{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T23:01:21Z","timestamp":1769727681466,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,7,3]],"date-time":"2014-07-03T00:00:00Z","timestamp":1404345600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,7,3]]},"DOI":"10.1145\/2600428.2609483","type":"proceedings-article","created":{"date-parts":[[2014,7,8]],"date-time":"2014-07-08T12:20:11Z","timestamp":1404822011000},"page":"955-958","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Detection of abnormal profiles on group attacks in recommender systems"],"prefix":"10.1145","author":[{"given":"Wei","family":"Zhou","sequence":"first","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Yun Sing","family":"Koh","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Junhao","family":"Wen","sequence":"additional","affiliation":[{"name":"Chongqing University, Chongqing, China"}]},{"given":"Shafiq","family":"Alam","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]},{"given":"Gillian","family":"Dobbie","sequence":"additional","affiliation":[{"name":"University of Auckland, Auckland, New Zealand"}]}],"member":"320","published-online":{"date-parts":[[2014,7,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988726"},{"key":"e_1_3_2_1_2_1","volume-title":"Technical report","author":"Williams Chad","year":"2006","unstructured":"Chad Williams and Bamshad Mobasher . Profile injection attack detection for securing collaborative recommender systems. Technical report , Technical report , DePaul University , 2006 . Chad Williams and Bamshad Mobasher. Profile injection attack detection for securing collaborative recommender systems. Technical report, Technical report, DePaul University, 2006."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297231.1297240"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390334.1390350"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150465"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11761-007-0013-0"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1148170.1148259"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11257-008-9050-4"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639714.1639740"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP'06)","author":"Bhaumik Runa","year":"2006","unstructured":"Runa Bhaumik , Chad Williams , Bamshad Mobasher , and Robin Burke . Securing collaborative filtering against malicious attacks through anomaly detection . In Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP'06) , 2006 . Runa Bhaumik, Chad Williams, Bamshad Mobasher, and Robin Burke. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th workshop on intelligent techniques for web personalization (ITWP'06), 2006."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1097047.1097061"},{"key":"e_1_3_2_1_12_1","volume-title":"Proc. of the SIAM International Conference on Data Mining. SIAM","author":"Al Mamunur Rashid George Karypis","year":"2005","unstructured":"George Karypis Al Mamunur Rashid and John Riedl . Influence in ratings-based recommender systems: An algorithm-independent approach . In Proc. of the SIAM International Conference on Data Mining. SIAM , 2005 . George Karypis Al Mamunur Rashid and John Riedl. Influence in ratings-based recommender systems: An algorithm-independent approach. In Proc. of the SIAM International Conference on Data Mining. SIAM, 2005."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.dss.2013.01.020"}],"event":{"name":"SIGIR '14: The 37th International ACM SIGIR Conference on Research and Development in Information Retrieval","location":"Gold Coast Queensland Australia","acronym":"SIGIR '14","sponsor":["SIGIR ACM Special Interest Group on Information Retrieval"]},"container-title":["Proceedings of the 37th international ACM SIGIR conference on Research &amp; development in information retrieval"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609483","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2600428.2609483","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:05Z","timestamp":1750230065000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2600428.2609483"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,7,3]]},"references-count":13,"alternative-id":["10.1145\/2600428.2609483","10.1145\/2600428"],"URL":"https:\/\/doi.org\/10.1145\/2600428.2609483","relation":{},"subject":[],"published":{"date-parts":[[2014,7,3]]},"assertion":[{"value":"2014-07-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}