{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,12]],"date-time":"2025-09-12T18:06:09Z","timestamp":1757700369323,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,11]]},"DOI":"10.1109\/colcom.2007.4553831","type":"proceedings-article","created":{"date-parts":[[2008,7,3]],"date-time":"2008-07-03T10:35:25Z","timestamp":1215081325000},"page":"203-212","source":"Crossref","is-referenced-by-count":11,"title":["Countering feedback sparsity and manipulation in reputation systems"],"prefix":"10.1109","author":[{"given":"Li","family":"Xiong","sequence":"first","affiliation":[]},{"given":"Ling","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Mustaque","family":"Ahamad","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref33","DOI":"10.1109\/RISP.1993.287635"},{"doi-asserted-by":"publisher","key":"ref32","DOI":"10.1109\/TKDE.2004.1318566"},{"doi-asserted-by":"publisher","key":"ref31","DOI":"10.1007\/3-540-48749-2_1"},{"doi-asserted-by":"publisher","key":"ref30","DOI":"10.1145\/1060745.1060808"},{"year":"2004","author":"yu","journal-title":"Proc First IEEE Symp Multi-Agent Security and Survivability","key":"ref34"},{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1145\/511495.511496"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1145\/586135.586138"},{"doi-asserted-by":"publisher","key":"ref12","DOI":"10.1016\/j.comnet.2005.07.003"},{"year":"2005","author":"golbeck","journal-title":"Computing and Applying Trust in Web-Based Social Networks","key":"ref13"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/988672.988727"},{"key":"ref15","article-title":"Combating web spam with trustrank","author":"gyongyi","year":"2004","journal-title":"International Conference on Very Large Databases (VLDB"},{"doi-asserted-by":"publisher","key":"ref16","DOI":"10.1145\/312624.312682"},{"doi-asserted-by":"publisher","key":"ref17","DOI":"10.1145\/963770.963772"},{"doi-asserted-by":"publisher","key":"ref18","DOI":"10.1145\/963770.963775"},{"doi-asserted-by":"publisher","key":"ref19","DOI":"10.1016\/j.dss.2005.05.019"},{"key":"ref28","article-title":"Trust management for the semantic web","author":"richardson","year":"2003","journal-title":"2nd Internat Semantic Web Confer"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1145\/312129.312230"},{"doi-asserted-by":"publisher","key":"ref27","DOI":"10.1145\/355112.355122"},{"doi-asserted-by":"publisher","key":"ref3","DOI":"10.1109\/TKDE.2005.99"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1016\/j.comnet.2005.07.004"},{"key":"ref29","article-title":"Application of dimensionality reduction in recommender systems: A case study","author":"sarwar","year":"2000","journal-title":"WebKDD Workshop at ACM SIGKDD"},{"key":"ref5","article-title":"Valuation of trust in open networks","author":"beth","year":"1994","journal-title":"European Symp Research in Computer Security (ESORICS)"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1002\/(SICI)1097-4571(199506)46:5<348::AID-ASI6>3.0.CO;2-1"},{"key":"ref7","article-title":"Empirical analysis of predictive algorithms for collaborative filtering","author":"breese","year":"1998","journal-title":"14th Conference on Uncertainty in Artificial Intelligence"},{"key":"ref2","doi-asserted-by":"crossref","DOI":"10.5210\/fm.v5i10.792","article-title":"Free riding on gnutella","volume":"5","author":"adar","year":"2000","journal-title":"First Monday"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1145\/502585.502638"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1037\/0033-295X.82.6.407"},{"key":"ref20","first-page":"59","article-title":"Semantic constraints for trust transitivity","author":"josang","year":"2005","journal-title":"Proceedings of the 2nd Asia-Pacific Conference on Conceptual Modelling"},{"doi-asserted-by":"publisher","key":"ref22","DOI":"10.1145\/775240.775242"},{"doi-asserted-by":"publisher","key":"ref21","DOI":"10.1145\/1135777.1135799"},{"year":"2004","author":"marti","journal-title":"ACM Electronic Commerce Conference","key":"ref24"},{"doi-asserted-by":"publisher","key":"ref23","DOI":"10.1145\/988672.988726"},{"key":"ref26","article-title":"The pagerank citation ranking: Bringing order to the web","author":"page","year":"1998","journal-title":"Technical Report"},{"doi-asserted-by":"publisher","key":"ref25","DOI":"10.1016\/j.comnet.2005.07.011"}],"event":{"name":"2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)","start":{"date-parts":[[2007,11,12]]},"location":"New York, NY, USA","end":{"date-parts":[[2007,11,15]]}},"container-title":["2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4543894\/4553792\/04553831.pdf?arnumber=4553831","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T05:38:06Z","timestamp":1497764286000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4553831\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,11]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/colcom.2007.4553831","relation":{},"subject":[],"published":{"date-parts":[[2007,11]]}}}