{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T18:37:16Z","timestamp":1729622236827,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,4]]},"DOI":"10.1109\/cidm.2011.5949304","type":"proceedings-article","created":{"date-parts":[[2011,7,13]],"date-time":"2011-07-13T11:48:16Z","timestamp":1310557696000},"page":"80-87","source":"Crossref","is-referenced-by-count":2,"title":["Using gaming strategies for attacker and defender in recommender systems"],"prefix":"10.1109","author":[{"given":"Justin","family":"Zhan","sequence":"first","affiliation":[]},{"given":"Lijo","family":"Thomas","sequence":"additional","affiliation":[]},{"given":"Venkata","family":"Pasumarthi","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180446"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/310889.310919"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.60"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297236"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"287","DOI":"10.1023\/A:1020443909834","article-title":"An empirical analysis of design choices in neighborhood-based collaborative filtering algorithms","volume":"5","author":"riedl","year":"2002","journal-title":"Information Retrieval"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.2002.1004377"},{"journal-title":"Scenario Graphs and Attack Graphs PhD thesis","year":"2004","author":"sheyner","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/SocialCom.2010.132"},{"key":"ref19","first-page":"412","article-title":"Network Security Evaluation through Attack Graph Generation","author":"zhang","year":"2009","journal-title":"World Academy of Science Engineering and Technology"},{"key":"ref4","article-title":"Towards Trustyworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness","volume":"7","author":"burke","year":"2007","journal-title":"ACM Transactions on Internet Technology"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-45105-6_35","article-title":"A Game-Theoretic MemoryMechanism for Co-evolution","author":"ficici","year":"2003","journal-title":"Proceedings of the 2003 Genetic and Evolutionary Computation Conference (GECCO)"},{"key":"ref5","article-title":"Identifying Attack Models for Secure Recommendation","author":"burke","year":"2005","journal-title":"Beyond Personalization A Workshop on the Next Generation of Recommender Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1504\/IJSN.2006.011784"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"ref2","article-title":"Algorithms and Incentives for Robust Ranking","author":"bhattacharjee","year":"2007","journal-title":"Proc ACM-SIAM Symposium on Discrete Algorithms (SODA"},{"key":"ref1","first-page":"1174","article-title":"Improved Recommendation Systems","author":"awerbuch","year":"2005","journal-title":"ACM-SIAM Symposium on Discrete Algorithms"},{"key":"ref9","first-page":"494","article-title":"Promoting Recommendations: An attack on CollaborativeFiltering","author":"o'mahony","year":"2002","journal-title":"Proceedings of the 13th InternationalConference on Database and Expert System Applications"}],"event":{"name":"2011 Ieee Symposium On Computational Intelligence And Data Mining - Part Of 17273 - 2011 Ssci","start":{"date-parts":[[2011,4,11]]},"location":"Paris, France","end":{"date-parts":[[2011,4,15]]}},"container-title":["2011 IEEE Symposium on Computational Intelligence and Data Mining (CIDM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5937059\/5949295\/05949304.pdf?arnumber=5949304","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T23:10:37Z","timestamp":1497913837000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5949304\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,4]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/cidm.2011.5949304","relation":{},"subject":[],"published":{"date-parts":[[2011,4]]}}}