{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,20]],"date-time":"2025-11-20T06:58:52Z","timestamp":1763621932648,"version":"build-2065373602"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T00:00:00Z","timestamp":1754870400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T00:00:00Z","timestamp":1754870400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072393","62072393","62072393","62072393","62072393"],"award-info":[{"award-number":["62072393","62072393","62072393","62072393","62072393"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Intell Inf Syst"],"published-print":{"date-parts":[[2025,12]]},"DOI":"10.1007\/s10844-025-00976-y","type":"journal-article","created":{"date-parts":[[2025,8,11]],"date-time":"2025-08-11T02:13:56Z","timestamp":1754878436000},"page":"2079-2107","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cross-distillation-based approach for detecting poisoning attacks in recommender systems"],"prefix":"10.1007","volume":"63","author":[{"given":"Zetian","family":"Wang","sequence":"first","affiliation":[]},{"given":"Weiming","family":"Song","sequence":"additional","affiliation":[]},{"given":"Peng","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ru","family":"Ma","sequence":"additional","affiliation":[]},{"given":"Fuzhi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,11]]},"reference":[{"key":"976_CR1","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3694784","volume":"43","author":"V Anand","year":"2025","unstructured":"Anand, V., & Maurya, A. K. (2025). A survey on recommender systems using graph neural network. ACM Transactions on Information Systems, 43, 1\u201349. https:\/\/doi.org\/10.1145\/3694784","journal-title":"ACM Transactions on Information Systems"},{"key":"976_CR2","doi-asserted-by":"publisher","unstructured":"Burke, R., Mobasher, B., Williams, C., & Bhaumik, R. (2006). Classification features for attack detection in collaborative recommender systems. In: Proc. of KDD-06. https:\/\/doi.org\/10.1145\/1150402.1150465","DOI":"10.1145\/1150402.1150465"},{"key":"976_CR3","doi-asserted-by":"publisher","unstructured":"Chen, K., Chan, P. P. K., & Yeung, D. S. (2018). Unsupervised shilling attack detection model based on rated item correlation analysis. In: Proc. of ICMLC. https:\/\/doi.org\/10.1109\/icmlc.2018.8526971","DOI":"10.1109\/icmlc.2018.8526971"},{"key":"976_CR4","doi-asserted-by":"publisher","first-page":"59","DOI":"10.1007\/s11257-023-09364-z","volume":"34","author":"Y Deldjoo","year":"2024","unstructured":"Deldjoo, Y., Jannach, D., Bellogin, A., Difonzo, A., & Zanzonelli, D. (2024). Fairness in recommender systems: research landscape and future directions. User Model User-Adapt Interact, 34, 59\u2013108. https:\/\/doi.org\/10.1007\/s11257-023-09364-z","journal-title":"User Model User-Adapt Interact"},{"key":"976_CR5","doi-asserted-by":"publisher","unstructured":"Dou, T., Yu, J., Xiong, Q., Gao, M., Song, Y., & Fang, Q. (2018). Collaborative shilling detection bridging factorization and user embedding. In: Proc. of COLLABORATECOM. https:\/\/doi.org\/10.1007\/978-3-030-00916-8_43","DOI":"10.1007\/978-3-030-00916-8_43"},{"key":"976_CR6","doi-asserted-by":"publisher","first-page":"1805","DOI":"10.3390\/sym12111805","volume":"12","author":"M Ebrahimian","year":"2020","unstructured":"Ebrahimian, M., & Kashef, R. (2020). Detecting shilling attacks using hybrid deep learning models. Symmetry, 12, 1805. https:\/\/doi.org\/10.3390\/sym12111805","journal-title":"Symmetry"},{"key":"976_CR7","doi-asserted-by":"publisher","unstructured":"Fang, M., Yang, G., Gong, N. Z., & Liu, J. (2018). Poisoning attacks to graph-based recommender systems. In: Proc. of ACSAC. https:\/\/doi.org\/10.1145\/3274694.3274706","DOI":"10.1145\/3274694.3274706"},{"key":"976_CR8","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1007\/s10844-018-0517-4","volume":"53","author":"L Guo","year":"2019","unstructured":"Guo, L., Liang, J., Zhu, Y., Luo, Y., Sun, L., & Zheng, X. (2019). Collaborative filtering recommendation based on trust and emotion. Journal of Intelligent Information System, 53, 113\u2013135. https:\/\/doi.org\/10.1007\/s10844-018-0517-4","journal-title":"Journal of Intelligent Information System"},{"key":"976_CR9","doi-asserted-by":"publisher","unstructured":"Guo, S., Bai, T., & Deng, W. (2023). Targeted shilling attacks on gnn-based recommender systems. In: Proc. of CIKM. https:\/\/doi.org\/10.1145\/3583780.361507","DOI":"10.1145\/3583780.361507"},{"key":"976_CR10","doi-asserted-by":"publisher","first-page":"8174603","DOI":"10.1155\/2018\/8174603","volume":"2018","author":"Y Hao","year":"2018","unstructured":"Hao, Y., Zhang, P., & Zhang, F. (2018). Multiview ensemble method for detecting shilling attacks in collaborative recommender systems. Security Communication Network, 2018, 8174603. https:\/\/doi.org\/10.1155\/2018\/8174603","journal-title":"Security Communication Network"},{"key":"976_CR11","doi-asserted-by":"publisher","DOI":"10.1016\/j.is.2022.102154","volume":"114","author":"Y Hao","year":"2023","unstructured":"Hao, Y., Meng, G., Wang, J., & Zong, C. (2023). A detection method for hybrid attacks in recommender systems. Information Systems, 114, Article 102154. https:\/\/doi.org\/10.1016\/j.is.2022.102154","journal-title":"Information Systems"},{"key":"976_CR12","doi-asserted-by":"publisher","first-page":"117","DOI":"10.1287\/ijoc.1100.0440","volume":"24","author":"JS Lee","year":"2012","unstructured":"Lee, J. S., & Zhu, D. (2012). Shilling attack detection\u2013a new approach for a trustworthy recommender system. INFORMS Journal on Computing, 24, 117\u2013131. https:\/\/doi.org\/10.1287\/ijoc.1100.0440","journal-title":"INFORMS Journal on Computing"},{"key":"976_CR13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2021.103051","volume":"63","author":"H Li","year":"2021","unstructured":"Li, H., Gao, M., Zhou, F., Wang, Y., Fan, Q., & Yang, L. (2021). Fusing hypergraph spectral features for shilling attack detection. Journal Information Security Application, 63, Article 103051. https:\/\/doi.org\/10.1016\/j.jisa.2021.103051","journal-title":"Journal Information Security Application"},{"key":"976_CR14","doi-asserted-by":"publisher","first-page":"2600","DOI":"10.1587\/transinf.2015edp7500","volume":"99","author":"W Li","year":"2016","unstructured":"Li, W., Gao, M., Li, H., Zeng, J., Xiong, Q., & Hirokawa, S. (2016). Shilling attack detection in recommender systems via selecting patterns analysis. IEICE Transactions on Information and Systems, 99, 2600\u20132611. https:\/\/doi.org\/10.1587\/transinf.2015edp7500","journal-title":"IEICE Transactions on Information and Systems"},{"key":"976_CR15","doi-asserted-by":"publisher","unstructured":"Lin, C., Chen, S., Li, H., Xiao, Y., Li, L., & Yang, Q. (2020). Attacking recommender systems with augmented user profiles. In: Proc. of CIKM. https:\/\/doi.org\/10.1145\/3340531.3411884","DOI":"10.1145\/3340531.3411884"},{"key":"976_CR16","doi-asserted-by":"publisher","first-page":"3399","DOI":"10.1007\/s11042-023-14687-2","volume":"37","author":"S Liu","year":"2025","unstructured":"Liu, S., Yu, S., Li, H., Yang, Z., Duan, M., & Liao, X. (2025). A novel shilling attack on black-box recommendation systems for multiple targets. Neural Computing Application, 37, 3399\u20133417. https:\/\/doi.org\/10.1007\/s11042-023-14687-2","journal-title":"Neural Computing Application"},{"key":"976_CR17","doi-asserted-by":"publisher","unstructured":"Mobasher, B., Burke, R., Bhaumik, R., & Williams, C. (2007). Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology, 7, 23\u2013es. https:\/\/doi.org\/10.1145\/1278366.1278372","DOI":"10.1145\/1278366.1278372"},{"key":"976_CR18","doi-asserted-by":"publisher","first-page":"321","DOI":"10.5829\/ije.2023.36.02b.12","volume":"36","author":"R Moradi","year":"2023","unstructured":"Moradi, R., & Hamidi, H. (2023). A new mechanism for detecting shilling attacks in recommender systems based on social network analysis and gaussian rough neural network with emotional learning. International Journal of Engineering, 36, 321\u2013334. https:\/\/doi.org\/10.5829\/ije.2023.36.02b.12","journal-title":"International Journal of Engineering"},{"key":"976_CR19","doi-asserted-by":"publisher","unstructured":"Nazary, F., Deldjoo, Y., & Noia, T. D. (2025). Poison-rag: Adversarial data poisoning attacks on retrieval-augmented generation in recommender systems. European Conference on Information Retrieval, (pp. 239\u2013251). https:\/\/doi.org\/10.48550\/arxiv.2501.11759","DOI":"10.48550\/arxiv.2501.11759"},{"key":"976_CR20","doi-asserted-by":"publisher","unstructured":"O\u2019Mahony, M. P., Hurley, N. J., & Silvestre, G. C. M. (2003). Collaborative filtering\u2013safe and sound? In: Proc. of ISMIS. https:\/\/doi.org\/10.1007\/978-3-540-39592-8_72","DOI":"10.1007\/978-3-540-39592-8_72"},{"key":"976_CR21","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2023.108673","volume":"108","author":"N Praveena","year":"2023","unstructured":"Praveena, N., Juneja, K., Rashid, M., Almagrabi, A. O., Sekaran, K., Ramalingam, R., & Usman, M. (2023). Hybrid gated recurrent unit and convolutional neural network-based deep learning mechanism for efficient shilling attack detection in social networks. Computers and Electrical Engineering, 108, Article 108673. https:\/\/doi.org\/10.1016\/j.compeleceng.2023.108673","journal-title":"Computers and Electrical Engineering"},{"key":"976_CR22","doi-asserted-by":"publisher","first-page":"7248","DOI":"10.3934\/mbe.2022342","volume":"19","author":"C Shao","year":"2022","unstructured":"Shao, C., & Sun, Y. (2022). Shilling attack detection for collaborative recommender systems: a gradient boosting method. Mathematical Biosciences and Engineering, 19, 7248\u20137271. https:\/\/doi.org\/10.3934\/mbe.2022342","journal-title":"Mathematical Biosciences and Engineering"},{"key":"976_CR23","doi-asserted-by":"publisher","first-page":"1197","DOI":"10.1007\/s12652-020-02164-y","volume":"12","author":"K Vivekanandan","year":"2021","unstructured":"Vivekanandan, K., & Praveena, N. (2021). Hybrid convolutional neural network (cnn) and long-short term memory (lstm) based deep learning model for detecting shilling attack in the social-aware network. Journal Ambient Intelligence Humaniz Computing, 12, 1197\u20131210. https:\/\/doi.org\/10.1007\/s12652-020-02164-y","journal-title":"Journal Ambient Intelligence Humaniz Computing"},{"key":"976_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.asoc.2022.108414","volume":"117","author":"J Wang","year":"2022","unstructured":"Wang, J., Gao, M., Wang, Z., Lin, C., Zhou, W., & Wen, J. (2022). Ada: Adversarial learning based data augmentation for malicious users detection. Applied Soft Computing, 117, Article 108414. https:\/\/doi.org\/10.1016\/j.asoc.2022.108414","journal-title":"Applied Soft Computing"},{"key":"976_CR25","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","volume":"1","author":"CA Williams","year":"2007","unstructured":"Williams, C. A., Mobasher, B., & Burke, R. (2007). Defending recommender systems: detection of profile injection attacks. Services Oriented Computer Applications, 1, 157\u2013170. https:\/\/doi.org\/10.1007\/s11761-007-0013-0","journal-title":"Services Oriented Computer Applications"},{"key":"976_CR26","doi-asserted-by":"publisher","first-page":"683","DOI":"10.1016\/j.ins.2021.07.041","volume":"578","author":"F Wu","year":"2021","unstructured":"Wu, F., Gao, M., Yu, J., Wang, Z., Liu, K., & Wang, X. (2021). Ready for emerging threats to recommender systems? a graph convolution-based generative shilling attack. Information Science, 578, 683\u2013701. https:\/\/doi.org\/10.1016\/j.ins.2021.07.041","journal-title":"Information Science"},{"key":"976_CR27","doi-asserted-by":"publisher","unstructured":"Wu, Z., Cao, J., Mao, B., & Wang, Y. (2011). Semi-sad: applying semi-supervised learning to shilling attack detection. In: Proc. of ACM RecSys. https:\/\/doi.org\/10.1145\/2043932.2043985","DOI":"10.1145\/2043932.2043985"},{"key":"976_CR28","doi-asserted-by":"publisher","unstructured":"Wu, Z., Wang, Y., Wang, Y., Wu, J., Cao, J., & Zhang, L. (2015). Spammers detection from product reviews: a hybrid model. In: Proc. of ICDM. https:\/\/doi.org\/10.1109\/icdm.2015.73","DOI":"10.1109\/icdm.2015.73"},{"key":"976_CR29","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10844-016-0424-5","volume":"48","author":"Z Yang","year":"2017","unstructured":"Yang, Z., & Cai, Z. (2017). Detecting abnormal profiles in collaborative filtering recommender systems. Journal of Intelligent Information System, 48, 499\u2013518. https:\/\/doi.org\/10.1007\/s10844-016-0424-5","journal-title":"Journal of Intelligent Information System"},{"key":"976_CR30","doi-asserted-by":"publisher","first-page":"144","DOI":"10.1016\/j.knosys.2016.08.011","volume":"111","author":"Z Yang","year":"2016","unstructured":"Yang, Z., Cai, Z., & Guan, X. (2016). Estimating user behavior toward detecting anomalous ratings in rating systems. Knowledge-Based System, 111, 144\u2013158. https:\/\/doi.org\/10.1016\/j.knosys.2016.08.011","journal-title":"Knowledge-Based System"},{"key":"976_CR31","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1016\/j.neucom.2018.05.001","volume":"308","author":"Z Yang","year":"2018","unstructured":"Yang, Z., Sun, Q., Zhang, Y., & Zhang, B. (2018). Uncovering anomalous rating behaviors for rating systems. Neurocomputing, 308, 205\u2013226. https:\/\/doi.org\/10.1016\/j.neucom.2018.05.001","journal-title":"Neurocomputing"},{"key":"976_CR32","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1007\/s10844-021-00689-y","volume":"59","author":"Z Yang","year":"2022","unstructured":"Yang, Z., Sun, Q., Liu, Z., Yan, J., & Zhang, Y. (2022). Rating behavior evaluation and abnormality forensics analysis for injection attack detection. Journal of Intelligent Information System, 59, 93\u2013119. https:\/\/doi.org\/10.1007\/s10844-021-00689-y","journal-title":"Journal of Intelligent Information System"},{"key":"976_CR33","doi-asserted-by":"publisher","unstructured":"You, X., Li, C., Ding, D., Zhang, M., Feng, F., Pan, X., & Yang, M. (2023). Anti-fakeu: Defending shilling attacks on graph neural network based recommender model. In: Proc. of WebSci. https:\/\/doi.org\/10.1145\/3543507.3583289","DOI":"10.1145\/3543507.3583289"},{"key":"976_CR34","doi-asserted-by":"publisher","unstructured":"Zhang, F., Qu, Y., Xu, Y., & Wang, S. (2020). Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems. Knowledge-Based System, 199, 105984. https:\/\/doi.org\/10.1016\/j.knosys.2020.105984","DOI":"10.1016\/j.knosys.2020.105984"},{"key":"976_CR35","doi-asserted-by":"publisher","first-page":"340","DOI":"10.1007\/s10489-025-06254-2","volume":"55","author":"Y Zhang","year":"2025","unstructured":"Zhang, Y., Hao, Q., Zheng, W., & Xiao, Y. (2025). User similarity-based graph convolutional neural network for shilling attack detection. Applied Intelligence, 55, 340. https:\/\/doi.org\/10.1007\/s10489-025-06254-2","journal-title":"Applied Intelligence"},{"key":"976_CR36","doi-asserted-by":"publisher","unstructured":"Zhang, Z., & Kulkarni, S. R. (2013). Graph-based detection of shilling attacks in recommender systems. In: Proc. of MLSP. https:\/\/doi.org\/10.1109\/mlsp.2013.6661953","DOI":"10.1109\/mlsp.2013.6661953"},{"key":"976_CR37","doi-asserted-by":"publisher","unstructured":"Zheng, P., Yuan, S., Wu, X., Li, J., & Lu, A. (2019). One-class adversarial nets for fraud detection. In: Proc. of AAAI. https:\/\/doi.org\/10.1609\/aaai.v33i01.33011286","DOI":"10.1609\/aaai.v33i01.33011286"}],"container-title":["Journal of Intelligent Information Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-025-00976-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10844-025-00976-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10844-025-00976-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,28]],"date-time":"2025-10-28T08:11:09Z","timestamp":1761639069000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10844-025-00976-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,11]]},"references-count":37,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2025,12]]}},"alternative-id":["976"],"URL":"https:\/\/doi.org\/10.1007\/s10844-025-00976-y","relation":{},"ISSN":["0925-9902","1573-7675"],"issn-type":[{"type":"print","value":"0925-9902"},{"type":"electronic","value":"1573-7675"}],"subject":[],"published":{"date-parts":[[2025,8,11]]},"assertion":[{"value":"11 March 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 July 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 July 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing Interest"}}]}}