":"7114","DOI":"10.1016\/j.eswa.2008.08.071","volume":"36","author":"K Kwon","year":"2009","unstructured":"Kwon, K., Cho, J., & Park, Y (2009). Multidimensional credibility model for neighbor selection in collaborative recommendation. Expert Systems with Applications, 36(3), 7114\u20137122.","journal-title":"Expert Systems with Applications"},{"issue":"5","key":"375_CR9","doi-asserted-by":"crossref","first-page":"720","DOI":"10.1162\/neco.1992.4.5.720","volume":"4","author":"D Mackay","year":"1992","unstructured":"Mackay, D. (1992). The evidence framework applied to classification networks. Neural computation, 4(5), 720\u2013736.","journal-title":"Neural computation"},{"key":"375_CR10","doi-asserted-by":"crossref","unstructured":"Maida, M., Maier, K., Obwegeser, N., & Stix, V. (2012). A multidimensional model of trust in recommender systems. In Proceedings of 13th International Conference on Electronic Commerce and Web Technologies (pp. 212\u2013219).","DOI":"10.1007\/978-3-642-32273-0_19"},{"key":"375_CR11","doi-asserted-by":"crossref","unstructured":"Mehta, B., Hofmann, T., & Nejdl, W. (2007). Robust collaborative filtering. In Proceedings of the 2007 ACM conference on Recommender systems (pp. 49\u201356).","DOI":"10.1145\/1297231.1297240"},{"key":"375_CR12","doi-asserted-by":"crossref","unstructured":"Miller, B.N., Albert, I., Lam, S. K., Konstan, J. A., & Riedl, J. (2003). MovieLens unplugged: experiences with an occasionally connected recommender system. In Proceedings of the 8th international conference on Intelligent user interfaces (pp. 263\u2013266).","DOI":"10.1145\/604045.604094"},{"key":"375_CR13","unstructured":"Mobasher, B., Burke, R., & Sandvig, J.J. (2006). Model-based collaborative filtering as a defense against profile injection attacks. In Proceedings of the 21st national conference on artificial intelligence (pp. 1388\u20131393)."},{"key":"375_CR14","doi-asserted-by":"crossref","unstructured":"O\u2019Donovan, J., & Smyth, B. (2005). Trust in recommender systems. In Proceedings of the 10th international conference on Intelligent user interfaces (pp. 167\u2013174).","DOI":"10.1145\/1040830.1040870"},{"issue":"4","key":"375_CR15","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony, M., Hurley, N., Kushmerick, N., & Silvestre, G. (2004a). Collaborative recommendation: A robustness analysis. ACM Transactions on Internet Technology (TOIT), 4(4), 344\u2013377.","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"375_CR16","unstructured":"O\u2019Mahony, M.P., Hurley, N.J., & Silvestre, G.C. (2004b). Efficient and secure collaborative filtering through intelligent neighbour selection. In Proceedings of the 16th European conference on artificial intelligence (pp. 383\u2013387)."},{"key":"375_CR17","unstructured":"O\u2019Mahony, M.P. (2004). Towards robust and efficient automated collaborative filtering. PhD dissertation: University College Dublin."},{"key":"375_CR18","volume-title":"A model of trust derivation from evidence for use in recommendation systems","author":"G Pitsilis","year":"2004","unstructured":"Pitsilis, G., & Marshall, L.F. (2004). A model of trust derivation from evidence for use in recommendation systems. Computing Science: University of Newcastle upon Tyne."},{"key":"375_CR19","doi-asserted-by":"crossref","unstructured":"Sandvig, J.J., Mobasher, B., & Burke, R. (2007). Robustness of collaborative recommendation based on association rule mining. In Proceedings of the 2007 ACM conference on Recommender systems (pp. 105\u2013112).","DOI":"10.1145\/1297231.1297249"},{"key":"375_CR20","first-page":"652","volume":"12","author":"M Tipping","year":"2001","unstructured":"Tipping, M. (2001a). The relevance vector machine. Advances in Neural Information Processing Systems, 12, 652\u2013658.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"375_CR21","first-page":"211","volume":"1","author":"ME Tipping","year":"2001","unstructured":"Tipping, M.E. (2001b). Sparse Bayesian learning and the relevance vector machine. The journal of machine learning research, 1, 211\u2013244.","journal-title":"The journal of machine learning research"},{"key":"375_CR22","doi-asserted-by":"crossref","unstructured":"Weng, J., Miao, C., & Goh, A. (2006). Improving collaborative filtering with trust-based metrics. In Proceedings of the 2006 ACM symposium on Applied computing (pp. 1860\u20131864).","DOI":"10.1145\/1141277.1141717"},{"issue":"3","key":"375_CR23","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","volume":"1","author":"CA Williams","year":"2007","unstructured":"Williams, C.A., Mobasher, B., & Burke, R. (2007a). Defending recommender systems: detection of profile injection attacks. Service Oriented Computing and Applications, 1(3), 157\u2013170.","journal-title":"Service Oriented Computing and Applications"},{"key":"375_CR24","doi-asserted-by":"crossref","unstructured":"Williams, C.A., Mobasher, B., Burke, R., & Bhaumik, R. (2007b). Detecting profile injection attacks in collaborative filtering: a classification-based approach. In Proceedings of the 8th Knowledge Discovery on the Web International Conference on Advances in Web Mining and Web Usage Analysis (pp. 167\u2013186).","DOI":"10.1007\/978-3-540-77485-3_10"},{"issue":"2","key":"375_CR25","doi-asserted-by":"crossref","first-page":"350","DOI":"10.3724\/SP.J.1001.2009.00350","volume":"20","author":"H Xu","year":"2009","unstructured":"Xu, H., Wu, X., & Li, X. (2009). Comparision study of Internet recommendation system. Journal of Software, 20(2), 350\u2013362.","journal-title":"Journal of Software"},{"key":"375_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, S., Ouyang, Y., Ford, J., & Makedon, F. (2006). Analysis of a low-dimensional linear model under recommendation attacks. In Proceedings of the 29th annual international ACM SIGIR conference on Research and development in information retrieval (pp. 517\u2013524).","DOI":"10.1145\/1148170.1148259"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-015-0375-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-015-0375-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-015-0375-2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T22:10:54Z","timestamp":1559254254000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-015-0375-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,14]]},"references-count":26,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,4]]}},"alternative-id":["375"],"URL":"https:\/\/doi.org\/10.1007\/s10844-015-0375-2","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,8,14]]}}}