{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T07:30:46Z","timestamp":1749713446511},"reference-count":49,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2019,4,1]],"date-time":"2019-04-01T00:00:00Z","timestamp":1554076800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2019,4]]},"DOI":"10.1007\/s11704-017-6566-y","type":"journal-article","created":{"date-parts":[[2018,5,11]],"date-time":"2018-05-11T02:07:38Z","timestamp":1526004458000},"page":"231-246","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["From similarity perspective: a robust collaborative filtering approach for service recommendations"],"prefix":"10.1007","volume":"13","author":[{"given":"Min","family":"Gao","sequence":"first","affiliation":[]},{"given":"Bin","family":"Ling","sequence":"additional","affiliation":[]},{"given":"Linda","family":"Yang","sequence":"additional","affiliation":[]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Qingyu","family":"Xiong","sequence":"additional","affiliation":[]},{"given":"Shun","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,11]]},"reference":[{"issue":"3","key":"6566_CR1","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1109\/TSC.2011.59","volume":"6","author":"Z B Zheng","year":"2013","unstructured":"Zheng Z B, Ma H, Lyu MR, King I. Collaborative Web service qos prediction via neighborhood integrated matrix factorization. IEEE Transactions on Services Computing, 2013, 6(3): 289\u2013299","journal-title":"IEEE Transactions on Services Computing"},{"key":"6566_CR2","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.knosys.2015.12.018","volume":"97","author":"A Hernando","year":"2016","unstructured":"Hernando A, Bobadilla J, Ortega F. A non negative matrix factorization for collaborative filtering recommender systems based on a Bayesian probabilistic model. Knowledge-Based Systems, 2016, 97: 188\u2013202","journal-title":"Knowledge-Based Systems"},{"issue":"1","key":"6566_CR3","doi-asserted-by":"publisher","first-page":"28","DOI":"10.1109\/TR.2015.2464075","volume":"65","author":"J L Xu","year":"2016","unstructured":"Xu J L, Zheng Z B, Lyu M R. Web service personalized quality of service prediction via reputation-based matrix factorization. IEEE Transactions on Reliability, 2016, 65(1): 28\u201337","journal-title":"IEEE Transactions on Reliability"},{"issue":"6","key":"6566_CR4","first-page":"907","volume":"17","author":"S H Jiang","year":"2015","unstructured":"Jiang S H, Qian X M, Shen J L, Fu Y, Mei T. Author topic modelbased collaborative filtering for personalized POI recommendations. IEEE Transactions on Multimedia, 2015, 17(6): 907\u2013918","journal-title":"IEEE Transactions on Multimedia"},{"key":"6566_CR5","first-page":"1388","volume-title":"Proceedings of AAAI Conference on Artificial Intelligence","author":"B Mobasher","year":"2006","unstructured":"Mobasher B, Burke R, Sandvig J J. Model-based collaborative filtering as a defense against profile injection attacks. In: Proceedings of AAAI Conference on Artificial Intelligence. 2006, 1388\u20131393"},{"key":"6566_CR6","doi-asserted-by":"crossref","first-page":"149","DOI":"10.1145\/1639714.1639740","volume-title":"Proceedings of the 3rd ACMConference on Recommender Systems","author":"N Hurley","year":"2009","unstructured":"Hurley N, Cheng Z P, Zhang M. Statistical attack detection. In: Proceedings of the 3rd ACMConference on Recommender Systems. 2009, 149\u2013156"},{"key":"6566_CR7","doi-asserted-by":"publisher","first-page":"517","DOI":"10.1145\/1148170.1148259","volume-title":"Proceedings of the 29th Annual ACM SIGIR Conference on Research and Development in Information Retrieval","author":"S Zhang","year":"2006","unstructured":"Zhang S, Ouyang Y, Ford J, Makedon F. Analysis of a low-dimensional linear model under recommendation attacks. In: Proceedings of the 29th Annual ACM SIGIR Conference on Research and Development in Information Retrieval. 2006, 517\u2013524"},{"key":"6566_CR8","doi-asserted-by":"crossref","first-page":"285","DOI":"10.1145\/371920.372071","volume-title":"Proceedings of the 10th International Conference on World Wide Web","author":"B Sarwar","year":"2001","unstructured":"Sarwar B, Karypis G, Konstan J, Riedl J. Item-based collaborative filtering recommendation algorithms. In: Proceedings of the 10th International Conference on World Wide Web. 2001, 285\u2013295"},{"issue":"4","key":"6566_CR9","doi-asserted-by":"publisher","first-page":"2301","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher B, Burke R, Bhaumik R, Williams C. Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT), 2007, 7(4): 2301\u20132338","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"issue":"3","key":"6566_CR10","doi-asserted-by":"publisher","first-page":"134","DOI":"10.1049\/iet-ifs.2015.0067","volume":"10","author":"Q Q Zhou","year":"2016","unstructured":"Zhou Q Q. Supervised approach for detecting average over popular items attack in collaborative recommender systems. IET Information Security, 2016, 10(3): 134\u2013141","journal-title":"IET Information Security"},{"key":"6566_CR11","first-page":"67","volume-title":"Proceedings of the 7th Workshop on Web Information and Data Management","author":"P A Chirita","year":"2005","unstructured":"Chirita P A, Nejdl W, Zamfir C. Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th Workshop on Web Information and Data Management. 2005, 67\u201374"},{"key":"6566_CR12","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1016\/j.knosys.2015.11.014","volume":"111","author":"Z H Yang","year":"2016","unstructured":"Yang Z H, Cai Z, Guan X H. Estimating user behavior toward detecting anomalous ratings in rating systems. Knowledge-Based Systems, 2016, 111: 114\u2013158","journal-title":"Knowledge-Based Systems"},{"key":"6566_CR13","first-page":"1","volume-title":"Proceedings of the 17th IEEE Conference on Information Fusion","author":"Z Zhang","year":"2014","unstructured":"Zhang Z, Kulkarni S R. Detection of shilling attacks in recommender systems via spectral clustering. In: Proceedings of the 17th IEEE Conference on Information Fusion. 2014, 1\u20138"},{"issue":"5","key":"6566_CR14","doi-asserted-by":"publisher","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","volume":"16","author":"J Cao","year":"2013","unstructured":"Cao J, Wu Z, Mao B, Zhang Y C. Shilling attack detection stilizing semi-supervised learning method for collaborative recommender system. World Wide Web, 2013, 16(5): 729\u2013748","journal-title":"World Wide Web"},{"key":"6566_CR15","first-page":"1039","volume-title":"Proceedings of IEEE Conference on Data Mining","author":"Z Wu","year":"2015","unstructured":"Wu Z, Wang Y Q, Wang Y Q, Wu J J, Cao J, Zhang L. Spammers detection from product reviews: a hybrid model. In: Proceedings of IEEE Conference on Data Mining. 2015, 1039\u20131044"},{"issue":"4","key":"6566_CR16","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1145\/1040830.1040870","volume":"39","author":"J O\u2019Donovan","year":"2005","unstructured":"O\u2019Donovan J, Smyth B. Trust in recommender Systems. In: Proceedings of the 10th Conference on Intelligent User Interfaces. 2005, 39(4): 167\u2013174","journal-title":"Proceedings of the 10th Conference on Intelligent User Interfaces"},{"issue":"21","key":"6566_CR17","doi-asserted-by":"publisher","first-page":"7386","DOI":"10.1016\/j.eswa.2015.05.027","volume":"42","author":"P Moradi","year":"2015","unstructured":"Moradi P, Ahmadian S. A reliability-based recommendation method to improve trust-aware recommender systems. Expert Systems with Applications, 2015, 42(21): 7386\u20137398","journal-title":"Expert Systems with Applications"},{"key":"6566_CR18","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ins.2015.02.019","volume":"306","author":"H Xia","year":"2015","unstructured":"Xia H, Fang B, Gao M, Ma H, Tang Y Y, Wen J. A novel item anomaly detection approach against Shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Information Sciences, 2015, 306: 150\u2013165","journal-title":"Information Sciences"},{"key":"6566_CR19","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1007\/11891321_6","volume-title":"Proceedings of Advances in Web Mining and Web Usage Analysis","author":"B Mobasher","year":"2006","unstructured":"Mobasher B, Burke R, Williams C, Bhaumik R. Analysis and detection of segment-focused attacks against collaborative recommendation. In: Proceedings of Advances in Web Mining and Web Usage Analysis. 2006, 96\u2013118"},{"key":"6566_CR20","first-page":"21","volume-title":"Proceedings of KDD Workshop on Web Mining and Web Usage Analysis","author":"B Mobasher","year":"2005","unstructured":"Mobasher B, Burke R, Bhaumik R, Williams C. Effective attack models for shilling item-based collaborative filtering systems. In: Proceedings of KDD Workshop on Web Mining and Web Usage Analysis. 2005, 21\u201328"},{"issue":"7","key":"6566_CR21","doi-asserted-by":"publisher","first-page":"1913","DOI":"10.1109\/TPDS.2013.308","volume":"25","author":"X Chen","year":"2014","unstructured":"Chen X, Zheng Z B, Yu Q, LyuM. R.Web service recommendation via exploiting location and qos information. IEEE Transactions on Parallel and Distributed Systems, 2014, 25(7): 1913\u20131924","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"6566_CR22","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1216295.1216307","volume-title":"Proceedings of the 12th ACM Conference on Intelligent User Interfaces","author":"B Mehta","year":"2007","unstructured":"Mehta B, Hofmann T, Fankhauser P. Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th ACM Conference on Intelligent User Interfaces. 2007, 14\u201321"},{"issue":"3","key":"6566_CR23","doi-asserted-by":"publisher","first-page":"824","DOI":"10.1109\/TPDS.2014.2312932","volume":"26","author":"G J Wang","year":"2015","unstructured":"Wang G J, Musau F, Guo S, Abdullahi M B. Neighbor similarity trust against sybil attack in P2P e-commerce. IEEE Transactions on Parallel and Distributed Systems, 2015, 26(3): 824\u2013833","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"issue":"4","key":"6566_CR24","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony M, Hurley N, Kushmerick N. Collaborative recommendation: a robustness analysis. ACM Transactions on Internet Technology, 2004, 4(4): 344\u2013377","journal-title":"ACM Transactions on Internet Technology"},{"issue":"6","key":"6566_CR25","doi-asserted-by":"publisher","first-page":"68008","DOI":"10.1209\/0295-5075\/88\/68008","volume":"88","author":"M S Shang","year":"2009","unstructured":"Shang M S, Lu L Y, Zeng W, Zhang Y C, Zhou T. Relevance is more significant than correlation: information filtering on sparse data. Europhysics Letters, 2009, 88(6): 68008","journal-title":"Europhysics Letters"},{"issue":"2","key":"6566_CR26","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.dss.2006.11.003","volume":"43","author":"C N Ziegler","year":"2007","unstructured":"Ziegler C N, Golbeck J, Investigating interactions of trust and interest similarity. Decision Support Systems, 2007, 43(2): 460\u2013475","journal-title":"Decision Support Systems"},{"key":"6566_CR27","doi-asserted-by":"publisher","first-page":"151","DOI":"10.1145\/1810617.1810643","volume-title":"Proceedings of the 21st ACM Conference on Hypertext and Hypermedia","author":"D H Lee","year":"2010","unstructured":"Lee D H, Brusilovsky P. Social networks and interest similarity: the case of CiteULike. In: Proceedings of the 21st ACM Conference on Hypertext and Hypermedia. 2010, 151\u2013156"},{"key":"6566_CR28","first-page":"13","volume-title":"Proceedings of the 10th ACM Conference on Ubiquitous Information Management and Communication","author":"H K Oh","year":"2016","unstructured":"Oh H K, Kim S W, Robust features for trustable aggregation of online ratings. In: Proceedings of the 10th ACM Conference on Ubiquitous Information Management and Communication. 2016, 13\u201319"},{"issue":"3","key":"6566_CR29","first-page":"231","volume":"1","author":"H P Kriegel","year":"2011","unstructured":"Kriegel H P, Kroger P, Sander J, Zimek A. Density-based clustering. Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery, 2011, 1(3): 231\u2013240","journal-title":"Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery"},{"key":"6566_CR30","first-page":"226","volume-title":"Proceedings of KDD Workshop on Web Mining and Web Usage Analysis","author":"M Ester","year":"1996","unstructured":"Ester M, Kriegel H P, Sander J, Xu X. A density-based algorithm for discovering clusters in large spatial databases with noise. In: Proceedings of KDD Workshop on Web Mining and Web Usage Analysis. 1996, 226\u2013231"},{"key":"6566_CR31","first-page":"1","volume-title":"Proceedings of SIAM Data Mining","author":"D Lemire","year":"2005","unstructured":"Lemire D, Maclachlan A. Slope one predictors for online rating-based collaborative filtering. In: Proceedings of SIAM Data Mining. 2005, 1\u20135"},{"key":"6566_CR32","first-page":"494","volume":"2453","author":"M P O\u2019Mahony","year":"2002","unstructured":"O\u2019Mahony M P, Hurley N J, Silvestre G C. Promoting recommendations: an attack on collaborative filtering. Database and Expert Systems Applications. Springer Berlin Heidelberg, 2002, 2453: 494\u2013503","journal-title":"Database and Expert Systems Applications. Springer Berlin Heidelberg"},{"issue":"3","key":"6566_CR33","doi-asserted-by":"publisher","first-page":"607","DOI":"10.1007\/s10115-012-0562-1","volume":"36","author":"J Cao","year":"2013","unstructured":"Cao J, Wu Z A, Wang Y Q, Zhuang Y. Hybrid collaborative filtering algorithm for bidirectional Web service recommendation. Knowledge and Information Systems, 2013, 36(3): 607\u2013627","journal-title":"Knowledge and Information Systems"},{"key":"6566_CR34","first-page":"42","volume-title":"Proceedings of the 20th IEEE Conference on Web Services","author":"L Yao","year":"2013","unstructured":"Yao L, Sheng Q Z, Segev A, Yu J. Recommending Web services via combining collaborative filtering with content-based features. In: Proceedings of the 20th IEEE Conference on Web Services. 2013, 42\u201349"},{"issue":"2","key":"6566_CR35","doi-asserted-by":"publisher","first-page":"140","DOI":"10.1109\/TSC.2010.52","volume":"4","author":"Z B Zheng","year":"2011","unstructured":"Zheng Z B, Ma H, Lyu M R, King l. QoS-aware Web service recommendation by collaborative filtering. IEEE Transaction on Services Computing, 2011, 4(2): 140\u2013152","journal-title":"IEEE Transaction on Services Computing"},{"issue":"4","key":"6566_CR36","doi-asserted-by":"publisher","first-page":"4049","DOI":"10.1016\/j.eswa.2011.09.096","volume":"39","author":"J J Jung","year":"2012","unstructured":"Jung J J, Attribute selection-based recommendation framework for short-head user group: an empirical study by movieLens and IMDB. Expert Systems with Applications, 2012, 39(4): 4049\u20134054","journal-title":"Expert Systems with Applications"},{"key":"6566_CR37","first-page":"445","volume-title":"Proceedings of IEEE Conference on Services Computing","author":"W G Rong","year":"2009","unstructured":"Rong W G, Liu K C, Liang L. Personalized Web service ranking via user group combining association rule. In: Proceedings of IEEE Conference on Services Computing. 2009, 445\u2013452"},{"issue":"6","key":"6566_CR38","doi-asserted-by":"publisher","first-page":"1265","DOI":"10.1007\/s10796-014-9495-4","volume":"17","author":"W G Rong","year":"2015","unstructured":"Rong W G, Peng B L, Ouyang Y, Liu K C, Xiong Z. Collaborative personal profiling for Web service ranking and recommendation. Information Systems Frontiers, 2015, 17(6): 1265\u20131282","journal-title":"Information Systems Frontiers"},{"key":"6566_CR39","first-page":"9","volume-title":"Proceedings of IEEE Conference on Web Services","author":"X Chen","year":"2010","unstructured":"Chen X, Liu X D, Huang Z C, Sun H L. Region kNN: a scalable hybrid collaborative filtering algorithm for personalized Web service recommendation. In: Proceedings of IEEE Conference on Web Services. 2010, 9\u201316"},{"key":"6566_CR40","first-page":"155","volume-title":"Proceedings of ACM Conference on Recommender Systems","author":"K O Bryan","year":"2008","unstructured":"Bryan K, O\u2019 Mahony M, Cunningham P. Unsupervised retrieval of attack profiles in collaborative recommender systems. In: Proceedings of ACM Conference on Recommender Systems. 2008, 155\u2013162"},{"key":"6566_CR41","first-page":"17","volume-title":"Proceedings of ACM Conference on Recommender Systems","author":"P Massa","year":"2007","unstructured":"Massa P, Avesani P. Trust-aware recommender systems. In: Proceedings of ACM Conference on Recommender Systems. 2007, 17\u201324"},{"issue":"8","key":"6566_CR42","first-page":"1415","volume":"29","author":"F G Zhang","year":"2008","unstructured":"Zhang F G. Research on trust based collaborative filtering algorithm for user\u2019s multiple interests. Journal of Chinese Computer System, 2008, 29(8): 1415\u20131419","journal-title":"Journal of Chinese Computer System"},{"key":"6566_CR43","first-page":"75","volume-title":"Proceedings of the 31st ACM Conference on Research and Development in Information Retrieval","author":"B Mehta","year":"2008","unstructured":"Mehta B, Nejdl W. Attack resistant collaborative filtering. In: Proceedings of the 31st ACM Conference on Research and Development in Information Retrieval. 2008, 75\u201382"},{"key":"6566_CR44","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/2043932.2043937","volume-title":"Proceedings of the 5th ACM Conference on Recommender System","author":"N J Hurley","year":"2011","unstructured":"Hurley N J, Robustness of recommender systems. In: Proceedings of the 5th ACM Conference on Recommender System. 2011, 9\u201310"},{"key":"6566_CR45","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/3-540-45748-8_24","volume-title":"Proceedings of International Workshop on Peer-to-peer Systems","author":"J R Douceur","year":"2002","unstructured":"Douceur J R. The sybil attack. In: Proceedings of International Workshop on Peer-to-peer Systems. 2002, 251\u2013260"},{"issue":"2","key":"6566_CR46","doi-asserted-by":"publisher","first-page":"293","DOI":"10.1016\/S1570-8705(03)00008-8","volume":"1","author":"C DavidW Karlof","year":"2003","unstructured":"Karlof C, DavidW. Secure routing in wireless sensor networks: attacks and countermeasures. Ad Hoc Networks, 2003, 1(2): 293\u2013315","journal-title":"Ad Hoc Networks"},{"key":"6566_CR47","doi-asserted-by":"crossref","first-page":"259","DOI":"10.1145\/984622.984660","volume-title":"Proceedings of the 3rd ACM International Symposium on Information Processing in Sensor Networks","author":"J Newsome","year":"2004","unstructured":"Newsome J, Shi E, Song D, Perrig A. The sybil attack in sensor networks: analysis & defenses. In: Proceedings of the 3rd ACM International Symposium on Information Processing in Sensor Networks. 2004, 259\u2013268"},{"key":"6566_CR48","first-page":"283","volume-title":"Proceedings of the 30th IEEE Symposium on Security and Privacy","author":"H F Yu","year":"2009","unstructured":"Yu H F, Shi C W, Kaminsky M, Gibbons P B, Xiao F. Dsybil: optimal sybil-resistance for recommendation systems. In: Proceedings of the 30th IEEE Symposium on Security and Privacy. 2009, 283\u2013298"},{"issue":"4","key":"6566_CR49","doi-asserted-by":"publisher","first-page":"1781","DOI":"10.1016\/j.eswa.2013.08.077","volume":"41","author":"G Noh","year":"2014","unstructured":"Noh G, Kang Y M, Oh H, Kim C K. Robust sybil attack defense with information level in online recommender systems. Expert Systems with Applications, 2014, 41(4): 1781\u20131791","journal-title":"Expert Systems with Applications"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-017-6566-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-017-6566-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-017-6566-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T17:56:37Z","timestamp":1720288597000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-017-6566-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4]]},"references-count":49,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2019,4]]}},"alternative-id":["6566"],"URL":"https:\/\/doi.org\/10.1007\/s11704-017-6566-y","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4]]},"assertion":[{"value":"1 December 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 February 2017","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}