{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,24]],"date-time":"2026-03-24T12:19:45Z","timestamp":1774354785009,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2018,7,14]],"date-time":"2018-07-14T00:00:00Z","timestamp":1531526400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61672039"],"award-info":[{"award-number":["61672039"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61602009"],"award-info":[{"award-number":["61602009"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"the National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["and 61772034"],"award-info":[{"award-number":["and 61772034"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Natural Science Foundation of Anhui Province","award":["1508085QF133 and 1608085MF145"],"award-info":[{"award-number":["1508085QF133 and 1608085MF145"]}]},{"name":"the Research Program of Anhui Province Education Department","award":["KJ2014A088"],"award-info":[{"award-number":["KJ2014A088"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10844-018-0517-4","type":"journal-article","created":{"date-parts":[[2018,7,14]],"date-time":"2018-07-14T01:40:21Z","timestamp":1531532421000},"page":"113-135","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":39,"title":["Collaborative filtering recommendation based on trust and emotion"],"prefix":"10.1007","volume":"53","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3402-6391","authenticated-orcid":false,"given":"Liangmin","family":"Guo","sequence":"first","affiliation":[]},{"given":"Jiakun","family":"Liang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Yonglong","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Liping","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Xiaoyao","family":"Zheng","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,14]]},"reference":[{"key":"517_CR1","unstructured":"Anand, S.S., & Mobasher, B. (2003). Intelligent techniques for web personalization. In Proceedings of the International Conference on Intelligent Techniques for Web Personalization (pp. 1\u201336). Acapulco."},{"key":"517_CR2","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1016\/j.knosys.2016.10.025","volume":"116","author":"MM Azadjalal","year":"2017","unstructured":"Azadjalal, M.M., Moradi, P., Abdollahpouri, A., Jalili, M. (2017). A trust-aware recommendation method based on Pareto dominance and confidence concepts. Knowledge-Based Systems, 116, 130\u2013143.","journal-title":"Knowledge-Based Systems"},{"key":"517_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2014.05.257","volume":"31","author":"A Bilge","year":"2014","unstructured":"Bilge, A., Ozdemir, Z., Polat, H. (2014). A novel shilling attack detection method. Procedia Computer of Science, 31, 165\u2013174.","journal-title":"Procedia Computer of Science"},{"key":"517_CR4","doi-asserted-by":"publisher","first-page":"8075","DOI":"10.1016\/j.eswa.2014.07.012","volume":"41","author":"S Deng","year":"2014","unstructured":"Deng, S., Huang, L., Xu, G. (2014). Social network-based service recommendation with trust enhancement. Expert Systems with Applications, 41, 8075\u20138084.","journal-title":"Expert Systems with Applications"},{"key":"517_CR5","unstructured":"Dong, Z., Dong, Q., Hao, C. (2010). Hownet and its computation of meaning. In Proceedings of the 23rd International Conference on Computational Linguistics: Demonstrations (pp. 53\u201356). Beijing."},{"key":"517_CR6","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1037\/0003-066X.48.4.384","volume":"48","author":"P Ekman","year":"1993","unstructured":"Ekman, P. (1993). Facial expression and emotion. American Psychology, 48, 384\u2013392.","journal-title":"American Psychology"},{"key":"517_CR7","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1007\/978-3-319-00372-6_5","volume":"24","author":"A Felfernig","year":"2013","unstructured":"Felfernig, A., Jeran, M., Ninaus, G., et al. (2013). Toward the next generation of recommender systems: applications and research challenges. Multimedia Services in Intelligent Environments, 24, 81\u201398.","journal-title":"Multimedia Services in Intelligent Environments"},{"key":"517_CR8","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1109\/T-AFFC.2011.22","volume":"3","author":"ACM Fong","year":"2012","unstructured":"Fong, A.C.M., Zhou, B., Hui, S., Tang, J., Hong, G. (2012). Generation of personalized ontology based on consumer emotion and behavior analysis. Transactions on Affective Computing, 3, 152\u2013164.","journal-title":"Transactions on Affective Computing"},{"key":"517_CR9","doi-asserted-by":"crossref","unstructured":"Gonzalez-Rodriguez, M.R., Martnez-torres, M.R., Toral, S.L. (2014). Monitoring travel-related information on social media through sentiment analysis. In Proceedings of the 7th IEEE\/ACM International Conference on Utility and Cloud Computing (pp. 636\u2013641). London.","DOI":"10.1109\/UCC.2014.102"},{"key":"517_CR10","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TKDE.2016.2528249","volume":"28","author":"G Guo","year":"2016","unstructured":"Guo, G., Zhang, J., Yorkesmith, N. (2016). A novel recommendation model regularized with user trust and item ratings. IEEE Transactions on Knowledge Data Engineering, 28, 1\u201314.","journal-title":"IEEE Transactions on Knowledge Data Engineering"},{"key":"517_CR11","first-page":"1817","volume":"25","author":"X Hu","year":"2014","unstructured":"Hu, X., Meng, X., Zang, Y., Shi, Y. (2014). Recommendation algorithm combing item features and trust relationship of mobile users. Journal of Software, 25, 1817\u20131830.","journal-title":"Journal of Software"},{"key":"517_CR12","first-page":"2262","volume":"44","author":"Z Huang","year":"2016","unstructured":"Huang, Z., Zhang, J., Zhang, B., Yu, J., Xiang, Y., Huang, D. (2016). Survey of semantics-based recommendation algorithms. Acta Electoral Sinica, 44, 2262\u20132275.","journal-title":"Acta Electoral Sinica"},{"key":"517_CR13","doi-asserted-by":"crossref","unstructured":"IJntema, W., Goossen, F., Frasincar, F., et al. (2010). Ontology-based news recommendation. In Proceedings of the EDBT\/ICDT Workshops (pp. 1\u20136). ACM.","DOI":"10.1145\/1754239.1754257"},{"key":"517_CR14","doi-asserted-by":"publisher","first-page":"609","DOI":"10.1007\/s10115-014-0779-2","volume":"44","author":"A Javari","year":"2015","unstructured":"Javari, A., & Jalili, M. (2015). A probabilistic model to resolve diversitycaccuracy challenge of recommendation systems. Knowledge and Information Systems, 44, 609\u2013627.","journal-title":"Knowledge and Information Systems"},{"key":"517_CR15","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.future.2017.05.036","volume":"80","author":"A Kalai","year":"2018","unstructured":"Kalai, A., Zayani, C.A., Amous, I., Abdelghani, W., Sdes, F. (2018). Social collaborative service recommendation approach based on users trust and domain-specific expertise. Future Generation of Computer System, 80, 355\u2013367.","journal-title":"Future Generation of Computer System"},{"key":"517_CR16","doi-asserted-by":"crossref","unstructured":"Karypis, G. (2001). Evaluation of item-based top-n recommendation algorithms. In Proceedings of the 10th International Conference on Information and Knowledge Management (pp. 247\u2013254). atlanta.","DOI":"10.1145\/502585.502627"},{"key":"517_CR17","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.knosys.2016.05.037","volume":"106","author":"WP Lee","year":"2016","unstructured":"Lee, W.P., & Ma, C.Y. (2016). Enhancing collaborative recommendation performance by combining user preference and trust-distrust propagation in social networks. Knowledge-Based Systems, 106, 125\u2013134.","journal-title":"Knowledge-Based Systems"},{"key":"517_CR18","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.knosys.2017.02.032","volume":"127","author":"J Li","year":"2017","unstructured":"Li, J., Chen, C., Chen, H., Tong, C. (2017). Towards context-aware social recommendation via individual trust. Knowledge-Based Systems, 127, 58\u201366.","journal-title":"Knowledge-Based Systems"},{"key":"517_CR19","doi-asserted-by":"crossref","unstructured":"Lo, S., & Lin, C. (2007). WMR\u2013a graph-based algorithm for friend recommendation. In Proceedings of the Atlantic Web Intelligence Conference on Advances in Intelligent Web Mastering (pp. 223\u2013229). fontainebleau.","DOI":"10.1007\/978-3-540-72575-6_36"},{"key":"517_CR20","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1111\/j.1467-8640.2012.00427.x","volume":"29","author":"J Lu","year":"2013","unstructured":"Lu, J., Shambour, Q., Xu, Y., et al. (2013). A web-based personalized business partner recommendation system using fuzzy semantic techniques. Computer Intelligent-Us, 29, 37\u201369.","journal-title":"Computer Intelligent-Us"},{"key":"517_CR21","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1016\/j.elerap.2017.06.005","volume":"25","author":"X Ma","year":"2017","unstructured":"Ma, X., Lu, H., Gan, Z., Zeng, J. (2017). An explicit trust and distrust clustering based collaborative filtering recommendation approach. Electronic Commerce R. A., 25, 29\u201339.","journal-title":"Electronic Commerce R. A."},{"key":"517_CR22","volume-title":"TongYiCi CiLin,","author":"JJ Mei","year":"1983","unstructured":"Mei, J.J., Zhu, Y.M., Gao, Y.Q. (1983). TongYiCi CiLin,. Shanghai: Shanghai Lexicographic Publishing House."},{"key":"517_CR23","doi-asserted-by":"crossref","unstructured":"Min, K., Ma, C., Zhao, T., Li, H. (2015). Bosonnlp: an ensemble approach for word segmentation and POS tagging. In Proceedings of the 4th CCF Conference on Natural Language Processing and Chinese Computing (pp. 520\u2013526).","DOI":"10.1007\/978-3-319-25207-0_48"},{"key":"517_CR24","doi-asserted-by":"crossref","unstructured":"Musto, C., de Gemmis, M., Semeraro, G., Lops, P. (2017). A multi-criteria recommender system exploiting aspect-based sentiment analysis of users\u2019 reviews. In Proceedings of the 11th ACM Conference on Recommender Systems (pp. 321\u2013325). como.","DOI":"10.1145\/3109859.3109905"},{"key":"517_CR25","doi-asserted-by":"crossref","unstructured":"Orellana-Rodriguez, C., Diaz-Aviles, E., Nejdl, W. (2015). Mining affective context in short films for emotion-aware recommendation. In Proceedings of the 26th ACM Conference on Hypertext and Social Media (pp. 185\u2013194). new york.","DOI":"10.1145\/2700171.2791042"},{"key":"517_CR26","first-page":"1","volume":"39","author":"Y Pan","year":"2016","unstructured":"Pan, Y., He, F., Yu, H. (2016). Social recommendation algorithm using implicit similarity in trust. Chinese Journal of Computer, 39, 1\u201319.","journal-title":"Chinese Journal of Computer"},{"key":"517_CR27","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1023\/A:1006544522159","volume":"13","author":"M Pazzani","year":"1999","unstructured":"Pazzani, M. (1999). A framework for collaborative content-based and demographic filtering. Artificial Intelligence Review, 13, 393\u2013408.","journal-title":"Artificial Intelligence Review"},{"key":"517_CR28","first-page":"2403","volume":"34","author":"X Qi","year":"2011","unstructured":"Qi, X., Yang, C., Li, X., Chen, J. (2011). A trust calculating algorithm based on social networking service users context. Journal of Computer, 34, 2403\u20132413.","journal-title":"Journal of Computer"},{"key":"517_CR29","doi-asserted-by":"crossref","unstructured":"Qiu, X., Qian, P., Yin, L., Wu, S., Huang, X. (2015). Overview of the NLPCC 2015 shared task: Chinese word segmentation and POS tagging for micro-blog texts. In Proceedings of the 4th CCF Conference on Natural Language Processing and Chinese Computing (pp. 541\u2013549).","DOI":"10.1007\/978-3-319-25207-0_50"},{"key":"517_CR30","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-72079-9_9","volume":"4321","author":"J Schafer","year":"2007","unstructured":"Schafer, J., Frankowski, D., Herlocker, J., Sen, S. (2007). Collaborative filtering recommender systems. The Adaptive Web, 4321, 291\u2013324.","journal-title":"The Adaptive Web"},{"key":"517_CR31","unstructured":"Vagliano, I., Monti, D., Morisio, M. (2017). Semrevrec: a recommender system based on user reviews and linked data. In Proceedings of the Poster Track of the 11th ACM Conference on Recommender Systems (pp. 1\u20133). como."},{"key":"517_CR32","first-page":"193","volume":"36","author":"X Wang","year":"2015","unstructured":"Wang, X., Zhang, X., Wu, J. (2015). Collaborative filtering recommendation algorithm based on one-jump trust model. Journal of Communications, 36, 193\u2013200.","journal-title":"Journal of Communications"},{"key":"517_CR33","first-page":"1389","volume":"53","author":"R Wang","year":"2016","unstructured":"Wang, R., Jiang, Y., Li, Y., Lou, J. (2016). A collaborative filtering recommendation algorithm based on multiple social trusts. Journal of Computer Research Device, 53, 1389\u20131399.","journal-title":"Journal of Computer Research Device"},{"key":"517_CR34","doi-asserted-by":"publisher","first-page":"2412","DOI":"10.1109\/TFUZZ.2015.2426201","volume":"23","author":"D Wu","year":"2015","unstructured":"Wu, D., Lu, J., Zhang, G. (2015). A fuzzy tree matching-based personalized e-learning recommender system. IEEE Transactions on Fuzzy System, 23, 2412\u20132426.","journal-title":"IEEE Transactions on Fuzzy System"},{"key":"517_CR35","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ins.2015.02.019","volume":"306","author":"H Xia","year":"2015","unstructured":"Xia, H., Fang, B., Gao, M., Ma, H., Tang, Y., Wen, J. (2015). A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Information Sciences, 306, 150\u2013165.","journal-title":"Information Sciences"},{"key":"517_CR36","first-page":"180","volume":"27","author":"L Xu","year":"2008","unstructured":"Xu, L., Lin, H., Pan, Y. (2008). Constructing the affective lexicon ontology. Journal of The China Society for Scientific and Technical Information, 27, 180\u2013185.","journal-title":"Journal of The China Society for Scientific and Technical Information"},{"key":"517_CR37","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.knosys.2016.08.011","volume":"111","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Cai, Z., Guan, X. (2016). Estimating user behavior toward detecting anomalous ratings in rating systems. Knowledge-Based Systems, 111, 144\u2013158.","journal-title":"Knowledge-Based Systems"},{"key":"517_CR38","doi-asserted-by":"publisher","first-page":"25","DOI":"10.1016\/j.neucom.2017.02.052","volume":"240","author":"Z Yang","year":"2017","unstructured":"Yang, Z., Cai, Z., Yang, Y. (2017). Spotting anomalous ratings for rating systems by analyzing target users and items. Neurocomputing, 240, 25\u201346.","journal-title":"Neurocomputing"},{"key":"517_CR39","doi-asserted-by":"publisher","first-page":"217","DOI":"10.1016\/j.eswa.2015.09.012","volume":"44","author":"BY Yilmazel","year":"2016","unstructured":"Yilmazel, B. Y., & Kaleli, C. (2016). Robustness analysis of arbitrarily distributed data-based recommendation methods. Expert Systems with Applications, 44, 217\u2013229.","journal-title":"Expert Systems with Applications"},{"key":"517_CR40","first-page":"904","volume":"42","author":"G Yin","year":"2014","unstructured":"Yin, G., Zhang, Y., Dong, Y., Han, Q. (2014a). A constrained trust recommendation using probabilistic matrix factorization. Acta Electoral Sinica, 42, 904\u2013911.","journal-title":"Acta Electoral Sinica"},{"key":"517_CR41","first-page":"1953","volume":"25","author":"J Yin","year":"2014","unstructured":"Yin, J., Wang, Z., Li, Q., Su, W. (2014b). Personalized recommendation based on large-scale implicit feedback. Journal of Software, 25, 1953\u20131966.","journal-title":"Journal of Software"},{"key":"517_CR42","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1016\/j.knosys.2016.11.021","volume":"118","author":"F Zhang","year":"2017","unstructured":"Zhang, F., Lu, Y., Chen, J., Liu, S., Ling, Z. (2017a). Robust collaborative filtering based on non-negative matrix factorization and R1-norm. Knowledge-Based Systems, 118, 177\u2013190.","journal-title":"Knowledge-Based Systems"},{"key":"517_CR43","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Liu, Y., Z Jin, R. (2017b). Zhang, Selecting influential and trustworthy neighbors for collaborative filtering recommender systems. In Proceedings of the 7th IEEE Computing and Communication Workshop and Conference (pp. 1\u20137). las vegas.","DOI":"10.1109\/CCWC.2017.7868421"},{"key":"517_CR44","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.neucom.2015.12.137","volume":"210","author":"W Zhou","year":"2016","unstructured":"Zhou, W., Wen, J., Xiong, Q., Gao, M., Zeng, J. (2016). Svm-tia a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing, 210, 197\u2013205.","journal-title":"Neurocomputing"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-018-0517-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10844-018-0517-4\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-018-0517-4.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T20:00:12Z","timestamp":1751745612000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10844-018-0517-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,14]]},"references-count":44,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["517"],"URL":"https:\/\/doi.org\/10.1007\/s10844-018-0517-4","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"value":"0925-9902","type":"print"},{"value":"1573-7675","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,14]]},"assertion":[{"value":"6 February 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 June 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"6 July 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 July 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}