{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:11:11Z","timestamp":1773655871622,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":18,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,23]],"date-time":"2008-10-23T00:00:00Z","timestamp":1224720000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,23]]},"DOI":"10.1145\/1454008.1454034","type":"proceedings-article","created":{"date-parts":[[2008,11,6]],"date-time":"2008-11-06T13:49:50Z","timestamp":1225979390000},"page":"155-162","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Unsupervised retrieval of attack profiles in collaborative recommender systems"],"prefix":"10.1145","author":[{"given":"Kenneth","family":"Bryan","sequence":"first","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]},{"given":"Michael","family":"O'Mahony","sequence":"additional","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]},{"given":"P\u00e1draig","family":"Cunningham","sequence":"additional","affiliation":[{"name":"University College Dublin, Dublin, Ireland"}]}],"member":"320","published-online":{"date-parts":[[2008,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/bti641"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2005.132"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIBCB.2006.330995"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/BIBE.2007.4375679"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150465"},{"key":"e_1_3_2_1_6_1","volume-title":"Proc Int Conf Intell Syst Mol Biol, 8: 93--103","author":"Cheng Y.","year":"2000","unstructured":"Y. Cheng and G. Church . Biclustering of expression data . Proc Int Conf Intell Syst Mol Biol, 8: 93--103 , 2000 . Y. Cheng and G. Church. Biclustering of expression data. Proc Int Conf Intell Syst Mol Biol, 8:93--103, 2000."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216295.1216307"},{"key":"e_1_3_2_1_10_1","volume-title":"Network Motifs: Simple Building Blocks of Complex Networks","author":"Milo R.","year":"2002","unstructured":"R. Milo , S. Shen-Orr , S. Itzkovitz , N. Kashtan , D. Chklovskii , and U. Alon . Network Motifs: Simple Building Blocks of Complex Networks , 2002 . R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, and U. Alon. Network Motifs: Simple Building Blocks of Complex Networks, 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1278366.1278372"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031114.1031116"},{"key":"e_1_3_2_1_13_1","first-page":"334","volume-title":"Recommender systems: Attack types and strategies","author":"O'Mahony M. P.","year":"2005","unstructured":"M. P. O'Mahony , N. J. Hurley , and G. C. M. Silvestre . Recommender systems: Attack types and strategies . In M. M. Veloso and S. Kambhampati, editors, AAAI, pages 334 -- 339 . AAAI Press \/ The MIT Press , 2005 . M. P. O'Mahony, N. J. Hurley, and G. C. M. Silvestre. Recommender systems: Attack types and strategies. In M. M. Veloso and S. Kambhampati, editors, AAAI, pages 334--339. AAAI Press \/ The MIT Press, 2005."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111449.1111477"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/192844.192905"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1093\/bioinformatics\/btm370"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the ECAI06 workshop on recommender systems, Held at the 17th European Conference on Artificial Intelligence (ECAI'06)","author":"Williams C.","year":"2006","unstructured":"C. Williams , B. Mobasher , R. Burke , J. Sandvig , and R. Bhaumik . Detection of Obfuscated Attacks in Collaborative Recommender Systems . Proceedings of the ECAI06 workshop on recommender systems, Held at the 17th European Conference on Artificial Intelligence (ECAI'06) , Riva del Garda, Italy , August , 2006 . C. Williams, B. Mobasher, R. Burke, J. Sandvig, and R. Bhaumik. Detection of Obfuscated Attacks in Collaborative Recommender Systems. Proceedings of the ECAI06 workshop on recommender systems, Held at the 17th European Conference on Artificial Intelligence (ECAI'06), Riva del Garda, Italy, August, 2006."},{"key":"e_1_3_2_1_18_1","volume-title":"In Proceedings of Fourth Conference on Email and Anti-Spam","author":"Zinman A.","year":"2007","unstructured":"A. Zinman and J. S. Donath . Is Britney Spears spam ? In In Proceedings of Fourth Conference on Email and Anti-Spam , Mountain View, CA , 2007 . A. Zinman and J. S. Donath. Is Britney Spears spam? In In Proceedings of Fourth Conference on Email and Anti-Spam, Mountain View, CA, 2007."}],"event":{"name":"RecSys08: ACM Conference on Recommender Systems","location":"Lausanne Switzerland","acronym":"RecSys08","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data","ACM Association for Computing Machinery","SIGIR ACM Special Interest Group on Information Retrieval","SIGCHI ACM Special Interest Group on Computer-Human Interaction"]},"container-title":["Proceedings of the 2008 ACM conference on Recommender systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454008.1454034","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1454008.1454034","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:39Z","timestamp":1750253379000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1454008.1454034"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,23]]},"references-count":18,"alternative-id":["10.1145\/1454008.1454034","10.1145\/1454008"],"URL":"https:\/\/doi.org\/10.1145\/1454008.1454034","relation":{},"subject":[],"published":{"date-parts":[[2008,10,23]]},"assertion":[{"value":"2008-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}