{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:06:25Z","timestamp":1773655585058,"version":"3.50.1"},"reference-count":40,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:00Z","timestamp":1558396800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Ambient Intell Human Comput"],"published-print":{"date-parts":[[2020,6]]},"DOI":"10.1007\/s12652-019-01321-2","type":"journal-article","created":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T20:22:02Z","timestamp":1558556522000},"page":"2601-2611","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":29,"title":["Shilling attack detection in binary data: a classification approach"],"prefix":"10.1007","volume":"11","author":[{"given":"Zeynep","family":"Batmaz","sequence":"first","affiliation":[]},{"given":"Burcu","family":"Yilmazel","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6769-4594","authenticated-orcid":false,"given":"Cihan","family":"Kaleli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,5,21]]},"reference":[{"key":"1321_CR1","unstructured":"Batmaz Z (2015) Shilling attack design and detection on masked binary data. Master\u2019s thesis, Anadolu University, Turkey"},{"key":"1321_CR2","unstructured":"Bhaumik R, Williams C, Mobasher B, Burke R (2006) Securing collaborative filtering against malicious attacks through anomaly detection. In: Proceedings of the 4th workshop on intelligent techniques for web personalization, Boston, MA, USA"},{"key":"1321_CR3","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2014.05.257","volume":"31","author":"A Bilge","year":"2014","unstructured":"Bilge A, Ozdemir Z, Polat H (2014) A novel shilling attack detection method. Proc Comput Sci 31:165\u2013174","journal-title":"Proc Comput Sci"},{"key":"1321_CR4","doi-asserted-by":"crossref","unstructured":"Burke R, Mobasher B, Williams C, Bhaumik R (2006a) Classification features for attack detection in collaborative recommender systems. In: Proceedings of the 12th ACM SIGKDD international conference on knowledge discovery and data mining, Philadelphia, PA, USA, pp 542\u2013547","DOI":"10.1145\/1150402.1150465"},{"key":"1321_CR5","doi-asserted-by":"crossref","unstructured":"Burke R, Mobasher B, Williams C, Bhaumik R (2006b) Detecting profile injection attacks in collaborative recommender systems. In: Proceedings of the 8th IEEE international conference on E-commerce technology and the 3rd IEEE international conference on enterprise computing, E-commerce, and E-services, San Francisco, CA, USA","DOI":"10.1109\/CEC-EEE.2006.34"},{"key":"1321_CR6","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxy124","author":"H Cai","year":"2018","unstructured":"Cai H, Zhang F (2018) An unsupervised method for detecting shilling attacks in recommender systems by mining item relationship and identifying target items. Comput J. \nhttps:\/\/doi.org\/10.1093\/comjnl\/bxy124","journal-title":"Comput J"},{"key":"1321_CR7","doi-asserted-by":"crossref","unstructured":"Chen K, Chan PP, Yeung DS (2018a) Shilling attack detection using rated item correlation for collaborative filtering. In: IEEE international conference on systems, man, and cybernetics. Miyazaki, Japan, pp 3553\u20133558","DOI":"10.1109\/SMC.2018.00601"},{"key":"1321_CR8","doi-asserted-by":"crossref","unstructured":"Chen K, Chan PP, Yeung DS (2018b) Unsupervised shilling attack detection model based on rated item correlation analysis. In: 2018 International conference on machine learning and cybernetics, Chengdu, China, vol 2, pp 667\u2013672","DOI":"10.1109\/ICMLC.2018.8526971"},{"key":"1321_CR9","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-018-0861-2","author":"K Chen","year":"2018","unstructured":"Chen K, Chan PP, Zhang F, Li Q (2018c) Shilling attack based on item popularity and rated item correlation against collaborative filtering. Int J Mach Learn Cybern. \nhttps:\/\/doi.org\/10.1007\/s13042-018-0861-2","journal-title":"Int J Mach Learn Cybern"},{"key":"1321_CR10","doi-asserted-by":"crossref","unstructured":"Chirita PA, Nejdl W, Zamfir C (2005) Preventing shilling attacks in online recommender systems. In: Proceedings of the 7th annual ACM international workshop on web information and data management, Bremen, Germany, pp 67\u201374","DOI":"10.1145\/1097047.1097061"},{"key":"1321_CR11","doi-asserted-by":"publisher","DOI":"10.1155\/2014\/845897","author":"M Gao","year":"2014","unstructured":"Gao M, Yuan Q, Ling B, Xiong Q (2014) Detection of abnormal item based on time intervals for recommender systems. Sci World J. \nhttps:\/\/doi.org\/10.1155\/2014\/845897","journal-title":"Sci World J"},{"issue":"4","key":"1321_CR12","doi-asserted-by":"publisher","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","volume":"42","author":"I Gunes","year":"2014","unstructured":"Gunes I, Kaleli C, Bilge A, Polat H (2014) Shilling attacks against recommender systems: a comprehensive survey. Artif Intell Rev 42(4):767\u2013799. \nhttps:\/\/doi.org\/10.1007\/s10462-012-9364-9","journal-title":"Artif Intell Rev"},{"key":"1321_CR13","doi-asserted-by":"publisher","DOI":"10.1155\/2018\/8174603","author":"Y Hao","year":"2018","unstructured":"Hao Y, Zhang P, Zhang F (2018) Multiview ensemble method for detecting shilling attacks in collaborative recommender systems. Secur Commun Netw. \nhttps:\/\/doi.org\/10.1155\/2018\/8174603","journal-title":"Secur Commun Netw"},{"key":"1321_CR14","doi-asserted-by":"crossref","unstructured":"He F, Wang X, Liu B (2010) Attack detection by rough set theory in recommendation system. In: Proceedings of the 2010 IEEE international conference on granular computing, San Jose, CA, USA, pp 692\u2013695","DOI":"10.1109\/GrC.2010.130"},{"key":"1321_CR15","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-018-0928-7","author":"L Jiang","year":"2018","unstructured":"Jiang L, Cheng Y, Yang L, Li J, Yan H, Wang X (2018) A trust-based collaborative filtering algorithm for e-commerce recommendation system. J Ambient Intel Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-018-0928-7","journal-title":"J Ambient Intel Humaniz Comput"},{"key":"1321_CR16","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/978-3-642-39878-0_19","volume":"152","author":"C Kaleli","year":"2013","unstructured":"Kaleli C, Polat H (2013) Robustness analysis of na\u00efve bayesian classifier-based collaborative filtering. Lect Notes Bus Inf 152:202\u2013209. \nhttps:\/\/doi.org\/10.1007\/978-3-642-39878-0_19","journal-title":"Lect Notes Bus Inf"},{"key":"1321_CR17","unstructured":"Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: Proceedings of the 13th international conference on world wide web, New York, NY, USA, pp 393\u2013402"},{"key":"1321_CR18","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-019-01226-0","author":"S Lee","year":"2019","unstructured":"Lee S (2019) Using entropy for similarity measures in collaborative filtering. J Ambient Intel Humaniz Comput. \nhttps:\/\/doi.org\/10.1007\/s12652-019-01226-0","journal-title":"J Ambient Intel Humaniz Comput"},{"issue":"1\u20132","key":"1321_CR19","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","volume":"19","author":"B Mehta","year":"2009","unstructured":"Mehta B, Nejdl W (2009) Unsupervised strategies for shilling detection and robust collaborative filtering. User Model User Adapt Interact 19(1\u20132):65\u201397. \nhttps:\/\/doi.org\/10.1007\/s11257-008-9050-4","journal-title":"User Model User Adapt Interact"},{"key":"1321_CR20","doi-asserted-by":"crossref","unstructured":"Mehta B, Hofmann T, Fankhauser P (2007) Lies and propaganda: detecting spam users in collaborative filtering. In: Proceedings of the 12th international conference on intelligent user interfaces, Honolulu, HI, USA, pp 14\u201321","DOI":"10.1145\/1216295.1216307"},{"key":"1321_CR21","doi-asserted-by":"crossref","unstructured":"Miyahara K, Pazzani MJ (2000) Collaborative filtering with the simple bayesian classifier. In: Proceedings of the 6th pacific rim international conference on artificial intelligence, Melbourne, Australia, pp 679\u2013689","DOI":"10.1007\/3-540-44533-1_68"},{"key":"1321_CR22","doi-asserted-by":"crossref","unstructured":"Mobasher B, Burke R, Williams C, Bhaumik R (2006) Analysis and detection of segment-focused attacks against collaborative recommendation. In: Proceedings of the 7th international conference on knowledge discovery on the web: advances in web mining and web usage analysis, Chicago, IL, USA, pp 96\u2013118","DOI":"10.1007\/11891321_6"},{"issue":"4","key":"1321_CR23","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1145\/1278366.1278372","volume":"7","author":"B Mobasher","year":"2007","unstructured":"Mobasher B, Burke RD, Bhaumik R, Williams C (2007) Toward trustworthy recommender systems: an analysis of attack models and algorithm robustness. ACM Trans Internet Technol 7(4):23. \nhttps:\/\/doi.org\/10.1145\/1278366.1278372","journal-title":"ACM Trans Internet Technol"},{"issue":"2","key":"1321_CR24","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1007\/s10791-013-9224-5","volume":"17","author":"MA Morid","year":"2014","unstructured":"Morid MA, Shajari M, Hashemi AR (2014) Defending recommender systems by influence analysis. Inf Retr 17(2):137\u2013152. \nhttps:\/\/doi.org\/10.1007\/s10791-013-9224-5","journal-title":"Inf Retr"},{"key":"1321_CR25","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116","author":"M Si","year":"2018","unstructured":"Si M, Li Q (2018) Collaborative recommendation: a robustness analysis. Artif Intell Rev. \nhttps:\/\/doi.org\/10.1145\/1031114.1031116","journal-title":"Artif Intell Rev"},{"key":"1321_CR26","unstructured":"Verstrepen K (2015) Collaborative filtering with binary, positive-only data. PhD thesis, Antwerp University, Belgium"},{"key":"1321_CR27","unstructured":"Williams CA, Mobasher B (2006) Profile injection attack detection for securing collaborative recommender systems. DePaul University CTI Technical Report pp 1\u201347"},{"issue":"3","key":"1321_CR28","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/s11761-007-0013-0","volume":"1","author":"CA Williams","year":"2007","unstructured":"Williams CA, Mobasher B, Burke R (2007) Defending recommender systems: detection of profile injection attacks. Serv Oriented Comput Appl 1(3):157\u2013170. \nhttps:\/\/doi.org\/10.1007\/s11761-007-0013-0","journal-title":"Serv Oriented Comput Appl"},{"key":"1321_CR29","doi-asserted-by":"publisher","DOI":"10.1109\/TCYB.2018.2877161","author":"Z Wu","year":"2018","unstructured":"Wu Z, Cao J, Wang Y, Wang Y, Zhang L, Wu J (2018) hPSD: a hybrid PU-learning-based spammer detection model for product reviews. IEEE Trans Cybern. \nhttps:\/\/doi.org\/10.1109\/TCYB.2018.2877161","journal-title":"IEEE Trans Cybern"},{"issue":"C","key":"1321_CR30","doi-asserted-by":"publisher","first-page":"150","DOI":"10.1016\/j.ins.2015.02.019","volume":"306","author":"H Xia","year":"2015","unstructured":"Xia H, Fang B, Gao M, Ma H, Tang Y, Wen J (2015) A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique. Inf Sci 306(C):150\u2013165. \nhttps:\/\/doi.org\/10.1016\/j.ins.2015.02.019","journal-title":"Inf Sci"},{"key":"1321_CR31","doi-asserted-by":"crossref","unstructured":"Yang F, Gao M, Yu J, Song Y, Wang X (2018) Detection of shilling attack based on bayesian model and user embedding. In: IEEE 30th international conference on tools with artificial intelligence. Volos, Greece, pp 639\u2013646","DOI":"10.1109\/ICTAI.2018.00102"},{"issue":"6","key":"1321_CR32","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1049\/iet-ifs.2016.0345","volume":"11","author":"L Yang","year":"2017","unstructured":"Yang L, Huang W, Niu X (2017) Defending shilling attacks in recommender systems using soft co-clustering. IET Inf Secur 11(6):319\u2013325. \nhttps:\/\/doi.org\/10.1049\/iet-ifs.2016.0345","journal-title":"IET Inf Secur"},{"issue":"3","key":"1321_CR33","doi-asserted-by":"publisher","first-page":"499","DOI":"10.1007\/s10844-016-0424-5","volume":"48","author":"Z Yang","year":"2017","unstructured":"Yang Z, Cai Z (2017) Detecting abnormal profiles in collaborative filtering recommender systems. J Intell Inf Syst 48(3):499\u2013518. \nhttps:\/\/doi.org\/10.1007\/s10844-016-0424-5","journal-title":"J Intell Inf Syst"},{"key":"1321_CR34","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1016\/j.knosys.2016.02.008","volume":"100","author":"Z Yang","year":"2016","unstructured":"Yang Z, Xu L, Cai Z, Xu Z (2016) Re-scale adaboost for attack detection in collaborative filtering recommender systems. Knowl Based Syst 100:74\u201388. \nhttps:\/\/doi.org\/10.1016\/j.knosys.2016.02.008","journal-title":"Knowl Based Syst"},{"issue":"7","key":"1321_CR35","doi-asserted-by":"publisher","first-page":"680","DOI":"10.1002\/sec.1389","volume":"9","author":"F Zhang","year":"2016","unstructured":"Zhang F, Chen H (2016) An ensemble method for detecting shilling attacks based on ordered item sequences. Secur Commun Netw 9(7):680\u2013696. \nhttps:\/\/doi.org\/10.1002\/sec.1389","journal-title":"Secur Commun Netw"},{"key":"1321_CR36","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1016\/j.knosys.2014.04.020","volume":"65","author":"F Zhang","year":"2014","unstructured":"Zhang F, Zhou Q (2014) HHT-SVM: an online method for detecting profile injection attacks in collaborative recommender systems. Knowl Based Syst 65:96\u2013105. \nhttps:\/\/doi.org\/10.1016\/j.knosys.2014.04.020","journal-title":"Knowl Based Syst"},{"issue":"1","key":"1321_CR37","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1049\/iet-ifs.2013.0145","volume":"9","author":"F Zhang","year":"2015","unstructured":"Zhang F, Zhou Q (2015) Ensemble detection model for profile injection attacks in collaborative recommender systems based on bp neural network. IET Inf Secur 9(1):24\u201331. \nhttps:\/\/doi.org\/10.1049\/iet-ifs.2013.0145","journal-title":"IET Inf Secur"},{"key":"1321_CR38","doi-asserted-by":"crossref","unstructured":"Zhang F, Deng ZJ, He ZM, Lin XC, Sun LL (2018a) Detection of shilling attack in collaborative filtering recommender system by pca and data complexity. In: 2018 international conference on machine learning and cybernetics, Chengdu, China, vol 2, pp 673\u2013678","DOI":"10.1109\/ICMLC.2018.8526965"},{"key":"1321_CR39","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.knosys.2018.02.032","volume":"148","author":"F Zhang","year":"2018","unstructured":"Zhang F, Zhang Z, Zhang P, Wang S (2018b) UD-HMM: an unsupervised method for shilling attack detection based on hidden markov model and hierarchical clustering. Knowl Based Syst 148:146\u2013166. \nhttps:\/\/doi.org\/10.1016\/j.knosys.2018.02.032","journal-title":"Knowl Based Syst"},{"key":"1321_CR40","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1016\/j.neucom.2015.12.137","volume":"210","author":"W Zhou","year":"2016","unstructured":"Zhou W, Wen J, Xiong Q, Gao M, Zeng J (2016) SVM-TIA a shilling attack detection method based on svm and target item analysis in recommender systems. Neurocomputing 210:197\u2013205. \nhttps:\/\/doi.org\/10.1016\/j.neucom.2015.12.137","journal-title":"Neurocomputing"}],"container-title":["Journal of Ambient Intelligence and Humanized Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01321-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s12652-019-01321-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s12652-019-01321-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T17:12:35Z","timestamp":1590858755000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s12652-019-01321-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,21]]},"references-count":40,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2020,6]]}},"alternative-id":["1321"],"URL":"https:\/\/doi.org\/10.1007\/s12652-019-01321-2","relation":{},"ISSN":["1868-5137","1868-5145"],"issn-type":[{"value":"1868-5137","type":"print"},{"value":"1868-5145","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,21]]},"assertion":[{"value":"26 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"14 May 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 May 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}