{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:26:21Z","timestamp":1775471181386,"version":"3.50.1"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1109\/mlsp.2013.6661953","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T21:47:34Z","timestamp":1385588854000},"page":"1-6","source":"Crossref","is-referenced-by-count":27,"title":["Graph-based detection of shilling attacks in recommender systems"],"prefix":"10.1109","author":[{"given":"Zhuo","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Sanjeev R.","family":"Kulkarni","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"11","first-page":"93","article-title":"Biclustering of expression data","volume":"8","author":"cheng","year":"2000","journal-title":"Proceedings of the Eighth International Conference on Intelligent Systems for Molecular Biology"},{"key":"12","author":"cormen","year":"2001","journal-title":"Introduction to Algorithms"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148259"},{"key":"2","first-page":"1388","article-title":"Modelbased collaborative filtering as a defense against profile injection attacks","volume":"21","author":"mobasher","year":"2006","journal-title":"Proceedings of the AAAI"},{"key":"1","first-page":"334","article-title":"Recommender systems: Attack types and strategies","volume":"20","author":"o'mahony","year":"2005","journal-title":"Proceedings of the National Conference on Artificial Intelligence"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1287\/ijoc.1100.0440"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-007-0013-0"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1454008.1454034"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9050-4"},{"key":"9","first-page":"181","article-title":"A clustering approach to unsupervised attack detection in collaborative recommender systems","author":"bhaumik","year":"2011","journal-title":"Proceedings of 7th IEEE ICML"},{"key":"8","author":"zhou","year":"2012","journal-title":"A Hybrid Unsupervised Approach for Detecting Profile Injection Attacks in Collaborative Recommender Systems"}],"event":{"name":"2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)","location":"Southampton, United Kingdom","start":{"date-parts":[[2013,9,22]]},"end":{"date-parts":[[2013,9,25]]}},"container-title":["2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6648476\/6661888\/06661953.pdf?arnumber=6661953","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T02:55:38Z","timestamp":1490237738000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6661953\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/mlsp.2013.6661953","relation":{},"subject":[],"published":{"date-parts":[[2013,9]]}}}