{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T09:46:17Z","timestamp":1770457577286,"version":"3.49.0"},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T00:00:00Z","timestamp":1618444800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Complex Intell. Syst."],"published-print":{"date-parts":[[2023,6]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Shilling attacks have been a significant vulnerability of collaborative filtering (CF) recommender systems, and trust in CF recommender algorithms has been proven to be helpful for improving the accuracy of system recommendations. As a few studies have been devoted to trust in this area, we explore the benefits of using trust to resist shilling attacks. Rather than simply using user-generated trust values, we propose the genre trust degree, which differ in terms of the genres of items and take both trust value and user credibility into consideration. This paper introduces different types of shilling attack methods in an attempt to study the impact of users\u2019 trust values and behavior features on defending against shilling attacks. Meanwhile, it improves the approach used to calculate user similarities to form a recommendation model based on genre trust degrees. The performance of the genre trust-based recommender system is evaluated on the Ciao dataset. Experimental results demonstrated the superior and comparable genre trust degrees recommended for defending against different types of shilling attacks.<\/jats:p>","DOI":"10.1007\/s40747-021-00357-2","type":"journal-article","created":{"date-parts":[[2021,4,15]],"date-time":"2021-04-15T12:49:43Z","timestamp":1618490983000},"page":"2929-2942","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A genre trust model for defending shilling attacks in recommender systems"],"prefix":"10.1007","volume":"9","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5634-0245","authenticated-orcid":false,"given":"Li","family":"Yang","sequence":"first","affiliation":[]},{"given":"Xinxin","family":"Niu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,15]]},"reference":[{"key":"357_CR1","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1007\/s41060-017-0049-y","volume":"3","author":"V Faridani","year":"2017","unstructured":"Faridani V, Jalali M, Jahan MV (2017) Collaborative filtering-based recommender systems by effective trust. Int J Data Sci Anal 3:297\u2013307","journal-title":"Int J Data Sci Anal"},{"key":"357_CR2","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1594173.1594174","volume":"3","author":"J Golbeck","year":"2009","unstructured":"Golbeck J (2009) Trust and nuanced profile similarity in online social networks. ACM Trans Web 3:1\u201333","journal-title":"ACM Trans Web"},{"key":"357_CR3","doi-asserted-by":"publisher","first-page":"460","DOI":"10.1016\/j.dss.2006.11.003","volume":"43","author":"C Ziegler","year":"2007","unstructured":"Ziegler C, Golbeck J (2007) Investigating interactions of trust and interest similarity. Decis Support Syst 43:460\u2013475","journal-title":"Decis Support Syst"},{"key":"357_CR4","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1016\/j.ijinfomgt.2017.07.002","volume":"38","author":"H Hallikainen","year":"2018","unstructured":"Hallikainen H, Laukkanen T (2018) National culture and consumer trust in e-commerce. Int J Inf Manag 38:97\u2013106","journal-title":"Int J Inf Manag"},{"key":"357_CR5","doi-asserted-by":"publisher","first-page":"458","DOI":"10.1007\/s11518-018-5374-8","volume":"27","author":"Y Wang","year":"2018","unstructured":"Wang Y, Qian L, Li F, Zhang L (2018) A comparative study on shilling detection methods for trustworthy recommendations. J Syst Sci Syst Eng 27:458\u2013478","journal-title":"J Syst Sci Syst Eng"},{"key":"357_CR6","doi-asserted-by":"publisher","first-page":"345","DOI":"10.1109\/TLT.2015.2419262","volume":"8","author":"XL Zheng","year":"2015","unstructured":"Zheng XL, Chen CC, Hung JL (2015) A hybrid trust-based recommender system for online communities of practice. IEEE Trans Learn Technol 8:345\u2013356","journal-title":"IEEE Trans Learn Technol"},{"key":"357_CR7","doi-asserted-by":"publisher","first-page":"1164","DOI":"10.1109\/TNNLS.2016.2514368","volume":"28","author":"S Deng","year":"2017","unstructured":"Deng S, Huang L, Xu G (2017) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst 28:1164\u20131177","journal-title":"IEEE Trans Neural Netw Learn Syst"},{"key":"357_CR8","doi-asserted-by":"crossref","unstructured":"Borzymek P, Sydow M, Wierzbicki A (2009) Enriching trust prediction model in social network with user rating similarity. In: International Conference on Computational Aspects of Social Networks, Fontainebleau, France, 24\u201327 June, pp 40\u201347","DOI":"10.1109\/CASoN.2009.30"},{"key":"357_CR9","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.knosys.2017.01.027","volume":"122","author":"G Guo","year":"2017","unstructured":"Guo G, Zhang J, Zhu F, Wang X (2017) Factored similarity models with social trust for top-n item recommendation. Knowl Based Syst 122:17\u201325","journal-title":"Knowl Based Syst"},{"key":"357_CR10","doi-asserted-by":"crossref","unstructured":"Ma H, Lyu MR, King I (2009) Learning to recommend with trust and distrust relationships. In: Recsys Proceedings of the Third Acm Conference on Recommender Systems, New York, USA, October 23\u201325, pp 189\u2013196","DOI":"10.1145\/1639714.1639746"},{"key":"357_CR11","unstructured":"Lee J, Lebanon G, Singer Y (2013) Local low-rank matrix approximation. In: The 30th international conference on machine learning, New York, USA, May, pp 741\u2013749."},{"key":"357_CR12","unstructured":"Mackey LW, Jordan MI, Talwalkar A (2011) Divide-and-conquer matrix factorization. Adv Neural Inf Process Syst, pp 1134\u20131142"},{"key":"357_CR13","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1145\/1031114.1031116","volume":"4","author":"M O\u2019Mahony","year":"2004","unstructured":"O\u2019Mahony M, Hurley N, Kushmerick N (2004) Collaborative recommendation:a robustness analysis. ACM Trans Inter Tech 4:344\u2013377","journal-title":"ACM Trans Inter Tech"},{"key":"357_CR14","doi-asserted-by":"crossref","unstructured":"Mehta B, Hofmann T, Fankhauser P (2007) Lies and propaganda:detecting spam users in collaborative filtering. International Conference on Intelligent User Interfaces. Hawaii, USA, January 28\u201331, pp 14\u201321","DOI":"10.1145\/1216295.1216307"},{"key":"357_CR15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.18848\/2327-7998\/CGP\/v18i02\/1-19","volume":"18","author":"JM Alostad","year":"2019","unstructured":"Alostad JM (2019) Improving the shilling attack detection in recommender systems using an SVM Gaussian mixture model. J Inf Knowl Manag 18:1\u201318","journal-title":"J Inf Knowl Manag"},{"key":"357_CR16","first-page":"629","volume-title":"Shilling attack detection in recommender system using PCA and SVM Emerging Technologies in data mining and information security","author":"N Samaiya","year":"2019","unstructured":"Samaiya N, Raghuwanshi SK, Pateriya RK (2019) Shilling attack detection in recommender system using PCA and SVM Emerging Technologies in data mining and information security. Springer, Singapore, pp 629\u2013637"},{"key":"357_CR17","doi-asserted-by":"crossref","unstructured":"Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. The 13th international conference on World Wide Web. New York, USA, May 17\u201320, pp 393\u2013402","DOI":"10.1145\/988672.988726"},{"key":"357_CR18","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1016\/j.eswa.2019.112880","volume":"140","author":"L Ardissono","year":"2020","unstructured":"Ardissono L, Mauro N (2020) A compositional model of multi-faceted trust for personalized item recommendation. Expert Syst Appl 140:1\u201367","journal-title":"Expert Syst Appl"},{"key":"357_CR19","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1016\/j.is.2018.05.008","volume":"77","author":"L Jaehoon","year":"2018","unstructured":"Jaehoon L, Giseop N, Hayoung O (2018) Trustor clustering with an improved recommender system based on social relationships. Inf Syst 77:118\u2013128","journal-title":"Inf Syst"},{"key":"357_CR20","doi-asserted-by":"crossref","unstructured":"Pan Y, He F, Yu H (2018) An adaptive method to learn directive trust strength for trust-aware recommender systems. In: 22nd international conference on computer supported cooperative work in design, Nanjing, China, May 9\u201311, pp 10\u201316","DOI":"10.1109\/CSCWD.2018.8465255"},{"key":"357_CR21","first-page":"213","volume":"13","author":"D Gambetta","year":"2000","unstructured":"Gambetta D (2000) Trust: making and breaking cooperative relations. Br J Sociol 13:213\u2013237","journal-title":"Br J Sociol"},{"key":"357_CR22","volume-title":"The meanings of trust","author":"DH McKnight","year":"1996","unstructured":"McKnight DH, Chervany NL (1996) The meanings of trust. Springer, New York"},{"key":"357_CR23","doi-asserted-by":"crossref","unstructured":"Lathia N, Hailes S, Capra L (2008) Trust-based collaborative filtering. In: IFIP international conference on trust management, Trondheim, Norway, June 18\u201320","DOI":"10.1007\/978-0-387-09428-1_8"},{"key":"357_CR24","doi-asserted-by":"publisher","first-page":"768","DOI":"10.1016\/j.dss.2012.09.005","volume":"54","author":"Q Shambour","year":"2012","unstructured":"Shambour Q, Lu J (2012) A trust-semantic fusion-based recommendation approach for e-business applications. Decis Support Syst 54:768\u2013780","journal-title":"Decis Support Syst"},{"key":"357_CR25","doi-asserted-by":"crossref","unstructured":"Guo G (2013) Integrating trust and similarity to ameliorate the data sparsity and cold start for recommender systems. In: The 7th ACM conference on recommender systems, HongKong, China, October 12\u201316, pp 451\u2013454","DOI":"10.1145\/2507157.2508071"},{"key":"357_CR26","doi-asserted-by":"publisher","first-page":"618","DOI":"10.1016\/j.dss.2005.05.019","volume":"43","author":"A J\u00f8sang","year":"2007","unstructured":"J\u00f8sang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43:618\u2013644","journal-title":"Decis Support Syst"},{"key":"357_CR27","first-page":"1","volume":"1","author":"W Peng","year":"2019","unstructured":"Peng W, Xin B (2019) SPMF: a social trust and preference segmentation-based matrix factorization recommendation algorithm. EURASIP J Wirel Commun Netw 1:1\u201312","journal-title":"EURASIP J Wirel Commun Netw"},{"key":"357_CR28","doi-asserted-by":"publisher","first-page":"743","DOI":"10.1007\/s10796-014-9522-5","volume":"17","author":"F Cerutti","year":"2015","unstructured":"Cerutti F, Kaplan LM, Norman TJ (2015) Subjective logic operators in trust assessment: an empirical study. Inf Syst Front 17:743\u2013762","journal-title":"Inf Syst Front"},{"key":"357_CR29","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1016\/j.comnet.2017.04.016","volume":"120","author":"Z Bo","year":"2017","unstructured":"Bo Z, Zhang H, Li M (2017) Trust Traversal: a trust link detection scheme in social network. Comput Netw 120:105\u2013125","journal-title":"Comput Netw"},{"key":"357_CR30","doi-asserted-by":"crossref","unstructured":"Papagelis M, Plexousakis D, Kutsuras T (2005) Alleviating the sparsity problem of collaborative filtering using trust inferences. Trust management, Paris, France, May 23\u201326, pp 224\u2013239","DOI":"10.1007\/11429760_16"},{"key":"357_CR31","doi-asserted-by":"publisher","first-page":"33","DOI":"10.52041\/serj.v8i2.394","volume":"8","author":"A Sotos","year":"2009","unstructured":"Sotos A, Vanhoof W, Noortgate W, Onghena P (2009) The transitivity misconception of pearson\u2019s correlation coefficient. Stat Educ Res J 8:33\u201355","journal-title":"Stat Educ Res J"},{"key":"357_CR32","doi-asserted-by":"crossref","unstructured":"Hwang CS, Chen YP (2007) Using trust in collaborative filtering recommendation. In: New trends in applied artificial intelligence, Kyoto, Japan, June 26\u201329, pp 1052\u20131060","DOI":"10.1007\/978-3-540-73325-6_105"},{"key":"357_CR33","unstructured":"Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: The 33rd annual Hawaii international conference on system sciences, Hawaii, USA, January"},{"key":"357_CR34","doi-asserted-by":"crossref","unstructured":"Hurley N, Cheng M, Zhang M (2009) Statistical attack detection. RecSys\u201909, New York, USA, October, pp 149\u2013156","DOI":"10.1145\/1639714.1639740"},{"key":"357_CR35","doi-asserted-by":"crossref","unstructured":"Cosley D, Lam SK, Albert I (2003) Is seeing believing? How recommender system interfaces affect users. In: ACM SIGCHI Int. Conf. on Human Factors in Computing Systems, Florida, USA, April, pp 585\u2013592","DOI":"10.1145\/642611.642713"},{"key":"357_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.2991\/978-94-91216-08-4","volume-title":"Trust networks for recommender systems","author":"P Victor","year":"2011","unstructured":"Victor P, Cornelis C, Cock MD (2011) Trust networks for recommender systems. Atlantis Press, France, pp 91\u2013107"}],"container-title":["Complex &amp; Intelligent Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00357-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s40747-021-00357-2\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s40747-021-00357-2.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,6,9]],"date-time":"2023-06-09T17:31:54Z","timestamp":1686331914000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s40747-021-00357-2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,15]]},"references-count":36,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2023,6]]}},"alternative-id":["357"],"URL":"https:\/\/doi.org\/10.1007\/s40747-021-00357-2","relation":{},"ISSN":["2199-4536","2198-6053"],"issn-type":[{"value":"2199-4536","type":"print"},{"value":"2198-6053","type":"electronic"}],"subject":[],"published":{"date-parts":[[2021,4,15]]},"assertion":[{"value":"4 August 2020","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"15 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The author declares no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}