{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T21:02:23Z","timestamp":1773176543368,"version":"3.50.1"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,8]]},"DOI":"10.1109\/icacci.2015.7275864","type":"proceedings-article","created":{"date-parts":[[2015,9,28]],"date-time":"2015-09-28T21:27:30Z","timestamp":1443475650000},"page":"1734-1740","source":"Crossref","is-referenced-by-count":4,"title":["Ensemble approach to detect profile injection attack in recommender system"],"prefix":"10.1109","author":[{"given":"Ashish","family":"Kumar","sequence":"first","affiliation":[]},{"given":"Deepak","family":"Garg","sequence":"additional","affiliation":[]},{"given":"Prashant Singh","family":"Rana","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111477"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-007-0013-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24594-0_10"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(01)00034-3"},{"key":"ref14","first-page":"517","article-title":"Analysis of a low-dimensional linear model under recommendation attacks","author":"sheng","year":"2006","journal-title":"Proceedings of the 29th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","article-title":"Unsupervised strategies for shilling detection and robust collaborati ve filtering","volume":"19","author":"bhaskar","year":"2009","journal-title":"User Modeling and User-Adapted Interaction"},{"key":"ref16","first-page":"149","article-title":"Statistical attack detection","author":"neil","year":"2009","journal-title":"Proceedings of the Third ACM Conference on Recommender Systems"},{"key":"ref17","article-title":"Collaborative querying through a hybrid query clustering approacb","author":"lin","year":"2003"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/223904.223931"},{"key":"ref19","first-page":"194","article-title":"Recommending and evaluating choices in a virtual community of use","author":"will","year":"1995","journal-title":"Proceedings of the SIGCHI conference on Humanfactors in computing systems"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"76","DOI":"10.1109\/MIC.2003.1167344","article-title":"Amazon.com recommendations: Item - to-item collaborative filtering","volume":"7","author":"greg","year":"2003","journal-title":"Internet Computing IEEE"},{"key":"ref3","article-title":"Identifying attack models for secure recommendation","author":"robin","year":"2005","journal-title":"Beyond Personalization A Workshop on the Next Generation of Recommender Systems"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"344","DOI":"10.1145\/1031114.1031116","article-title":"Collaborative recommendation: A robustness analysis","volume":"4","author":"michael","year":"2004","journal-title":"ACM Transactions on Internet Technology (TOIT)"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"ref7","first-page":"4","article-title":"Segment-based injection attacks against collaborative filtering recommender systems","author":"robin","year":"2005","journal-title":"Data Mining Fifth IEEE International Conference on"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2013.03.012"},{"key":"ref9","first-page":"542","article-title":"Classification features for attack detection in collaborative recommender systems","author":"robin","year":"2006","journal-title":"Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ASONAM.2012.166"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/245108.245126"},{"key":"ref22","first-page":"4","article-title":"A survey of collaborati ve filtering techniques","author":"su","year":"2009","journal-title":"Advances in Artificial Intelligence 2009"},{"key":"ref21","first-page":"175","article-title":"GroupLens: an open architecture for collaborative filtering of netnews","author":"paul","year":"1994","journal-title":"Proceedings of the 1994 ACM conference on Computer supported cooperative work"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"767","DOI":"10.1007\/s10462-012-9364-9","article-title":"Shilling attacks against recommender systems: a comprehensive survey","volume":"42","author":"ihsan","year":"2014","journal-title":"Artificial Intelligence Review"},{"key":"ref23","article-title":"Preventing shilling attacks in online","author":"chirita","year":"0"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.eswa.2013.08.077"}],"event":{"name":"2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","location":"Kochi, India","start":{"date-parts":[[2015,8,10]]},"end":{"date-parts":[[2015,8,13]]}},"container-title":["2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7259950\/7275573\/07275864.pdf?arnumber=7275864","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T20:23:28Z","timestamp":1498249408000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7275864\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/icacci.2015.7275864","relation":{},"subject":[],"published":{"date-parts":[[2015,8]]}}}