{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,3]],"date-time":"2025-07-03T20:40:41Z","timestamp":1751575241894},"reference-count":18,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,7]]},"DOI":"10.1109\/ijcnn.2014.6889419","type":"proceedings-article","created":{"date-parts":[[2014,9,10]],"date-time":"2014-09-10T14:30:33Z","timestamp":1410359433000},"page":"332-339","source":"Crossref","is-referenced-by-count":14,"title":["Attack detection in recommender systems based on target item analysis"],"prefix":"10.1109","author":[{"given":"Wei","family":"Zhou","sequence":"first","affiliation":[]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[]},{"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[]},{"given":"Shafiq","family":"Alam","sequence":"additional","affiliation":[]},{"given":"Gillian","family":"Dobbie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150465"},{"key":"18","first-page":"494","article-title":"Promoting recommendations: An attack on collaborative filtering","author":"o'mahony","year":"2002","journal-title":"DEXA 02 Proceedings of the 13th International Conference on Database and Expert Systems Applications"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/371920.372071"},{"key":"13","first-page":"985","article-title":"HySAD: A semi-supervised hybrid shilling attack detector for trustworthy product recommendation","author":"wu","year":"2012","journal-title":"ACM SIGKDD International Conference on Knowledge Discovery and Data Mining"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297240"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148259"},{"key":"12","article-title":"Securing collaborative filtering against malicious attacks through anomaly detection","author":"bhaumik","year":"2006","journal-title":"Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization (ITWP'06)"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111477"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/963770.963772"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"7","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1007\/978-3-540-24594-0_10","article-title":"Collaborative querying through a hybrid query clustering approach","author":"fu","year":"2003","journal-title":"Digital Libraries Technology and Management of Indigenous Knowledge for Global Access"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1155\/2009\/421425"},{"key":"5","first-page":"251","article-title":"Knn versus SVM in the collaborative filtering framework","author":"gr?ar","year":"2006","journal-title":"Data Science and Classification"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150508"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/S0957-4174(01)00034-3"}],"event":{"name":"2014 International Joint Conference on Neural Networks (IJCNN)","start":{"date-parts":[[2014,7,6]]},"location":"Beijing, China","end":{"date-parts":[[2014,7,11]]}},"container-title":["2014 International Joint Conference on Neural Networks (IJCNN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6880678\/6889358\/06889419.pdf?arnumber=6889419","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T14:42:00Z","timestamp":1602686520000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6889419"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7]]},"references-count":18,"URL":"https:\/\/doi.org\/10.1109\/ijcnn.2014.6889419","relation":{},"subject":[],"published":{"date-parts":[[2014,7]]}}}