{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,19]],"date-time":"2026-02-19T09:46:38Z","timestamp":1771494398504,"version":"3.50.1"},"reference-count":28,"publisher":"Oxford University Press (OUP)","issue":"7","license":[{"start":{"date-parts":[[2018,2,2]],"date-time":"2018-02-02T00:00:00Z","timestamp":1517529600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/academic.oup.com\/journals\/pages\/about_us\/legal\/notices"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7,1]]},"DOI":"10.1093\/comjnl\/bxy008","type":"journal-article","created":{"date-parts":[[2018,1,12]],"date-time":"2018-01-12T23:27:09Z","timestamp":1515799629000},"page":"949-958","source":"Crossref","is-referenced-by-count":58,"title":["A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network"],"prefix":"10.1093","volume":"61","author":[{"given":"Chao","family":"Tong","sequence":"first","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"given":"Xiang","family":"Yin","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7903-8954","authenticated-orcid":false,"given":"Jun","family":"Li","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"given":"Tongyu","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Computer Science and Engineering, Beihang University, Beijing, China"}]},{"given":"Renli","family":"Lv","sequence":"additional","affiliation":[{"name":"Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China"}]},{"given":"Liang","family":"Sun","sequence":"additional","affiliation":[{"name":"Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China"}]},{"given":"Joel J P C","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"National Institute of Telecommunications (Inatel), Av. Jo\u00e3o de Camargo, 510 - Centro, 37540-000 Santa Rita do Sapuca\u00ed, MG, Brazil"},{"name":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, Lisboa, Portugal"},{"name":"ITMO University, 49 Kronverksky Pr., 191002 St. Petersburg, Russia"},{"name":"University of Fortaleza (UNIFOR), Av. Washington Soares, 1321 Edson Queiroz, Fortaleza\u2014CE, Brazil"}]}],"member":"286","published-online":{"date-parts":[[2018,2,2]]},"reference":[{"key":"key\n\t\t\t\t20180702082758_bxy008C1","doi-asserted-by":"crossref","first-page":"904","DOI":"10.1109\/JSYST.2013.2281262","article-title":"Socially aware networking: a survey","volume":"9","author":"Xia","year":"2017","journal-title":"IEEE Syst. J."},{"key":"key\n\t\t\t\t20180702082758_bxy008C2","volume-title":"Pocket Switched Networking: Challenges, Feasibility and Implementation Issues. Autonomic Communication","author":"Pan","year":"2005"},{"key":"key\n\t\t\t\t20180702082758_bxy008C3","doi-asserted-by":"crossref","first-page":"787","DOI":"10.1002\/wcm.862","article-title":"A survey and challenges in routing and data dissemination in vehicular ad-hoc networks","volume":"11","author":"Chen","year":"2011","journal-title":"Wireless Commun. Mobile Comput."},{"key":"key\n\t\t\t\t20180702082758_bxy008C4","doi-asserted-by":"crossref","first-page":"397","DOI":"10.1016\/j.pmcj.2011.03.003","article-title":"From wireless sensor networks towards cyber physical systems","volume":"7","author":"Wu","year":"2011","journal-title":"Pervasive Mobile Comput."},{"key":"key\n\t\t\t\t20180702082758_bxy008C5","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1016\/S0268-4012(99)00051-1","article-title":"The problem of information overload in business organisations: a review of the literature","volume":"20","author":"Edmunds","year":"2000","journal-title":"Int. J. Inform. Manag."},{"key":"key\n\t\t\t\t20180702082758_bxy008C6","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/963770.963772","article-title":"Evaluating collaborative filtering recommender systems","volume":"22","author":"Herlocker","year":"2004","journal-title":"ACM Trans. Inf. Syst."},{"key":"key\n\t\t\t\t20180702082758_bxy008C7","volume-title":"Collaborative Evolution for User Profiling in Recommender Systems","author":"Lu","year":"2016"},{"key":"key\n\t\t\t\t20180702082758_bxy008C8","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1145\/1031114.1031116","article-title":"Collaborative recommendation: a robustness analysis","volume":"4","author":"O\u2019Mahony","year":"2004","journal-title":"ACM Trans. Internet Technol."},{"key":"key\n\t\t\t\t20180702082758_bxy008C9","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1145\/1278366.1278372","article-title":"Toward trustworthy recommender systems:an analysis of attack models and algorithm robustness","volume":"7","author":"Mobasher","year":"2007","journal-title":"ACM Trans. Internet Technol."},{"key":"key\n\t\t\t\t20180702082758_bxy008C10","author":"Mehta","year":"2008"},{"key":"key\n\t\t\t\t20180702082758_bxy008C11","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","article-title":"Shilling attacks against recommender systems: a comprehensive survey","volume":"42","author":"Gunes","year":"2014","journal-title":"Artif. Intell. Rev."},{"key":"key\n\t\t\t\t20180702082758_bxy008C12","author":"Wang","year":"2015"},{"key":"key\n\t\t\t\t20180702082758_bxy008C13","author":"Patel","year":"2016"},{"key":"key\n\t\t\t\t20180702082758_bxy008C14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/j.neunet.2014.09.003","article-title":"Deep learning in neural networks: an overview","volume":"61","author":"Schmidhuber","year":"2015","journal-title":"Neural. Netw."},{"key":"key\n\t\t\t\t20180702082758_bxy008C15","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1113\/jphysiol.1968.sp008455","article-title":"Receptive fields and functional architecture of monkey striate cortex","volume":"195","author":"Hubel","year":"1968","journal-title":"J. Physiol."},{"key":"key\n\t\t\t\t20180702082758_bxy008C16","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1007\/BF00344251","article-title":"Neocognitron: a self-organizing neural network model for a mechanism of pattern recognition unaffected by shift in position","volume":"36","author":"Fukushima","year":"1980","journal-title":"Biol. Cybern."},{"key":"key\n\t\t\t\t20180702082758_bxy008C17","first-page":"53","article-title":"Comparison of learning algorithms for handwritten digit recognition","volume":"60","author":"LeCun","year":"1995","journal-title":"Int. Conf. Artif. Neural Netw."},{"key":"key\n\t\t\t\t20180702082758_bxy008C18","first-page":"1097","article-title":"Imagenet classification with deep convolutional neural networks","author":"Krizhevsky","year":"2012","journal-title":"Adv. Neural. Inf. Process. Syst."},{"key":"key\n\t\t\t\t20180702082758_bxy008C19","author":"Ciresan","year":"2011"},{"key":"key\n\t\t\t\t20180702082758_bxy008C20","author":"Gong","year":"2016"},{"key":"key\n\t\t\t\t20180702082758_bxy008C21","author":"Kalchbrenner","year":"2014"},{"key":"key\n\t\t\t\t20180702082758_bxy008C22","author":"Martn"},{"key":"key\n\t\t\t\t20180702082758_bxy008C23","author":"Burke","year":"2006"},{"key":"key\n\t\t\t\t20180702082758_bxy008C24","author":"Williams","year":"2006"},{"key":"key\n\t\t\t\t20180702082758_bxy008C25","author":"Hurley","year":"2009"},{"key":"key\n\t\t\t\t20180702082758_bxy008C26","author":"Mehta","year":"2007"},{"key":"key\n\t\t\t\t20180702082758_bxy008C27","first-page":"181","article-title":"A clustering approach to unsupervised attack detection in collaborative recommender systems","volume-title":"Proceedings of the 7th IEEE International Conference on Data Mining, Las Vegas, NV, USA","author":"Bhaumik","year":"2012"},{"key":"key\n\t\t\t\t20180702082758_bxy008C28","doi-asserted-by":"crossref","first-page":"729","DOI":"10.1007\/s11280-012-0164-6","article-title":"Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system","volume":"16","author":"Cao","year":"2013","journal-title":"World Wide Web"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/61\/7\/949\/25113843\/bxy008.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T05:45:16Z","timestamp":1570599916000},"score":1,"resource":{"primary":{"URL":"https:\/\/academic.oup.com\/comjnl\/article\/61\/7\/949\/4835634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,2,2]]},"references-count":28,"journal-issue":{"issue":"7","published-online":{"date-parts":[[2018,2,2]]},"published-print":{"date-parts":[[2018,7,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxy008","relation":{},"ISSN":["0010-4620","1460-2067"],"issn-type":[{"value":"0010-4620","type":"print"},{"value":"1460-2067","type":"electronic"}],"subject":[],"published-other":{"date-parts":[[2018,7]]},"published":{"date-parts":[[2018,2,2]]}}}