{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,12,14]],"date-time":"2024-12-14T05:16:26Z","timestamp":1734153386371,"version":"3.30.2"},"reference-count":22,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,8,16]],"date-time":"2024-08-16T00:00:00Z","timestamp":1723766400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,8,16]]},"DOI":"10.1109\/besc64747.2024.10780489","type":"proceedings-article","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T19:07:29Z","timestamp":1734030449000},"page":"1-7","source":"Crossref","is-referenced-by-count":0,"title":["Dual Clustering Based Collaborative Filtering for Robust Recommendation"],"prefix":"10.1109","author":[{"given":"Lei","family":"Fu","sequence":"first","affiliation":[{"name":"Iwate University,Morioka,Japan"}]},{"given":"Jianwei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Iwate University,Morioka,Japan"}]},{"given":"Lin","family":"Li","sequence":"additional","affiliation":[{"name":"Wuhan University of Technology,Wuhan,China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72079-9_9"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2877208"},{"key":"ref3","first-page":"494","article-title":"Promoting recommen-dations: an attack on collaborative filtering","author":"O\u2019Mahony","year":"2002","journal-title":"DEXA"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-018-9655-x"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3022962"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2023.3289404"},{"key":"ref8","article-title":"A regression framework to interpret the robustness of recommender systems against shilling attacks","author":"Deldjoo","year":"2021","journal-title":"IIR 2021"},{"key":"ref9","article-title":"Adversarial robustness of deep reinforcement learning based dynamic recommender systems","volume":"abs\/2112\u201300973","author":"Wang","year":"2021","journal-title":"CoRR"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39592-8_72"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/nem.2201"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.3837\/tiis.2019.09.020"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISDPE.2007.75"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TMM.2018.2887018"},{"key":"ref15","first-page":"1388","article-title":"Model-based collaborative filtering as a defense against profile injection attacks","author":"Mobasher","year":"2006","journal-title":"AAAI"},{"key":"ref16","first-page":"393","article-title":"Shilling recommender systems for fun and profit","author":"L","year":"2004","journal-title":"WWW"},{"key":"ref17","first-page":"517","article-title":"Analysis of a low-dimensional linear model under recommendation attacks","author":"S","year":"2006","journal-title":"SIGIR"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3616855.3635849"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611978032.78"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSNT47585.2019.8962505"},{"key":"ref21","first-page":"281","article-title":"Some methods for classification and analysis of multi-variate observations","author":"MacQueen","year":"1967","journal-title":"Berkeley Symp. on Math. Statist. and Prob"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/s00357-016-9208-4"}],"event":{"name":"2024 11th International Conference on Behavioural and Social Computing (BESC)","start":{"date-parts":[[2024,8,16]]},"location":"Harbin, China","end":{"date-parts":[[2024,8,18]]}},"container-title":["2024 11th International Conference on Behavioural and Social Computing (BESC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10779601\/10780446\/10780489.pdf?arnumber=10780489","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,13]],"date-time":"2024-12-13T06:46:46Z","timestamp":1734072406000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10780489\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,8,16]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/besc64747.2024.10780489","relation":{},"subject":[],"published":{"date-parts":[[2024,8,16]]}}}