{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,6]],"date-time":"2026-01-06T13:53:57Z","timestamp":1767707637163,"version":"3.28.0"},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,7]]},"DOI":"10.1109\/icmlc.2018.8526971","type":"proceedings-article","created":{"date-parts":[[2018,11,13]],"date-time":"2018-11-13T00:14:19Z","timestamp":1542068059000},"page":"667-672","source":"Crossref","is-referenced-by-count":4,"title":["Unsupervised Shilling Attack Detection Model Based on Rated Item Correlation Analysis"],"prefix":"10.1109","author":[{"given":"KEKE","family":"CHEN","sequence":"first","affiliation":[]},{"given":"PATRICK P.","family":"K. CHAN","sequence":"additional","affiliation":[]},{"given":"DANIEL S.","family":"YEUNG","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2015.12.137"},{"key":"ref11","first-page":"67","author":"chirita","year":"2005","journal-title":"Preventing shilling attacks in online recommender systems"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150465"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.knosys.2014.04.020"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","article-title":"Unsupervised strate- gies for shilling detection and robust collaborative filteing","volume":"19","author":"bhaskar","year":"2009","journal-title":"User Modeling and User&#x2014;Adapted Interaction"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"ref4","article-title":"Shilling\nAttack Detection using Rated Item Correlation for Collaborative\nFiltering","author":"chen","year":"2018","journal-title":"Proceeding of SMC2018 Conference Miyazaki"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2016.01.083"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"ref5","first-page":"1","article-title":"Shilling Attack Based\non Item Popularity and Rated Item Correlation against\nCollaborative Filtering","author":"chen","year":"2018","journal-title":"International Journal of Machine Learning and Cybernetics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"ref7","first-page":"1","article-title":"Shilling attack models in recom- mender system","author":"kaur","year":"2016","journal-title":"International Conference on Inventive Computation Technologies (ICICT) Coimbatore &#x2013; 5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9364-9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-85820-3_4"},{"key":"ref9","first-page":"57","article-title":"Attacking itembased\nrecommender systems with power items","author":"seminario","year":"2014","journal-title":"ACM Conference on Recommender Systems ACM"}],"event":{"name":"2018 International Conference on Machine Learning and Cybernetics (ICMLC)","start":{"date-parts":[[2018,7,15]]},"location":"Chengdu","end":{"date-parts":[[2018,7,18]]}},"container-title":["2018 International Conference on Machine Learning and Cybernetics (ICMLC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8501632\/8526922\/08526971.pdf?arnumber=8526971","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T19:03:23Z","timestamp":1643223803000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8526971\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icmlc.2018.8526971","relation":{},"subject":[],"published":{"date-parts":[[2018,7]]}}}