{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:37Z","timestamp":1764996937031},"reference-count":29,"publisher":"Springer Science and Business Media LLC","issue":"5-6","license":[{"start":{"date-parts":[[2012,4,14]],"date-time":"2012-04-14T00:00:00Z","timestamp":1334361600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1007\/s11280-012-0161-9","type":"journal-article","created":{"date-parts":[[2012,4,13]],"date-time":"2012-04-13T17:06:21Z","timestamp":1334336781000},"page":"677-699","source":"Crossref","is-referenced-by-count":36,"title":["Noisy but non-malicious user detection in social recommender systems"],"prefix":"10.1007","volume":"16","author":[{"given":"Bin","family":"Li","sequence":"first","affiliation":[]},{"given":"Ling","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Xingquan","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Chengqi","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,4,14]]},"reference":[{"key":"161_CR1","doi-asserted-by":"crossref","unstructured":"Amatriain, X., Pujol, J.M., Oliver, N.: I like it... I like it not: evaluating user ratings noise in recommender systems. In: Proc. of the First Int\u2019l Conf. on User Modeling, Adaptation, and Personalization (UMAP), pp. 247\u2013258 (2009)","DOI":"10.1007\/978-3-642-02247-0_24"},{"key":"161_CR2","doi-asserted-by":"crossref","unstructured":"Benevenuto, F., Rodrigues, T., Almeida, V., Almeida, J., Gon\u00e7alves, M.: Detecting spammers and content promoters in online video social networks. In: Proc. of the 32nd Int\u2019l ACM Conf. on Research and Development in Information Retrieval (SIGIR), pp.\u00a0620\u2013627 (2009)","DOI":"10.1145\/1571941.1572047"},{"key":"161_CR3","doi-asserted-by":"crossref","unstructured":"Brown, G., Howe, T., Ihbe, M., Prakash, A., Borders, K.: Social networks and context-aware spam. In: Proc. of the ACM Conf. on Computer Supported Cooperative Work (CSCW), pp.\u00a0403\u2013412 (2008)","DOI":"10.1145\/1460563.1460628"},{"key":"161_CR4","doi-asserted-by":"crossref","unstructured":"Burke, R., Mobasher, B., Williams, C., Bhaumik, R.: Classification features for attack detection in collaborative recommender systems. In: Proc. of the 12th ACM Int\u2019l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 542\u2013547 (2006)","DOI":"10.1145\/1150402.1150465"},{"key":"161_CR5","doi-asserted-by":"crossref","unstructured":"Chirita, P.A., Nejdl, W., Zamfir, C.: Preventing shilling attacks in online recommender systems. In: Proc. of the 7th ACM Int\u2019l Workshop on Web Information and Data Management (WIDM), pp. 67\u201374 (2005)","DOI":"10.1145\/1097047.1097061"},{"key":"161_CR6","doi-asserted-by":"crossref","unstructured":"Doyle, P.G., Snell, J.L.: Random Walks and Electric Networks. Mathematical Association of America (1984)","DOI":"10.5948\/UPO9781614440222"},{"key":"161_CR7","doi-asserted-by":"crossref","unstructured":"Guy, I., Carmel, D.: Social recommender systems. In: Proc. of the 20th Int\u2019l Conf. on World Wide Web (WWW), pp. 283\u2013284 (2011)","DOI":"10.1145\/1963192.1963312"},{"key":"161_CR8","doi-asserted-by":"crossref","unstructured":"Hurley, N.: Robustness of recommender systems. In: Proc. of the Fifth ACM Conf. on Recommender Systems (RecSys), pp. 9\u201310 (2011)","DOI":"10.1145\/2043932.2043937"},{"key":"161_CR9","doi-asserted-by":"crossref","unstructured":"Hurley, N., Cheng, Z., Zhang, M.: Statistical attack detection. In: Proc. of the Third ACM Conf. on Recommender Systems (RecSys), pp. 149\u2013156 (2009)","DOI":"10.1145\/1639714.1639740"},{"issue":"10","key":"161_CR10","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1145\/1290958.1290968","volume":"50","author":"TN Jagatic","year":"2007","unstructured":"Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Commun. ACM 50(10), 94\u2013100 (2007)","journal-title":"Commun. ACM"},{"key":"161_CR11","doi-asserted-by":"crossref","unstructured":"Jindal, N., Liu, B.: Review spam detection. In: Proc. of the 16th Int\u2019l Conf. on World Wide Web (WWW), pp. 1189\u20131190 (2007)","DOI":"10.1145\/1242572.1242759"},{"key":"161_CR12","doi-asserted-by":"crossref","unstructured":"Koutrika, G., Effendi, F.A., Gy\u00f6ngyi, Z., Heymann, P., Garcia-Molina, H.: Combating spam in tagging systems. In: Proc. of the 3rd Int\u2019l Workshop on Adversarial Information Retrieval on the Web (AIRWeb), pp.\u00a057\u201364 (2007)","DOI":"10.1145\/1244408.1244420"},{"key":"161_CR13","doi-asserted-by":"crossref","unstructured":"Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: Proc. of the 13th Int\u2019l Conf. on World Wide Web (WWW), pp. 393\u2013402 (2004)","DOI":"10.1145\/988672.988726"},{"key":"161_CR14","doi-asserted-by":"crossref","unstructured":"Lee, K., Caverlee, J., Webb, S.: Uncovering social spammers: social honeypots + machine learning. In: Proc. of the 33rd Int\u2019l ACM Conf. on Research and Development in Information Retrieval (SIGIR), pp.\u00a0435\u2013442 (2010)","DOI":"10.1145\/1835449.1835522"},{"key":"161_CR15","doi-asserted-by":"crossref","unstructured":"Li, B.: Cross-domain collaborative filtering: a brief survey. In: Proc. of the 23rd IEEE Int\u2019l Conf. on Tools with Artificial Intelligence (ICTAI), pp. 1085\u20131086 (2011)","DOI":"10.1109\/ICTAI.2011.184"},{"key":"161_CR16","unstructured":"Li, B., Yang, Q., Xue, X.: Can movies and books collaborate? Cross-domain collaborative filtering for sparsity reduction. In: Proc. of the 21st Int\u2019l Joint Conf. on Artificial Intelligence (IJCAI), pp. 2052\u20132057 (2009)"},{"key":"161_CR17","doi-asserted-by":"crossref","unstructured":"Lim, E.P., Nguyen, V.A., Jindal, N., Liu, B., Lauw, H.W.: Detecting product review spammers using rating behaviors. In: Proc. of the 19th ACM Int\u2019l Conf. on Information and Knowledge Management (CIKM), pp. 939\u2013948 (2010)","DOI":"10.1145\/1871437.1871557"},{"issue":"1","key":"161_CR18","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11280-008-0056-y","volume":"12","author":"Z Malik","year":"2009","unstructured":"Malik, Z., Bouguettaya, A.: Rater credibility assessment in web services interactions. World Wide Web 12(1), 3\u201325 (2009)","journal-title":"World Wide Web"},{"key":"161_CR19","unstructured":"Mehta, B.: Unsupervised shilling detection for collaborative filtering. In: Proc. of the 22nd National Conf. on Artificial Intelligence (AAAI), pp. 1402\u20131407 (2007)"},{"key":"161_CR20","doi-asserted-by":"crossref","unstructured":"Mehta, B., Hofmann, T., Fankhauser, P.: Lies and propaganda: detecting spam users in collaborative filtering. In: Proc. of the 12th Int\u2019l Conf. on Intelligent User Interfaces (IUI), pp. 14\u201321 (2007)","DOI":"10.1145\/1216295.1216307"},{"issue":"1\u20132","key":"161_CR21","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","volume":"19","author":"B Mehta","year":"2009","unstructured":"Mehta, B., Nejdl, W.: Unsupervised strategies for shilling detection and robust collaborative filtering. User Model. User-Adapt. Interact. 19(1\u20132), 65\u201397 (2009)","journal-title":"User Model. User-Adapt. Interact."},{"issue":"4","key":"161_CR22","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony, M., Hurley, N., Kushmerick, N., Silvestre, G.: Collaborative recommendation: a robustness analysis. ACM Trans. on Internet Tech. 4(4), 344\u2013377 (2004)","journal-title":"ACM Trans. on Internet Tech"},{"key":"161_CR23","unstructured":"O\u2019Mahony, M.P., Hurley, N.J., Silvestre, G.C.M.: Recommender systems: attack types and strategies. In: Proc. of the 20th National Conf. on Artificial Intelligence (AAAI), pp. 334\u2013339 (2005)"},{"key":"161_CR24","doi-asserted-by":"crossref","unstructured":"O\u2019Mahony, M.P., Hurley, N.J., Silvestre, G.C.M.: Detecting noise in recommender system databases. In: Proc. of the 11th Int\u2019l Conf. on Intelligent User Interfaces (IUI), pp. 109\u2013115 (2006)","DOI":"10.1145\/1111449.1111477"},{"key":"161_CR25","doi-asserted-by":"crossref","unstructured":"Resnick, P., Iacovou, N., Suchak, M., Bergstrom, P., Riedl, J.: Grouplens: an open architecture for collaborative filtering of netnews. In: Proc. of the ACM Conf. on Computer Supported Cooperative Work (CSCW), pp. 175\u2013186 (1994)","DOI":"10.1145\/192844.192905"},{"key":"161_CR26","doi-asserted-by":"crossref","unstructured":"Sarwar, B., Karypis, G., Konstan, J., Riedl, J.: Item-based collaborative filtering recommendation algorithms. In: Proc. of the 10th Int\u2019l Conf. on World Wide Web (WWW), pp.\u00a0285\u2013295 (2001)","DOI":"10.1145\/371920.372071"},{"issue":"3","key":"161_CR27","doi-asserted-by":"crossref","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","volume":"1","author":"CA Williams","year":"2007","unstructured":"Williams, C.A., Mobasher, B., Burke, R.: Defending recommender systems: detection of profile injection attacks. Service Oriented Comp. and Appl. 1(3), 157\u2013170 (2007)","journal-title":"Service Oriented Comp. and Appl"},{"issue":"1","key":"161_CR28","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1007\/s11280-011-0122-8","volume":"15","author":"J Yang","year":"2012","unstructured":"Yang, J., Fung, G.P.C., Lu, W., Zhou, X., Chen, H., Du, X.: Finding superior skyline points for multidimensional recommendation applications. World Wide Web 15(1), 33\u201360 (2012)","journal-title":"World Wide Web"},{"key":"161_CR29","unstructured":"Zhu, X.: Semi-supervised learning literature survey. Tech. Rep. 1530, Computer Sciences, University of Wisconsin-Madison (2005)"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-012-0161-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-012-0161-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-012-0161-9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,5]],"date-time":"2020-07-05T21:53:02Z","timestamp":1593985982000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-012-0161-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4,14]]},"references-count":29,"journal-issue":{"issue":"5-6","published-print":{"date-parts":[[2013,11]]}},"alternative-id":["161"],"URL":"https:\/\/doi.org\/10.1007\/s11280-012-0161-9","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"value":"1386-145X","type":"print"},{"value":"1573-1413","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,4,14]]}}}