{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,14]],"date-time":"2025-12-14T15:59:36Z","timestamp":1765727976020,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"Project CALabria HUB Ricerca Innovativa Avanzata (CAL.HUB. RIA) funded by Italian Ministry of Health","award":["CUP: F63C22000530001","CUP: C33C22000540001"],"award-info":[{"award-number":["CUP: F63C22000530001","CUP: C33C22000540001"]}]},{"name":"Piano Nazione di Ripresa e Resilienza (PNRR) Project TECH4YOU\u2013Technologies for Climate Change Adaptation and Quality of Life Improvement funded by Italian Ministero dell\u2019Universit\u00e0 e della Ricerca","award":["CUP: C33C22000290006"],"award-info":[{"award-number":["CUP: C33C22000290006"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/access.2024.3522560","type":"journal-article","created":{"date-parts":[[2024,12,25]],"date-time":"2024-12-25T19:34:01Z","timestamp":1735155241000},"page":"1511-1521","source":"Crossref","is-referenced-by-count":2,"title":["Using Trust and Reputation for Detecting Groups of Colluded Agents in Social Networks"],"prefix":"10.1109","volume":"13","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4374-298X","authenticated-orcid":false,"given":"Mariantonia","family":"Cotronei","sequence":"first","affiliation":[{"name":"Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), Mediterranea University of Reggio Calabria, Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8503-9630","authenticated-orcid":false,"given":"Sofia","family":"Giuffr\u00e8","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), Mediterranea University of Reggio Calabria, Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7229-5464","authenticated-orcid":false,"given":"Attilio","family":"Marcian\u00f2","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), Mediterranea University of Reggio Calabria, Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9256-9995","authenticated-orcid":false,"given":"Domenico","family":"Rosaci","sequence":"additional","affiliation":[{"name":"Department of Information Engineering, Infrastructure and Sustainable Energy (DIIES), Mediterranea University of Reggio Calabria, Reggio Calabria, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3753-6020","authenticated-orcid":false,"given":"Giuseppe M. L.","family":"Sarn\u00e8","sequence":"additional","affiliation":[{"name":"Department of Psychology, University of Milano-Bicocca, Milan, Italy"}]}],"member":"263","reference":[{"volume-title":"Facebook","year":"2023","key":"ref1"},{"volume-title":"Twitter","year":"2023","key":"ref2"},{"volume-title":"Instagram","year":"2023","key":"ref3"},{"volume-title":"Tiktok","year":"2023","key":"ref4"},{"volume-title":"Amazon","year":"2023","key":"ref5"},{"volume-title":"Ebay","year":"2023","key":"ref6"},{"volume-title":"Linkedin","year":"2023","key":"ref7"},{"volume-title":"ResearchGate","year":"2023","key":"ref8"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCDS.2018.2840971"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICTAI50040.2020.00012"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775242"},{"volume-title":"The pagerank citation ranking: Bring order to the web","year":"1998","author":"Page","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1142\/S0129065723500636"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2831228"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1201\/9781420070248-10"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3124642"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2023.3347073"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.isatra.2022.10.015"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2024.3432392"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-014-4212-5"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICNSC.2017.8000145"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/JAS.2020.1003330"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICACCI.2013.6637216"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.331"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.3233\/faia240179"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-62269-4_5"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2023.123113"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1142\/S021962202350030X"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/LCN60385.2024.10639735"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s11042-023-15363-4"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2023.103537"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1155\/2020\/2643546"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2009.05.005"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2019.2933518"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1592451.1592452"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44875-6_7"},{"key":"ref38","first-page":"1","article-title":"Challenges for robust trust and reputation systems","volume-title":"Proc. 5th Int. Workshop Secur. Trust Manage.","author":"J\u00f8sang"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2014.02.002"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-008-9019-8"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-008-9118-y"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1082473.1082551"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.elerap.2014.07.001"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/s10660-010-9056-y"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5199545"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxu130"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.05.017"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1111\/deci.12156"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6451.2010.00405.x"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1016\/S0278-0984(02)11030-3"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2004.1318566"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.07.013"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/s10458-005-6825-4"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-8640.2012.00453.x"},{"article-title":"A priori trust vulnerabilities in eigentrust","year":"2008","author":"Jansen","key":"ref55"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1120717.1120721"},{"key":"ref57","first-page":"416","article-title":"EigenTrustp++: Attack resilient trust management","volume-title":"Proc. 8th Int. Conf. Collaborative Computing: Netw., Appl. Worksharing","author":"Fan"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/j.jksuci.2014.10.002"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.23919\/JCC.2019.12.008"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-015-0416-1"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2009.11.002"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/j.cosrev.2007.05.001"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2013.08.002"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.5555\/2980539.2980649"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/6287639\/10820123\/10815731.pdf?arnumber=10815731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,10]],"date-time":"2025-01-10T05:43:14Z","timestamp":1736487794000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10815731\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/access.2024.3522560","relation":{},"ISSN":["2169-3536"],"issn-type":[{"type":"electronic","value":"2169-3536"}],"subject":[],"published":{"date-parts":[[2025]]}}}