{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:54:08Z","timestamp":1730213648913,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","license":[{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,9,12]],"date-time":"2022-09-12T00:00:00Z","timestamp":1662940800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,9,12]]},"DOI":"10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927950","type":"proceedings-article","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T19:43:02Z","timestamp":1670960582000},"page":"1-6","source":"Crossref","is-referenced-by-count":0,"title":["A Locality-Sensitive Hashing-based Automatic Group Identification Approach in Group Recommendation"],"prefix":"10.1109","author":[{"given":"Yuqing","family":"Wang","sequence":"first","affiliation":[{"name":"Qufu Normal University,School of Computer Science,China"}]},{"given":"Yuwen","family":"Liu","sequence":"additional","affiliation":[{"name":"China University of Petroleum,College of Computer Science and Technology,China"}]},{"given":"Yihong","family":"Yang","sequence":"additional","affiliation":[{"name":"China University of Geosciences (Beijing),School of Information Engineering,Beijing,China"}]},{"given":"Lingzhen","family":"Kong","sequence":"additional","affiliation":[{"name":"Nanjing University of Science and Technology,School of Computer Science Engineering,China"}]},{"given":"Ying","family":"Miao","sequence":"additional","affiliation":[{"name":"Qufu Normal University,School of Computer Science,China"}]}],"member":"263","reference":[{"journal-title":"2013 International Conference on Social Computing","year":"2013","author":"fatemi","key":"ref10"},{"key":"ref11","article-title":"Groups Identification and Individual Recommendations in Group Recommendation Algorithms","author":"boratto","year":"2010","journal-title":"PRSAT RecSys"},{"key":"ref12","article-title":"Using Collaborative Filtering to Overcome the Curse of Dimensionality when Clustering Users in a Group Recommender System","volume":"2","author":"boratto","year":"2014","journal-title":"ICEIS"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2015.10.007"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s13042-015-0371-4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.115396"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/1969118"},{"key":"ref17","first-page":"518","article-title":"Similarity search in high dimensions via hashing","volume":"99","author":"gionis","year":"1999","journal-title":"VLDB"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2017.2760458"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2021.114709"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2021.3064952"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipm.2021.102608"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2021.3077893"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TNSE.2022.3144699"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/WI-IAT.2009.346"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2017.10.027"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2020.114111"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16089-9_1"}],"event":{"name":"2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)","start":{"date-parts":[[2022,9,12]]},"location":"Falerna, Italy","end":{"date-parts":[[2022,9,15]]}},"container-title":["2022 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC\/PiCom\/CBDCom\/CyberSciTech)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9927523\/9927699\/09927950.pdf?arnumber=9927950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,23]],"date-time":"2023-01-23T20:12:08Z","timestamp":1674504728000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9927950\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,9,12]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/dasc\/picom\/cbdcom\/cy55231.2022.9927950","relation":{},"subject":[],"published":{"date-parts":[[2022,9,12]]}}}