{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T14:14:44Z","timestamp":1754144084951,"version":"3.41.2"},"reference-count":16,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,5,23]],"date-time":"2025-05-23T00:00:00Z","timestamp":1747958400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,5,23]]},"DOI":"10.1109\/cniot65435.2025.11070566","type":"proceedings-article","created":{"date-parts":[[2025,7,14]],"date-time":"2025-07-14T17:41:09Z","timestamp":1752514869000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["Multi-Scale Feature Fusion-Based Shilling Attack Detection Algorithm"],"prefix":"10.1109","author":[{"given":"Junjie","family":"Jia","sequence":"first","affiliation":[{"name":"Northwest Normal University,Gansu,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tianle","family":"Li","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Gansu,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Wei","family":"Zhao","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Gansu,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Zhiru","family":"Liu","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Gansu,China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jiabin","family":"Feng","sequence":"additional","affiliation":[{"name":"Northwest Normal University,Gansu,China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1016\/j.knosys.2024.112514"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1007\/s11042-023-17339-w"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1145\/988672.988726"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.32604\/cmc.2022.020437"},{"issue":"5","key":"ref5","article-title":"Shilling attack detection method based on multi-scale feature fusion[J]","volume":"35","author":"YU","year":"2023","journal-title":"Journal of Chongqing University of Posts and Telecommunications(Natural Science Edition)"},{"issue":"3","key":"ref6","first-page":"554","article-title":"A shilling attack detection algorithm based on score dispersion[J]","volume":"44","author":"JIA","year":"2022","journal-title":"Computer Engineering & Science"},{"key":"ref7","first-page":"108","article-title":"Hybrid gated recurrent unit and convolutional neural network-based deep learning mechanism for efficient shilling attack detection in social networks[J]","author":"N","year":"2023","journal-title":"Computers and Electrical Engineering"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.3934\/mbe.2022342"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1016\/j.jisa.2020.102493"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1080\/09540091.2022.2078280"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.4108\/eai.2-11-2021.171754"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.jksuci.2024.101964"},{"volume-title":"Research on shilling attack detection method in recommender systems based on variational autoencoder and supervised prototype network [D]","author":"Xinhao","key":"ref13"},{"issue":"9","key":"ref14","first-page":"1563","article-title":"An shilling attack detection algorithm based on popularity degree features [J]","volume":"41","author":"Wentao","year":"2015","journal-title":"acta automatica sinica"},{"issue":"2","key":"ref15","first-page":"3","article-title":"A survey of collaborative recommendation and the robustness of model-based algorithms[J]","volume":"31","author":"Sandvig","year":"2008","journal-title":"IEEE Data Eng. Bull."},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1080\/09540091.2022.2078280"}],"event":{"name":"2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)","start":{"date-parts":[[2025,5,23]]},"location":"Shanghai, China","end":{"date-parts":[[2025,5,25]]}},"container-title":["2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/11069441\/11069432\/11070566.pdf?arnumber=11070566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,15]],"date-time":"2025-07-15T05:56:41Z","timestamp":1752559001000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11070566\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,5,23]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/cniot65435.2025.11070566","relation":{},"subject":[],"published":{"date-parts":[[2025,5,23]]}}}