{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T23:13:04Z","timestamp":1762297984870},"reference-count":25,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2013,6,1]],"date-time":"2013-06-01T00:00:00Z","timestamp":1370044800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2013,6]]},"DOI":"10.1109\/tifs.2013.2238929","type":"journal-article","created":{"date-parts":[[2013,5,20]],"date-time":"2013-05-20T18:43:12Z","timestamp":1369075392000},"page":"936-948","source":"Crossref","is-referenced-by-count":13,"title":["Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis"],"prefix":"10.1109","volume":"8","author":[{"given":"Yuhong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Yan","family":"Sun","sequence":"additional","affiliation":[]},{"given":"Siyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Alex C.","family":"Kot","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"267","article-title":"Sybilguard: Defending against sybil attacks via social networks","author":"yu","year":"2006","journal-title":"Proc 2006 Conf Applications Technologies Architectures and Protocols for Computer Communications"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e89-d.9.2502"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03748-1_11"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"ref14","first-page":"89","article-title":"A personalized approach to address unfair ratings in multiagent reputation systems","author":"zhang","year":"2006","journal-title":"Proc Fifth Int Joint Conf Autonomous Agents and Multiagent Systems (AAMAS) Workshop on Trust in Agent Societies"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/544805.544809"},{"key":"ref16","first-page":"99-005","article-title":"Trust based decision making for electronic transactions","author":"jsang","year":"1999","journal-title":"Proc Nordic Workshop Secure IT Syst"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/844331.844337"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/775240.775242"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/S0169-7552(98)00110-X"},{"key":"ref4","year":"0","journal-title":"Buy iTunes Ratings and CommentsIncrease iTunes Sales and Downloads"},{"key":"ref3","year":"2010","journal-title":"Final Pre-Christmas Push Propels U S Online Holiday Season Spending Through December 26 to Record $30 8 Billion"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1209\/epl\/i2006-10204-8"},{"key":"ref5","first-page":"48","article-title":"Filtering out unfair ratings in Bayesian reputation systems","volume":"4","author":"whitby","year":"2005","journal-title":"The Icfaian J Management Research"},{"key":"ref8","article-title":"Reputation trap: A powerful attack on reputation system of file sharing p2p environment","author":"yang","year":"2008","journal-title":"Proc 4th Int Conf Security and Privacy in Communication Networks"},{"key":"ref7","first-page":"65","article-title":"Anomaly detection in feedback-based reputation systems through temporal and correlation analysis","author":"liu","year":"2010","journal-title":"Proc 2nd IEEE Int Conf Social Computing"},{"key":"ref2","author":"lee","year":"2004","journal-title":"Use of Online Rating Systems"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/155183.155225"},{"key":"ref1","year":"2007","journal-title":"Press Release Online Consumer-Generated Reviews Have Significant Impact on Offline Purchase Behavior"},{"key":"ref20","author":"shewhart","year":"1931","journal-title":"Economic Control of Quality of Manufactured Product"},{"key":"ref22","author":"philips","year":"0","journal-title":"Monitoring Active Portfolios The CUSUM Approach"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.2307\/2333009"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1142\/S0218488501000831"},{"key":"ref23","doi-asserted-by":"crossref","DOI":"10.1515\/9780691214696","author":"shafter","year":"1976","journal-title":"A Mathematical Theory of Evidence"},{"key":"ref25","article-title":"Detecting cheating behaviors in cyber competitions by constructing competition social network, poster track","author":"liu","year":"2011","journal-title":"IEEE Intl Workshop Information Forensics and Security (WIFS'11)"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/10206\/6516989\/06409451.pdf?arnumber=6409451","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,17]],"date-time":"2022-02-17T12:41:13Z","timestamp":1645101673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6409451\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6]]},"references-count":25,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tifs.2013.2238929","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,6]]}}}