{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T18:13:42Z","timestamp":1772907222985,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,8,20]]},"DOI":"10.1145\/1150402.1150465","type":"proceedings-article","created":{"date-parts":[[2006,10,18]],"date-time":"2006-10-18T22:04:00Z","timestamp":1161209040000},"page":"542-547","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":170,"title":["Classification features for attack detection in collaborative recommender systems"],"prefix":"10.1145","author":[{"given":"Robin","family":"Burke","sequence":"first","affiliation":[{"name":"DePaul University, Chicago, IL"}]},{"given":"Bamshad","family":"Mobasher","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, IL"}]},{"given":"Chad","family":"Williams","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, IL"}]},{"given":"Runa","family":"Bhaumik","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, IL"}]}],"member":"320","published-online":{"date-parts":[[2006,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proc. of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization","author":"Burke R.","year":"2005","unstructured":"R. Burke , B. Mobasher , and R. Bhaumik . Limited knowledge shilling attacks in collaborative filtering systems . In Proc. of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization , Edinburgh, Scotland , August 2005 . R. Burke, B. Mobasher, and R. Bhaumik. Limited knowledge shilling attacks in collaborative filtering systems. In Proc. of the 3rd IJCAI Workshop in Intelligent Techniques for Personalization, Edinburgh, Scotland, August 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2005.127"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CEC-EEE.2006.34"},{"key":"e_1_3_2_1_4_1","volume-title":"Beyond Personalization: A Workshop on the Next Generation of Recommender Systems","author":"Burke R.","year":"2005","unstructured":"R. Burke , B. Mobasher , R. Zabicki , and R. Bhaumik . Identifying attack models for secure recommendation . In Beyond Personalization: A Workshop on the Next Generation of Recommender Systems , San Diego, CA , January 2005 . R. Burke, B. Mobasher, R. Zabicki, and R. Bhaumik. Identifying attack models for secure recommendation. In Beyond Personalization: A Workshop on the Next Generation of Recommender Systems, San Diego, CA, January 2005."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of the 2005 WebKDD Workshop","author":"Mobasher B.","year":"2005","unstructured":"B. Mobasher , R. Burke , R. Bhaumik , and C. Williams . Effective attack models for shilling item-based collaborative filtering systems . In Proc. of the 2005 WebKDD Workshop , Chicago, IL , August 2005 . B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Effective attack models for shilling item-based collaborative filtering systems. In Proc. of the 2005 WebKDD Workshop, Chicago, IL, August 2005."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/11891321_6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/988772.988823"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_12_1","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"Witten I. H.","year":"2005","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical machine learning tools and techniques , 2 nd Edition. Morgan Kaufmann , San Francisco, CA , 2005 . I. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques, 2nd Edition. Morgan Kaufmann, San Francisco, CA, 2005.","edition":"2"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062745.1062818"}],"event":{"name":"KDD06: The 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"Philadelphia PA USA","acronym":"KDD06","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1150402.1150465","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,8]],"date-time":"2023-01-08T09:27:25Z","timestamp":1673170045000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1150402.1150465"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,8,20]]},"references-count":13,"alternative-id":["10.1145\/1150402.1150465","10.1145\/1150402"],"URL":"https:\/\/doi.org\/10.1145\/1150402.1150465","relation":{},"subject":[],"published":{"date-parts":[[2006,8,20]]},"assertion":[{"value":"2006-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}