{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T23:04:31Z","timestamp":1773615871880,"version":"3.50.1"},"reference-count":15,"publisher":"Allerton Press","issue":"8","license":[{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,12,1]],"date-time":"2023-12-01T00:00:00Z","timestamp":1701388800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Aut. Control Comp. Sci."],"published-print":{"date-parts":[[2023,12]]},"DOI":"10.3103\/s0146411623080047","type":"journal-article","created":{"date-parts":[[2024,2,29]],"date-time":"2024-02-29T15:02:20Z","timestamp":1709218940000},"page":"868-874","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Method for Detecting Manipulation Attacks on Recommender Systems with Collaborative Filtering"],"prefix":"10.3103","volume":"57","author":[{"given":"A. D.","family":"Dakhnovich","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"D. S.","family":"Zagalsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"R. S.","family":"Solovey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"1627","published-online":{"date-parts":[[2024,2,29]]},"reference":[{"key":"7644_CR1","unstructured":"Recommendation Engine Market Size, Share & Trends Analysis Report by Type (Collaborative Filtering, Hybrid Recommendation), by Deployment, by Application, by Organization, by End-use, by Region, and Segment Forecasts, 2021\u20132028. https:\/\/www.grandviewresearch.com\/industry-analysis\/recommendation-engine-market-report. Cited December 10, 2022."},{"key":"7644_CR2","unstructured":"Wang, J. and Tang, Q., Recommender systems and their security concerns, 2015. https:\/\/hdl.handle.net\/10993\/30100."},{"key":"7644_CR3","doi-asserted-by":"publisher","first-page":"1931","DOI":"10.3390\/sym12111931","volume":"12","author":"D. Zegzhda","year":"2020","unstructured":"Zegzhda, D., Lavrova, D., Pavlenko, E., and Shtyrkina, A., Cyber attack prevention based on evolutionary cybernetics approach, Symmetry, 2020, vol. 12, no. 11, p. 1931. https:\/\/doi.org\/10.3390\/sym12111931","journal-title":"Symmetry"},{"key":"7644_CR4","doi-asserted-by":"publisher","first-page":"977","DOI":"10.3103\/s0146411618080163","volume":"52","author":"M.O. Kalinin","year":"2018","unstructured":"Kalinin, M.O., Zubkov, E.A., Suprun, A.F., and Pechenkin, A.I., Prevention of attacks on dynamic routing in self-organizing adhoc networks using swarm intelligence, Autom. Control Comput. Sci., 2018, vol. 52, no. 8, pp.\u00a0977\u2013983. https:\/\/doi.org\/10.3103\/s0146411618080163","journal-title":"Autom. Control Comput. Sci."},{"key":"7644_CR5","doi-asserted-by":"publisher","unstructured":"Pavlenko, E., Zegzhda, D., and Poltavtseva, M., Ensuring the sustainability of cyberphysical systems based on dynamic reconfiguration, 2019 IEEE Int. Conf. on Industrial Cyber Physical Systems (ICPS), Taipei, 2019, IEEE, 2019, pp. 60\u201364. https:\/\/doi.org\/10.1109\/icphys.2019.8780193","DOI":"10.1109\/icphys.2019.8780193"},{"key":"7644_CR6","doi-asserted-by":"crossref","unstructured":"Lam, S.K. and Riedl, J., Shilling recommender systems for fun and profit, Proc. 13th Int. Conf. on World Wide Web, New York, 2004, New York: Association for Computing Machinery, 2004, pp. 393\u2013402.","DOI":"10.1145\/988672.988726"},{"key":"7644_CR7","doi-asserted-by":"publisher","first-page":"171703","DOI":"10.1109\/access.2020.3022962","volume":"8","author":"A.P. Sundar","year":"2020","unstructured":"Sundar, A.P., Li, F., Zou, X., Gao, T., and Russomanno, E.D., Understanding shilling attacks and their detection traits: A comprehensive survey, IEEE Access, 2020, vol. 8, pp. 171703\u2013171715. https:\/\/doi.org\/10.1109\/access.2020.3022962","journal-title":"IEEE Access"},{"key":"7644_CR8","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/s11257-008-9050-4","volume":"19","author":"B. Mehta","year":"2008","unstructured":"Mehta, B. and Nejdl, W., Unsupervised strategies for shilling detection and robust collaborative filtering, User Model. User-Adapted Interaction, 2008, vol. 19, nos. 1\u20132, pp. 65\u201397. https:\/\/doi.org\/10.1007\/s11257-008-9050-4","journal-title":"User Model. User-Adapted Interaction"},{"key":"7644_CR9","doi-asserted-by":"publisher","unstructured":"Bryan, K., O\u2019Mahony, M., and Cunningham, P., Unsupervised retrieval of attack profiles in collaborative recommender systems, Proc. 2008 ACM Conf. on Recommender Systems, Lausanne, 2008, New York: Association for Computing Machinery, 2008, pp. 155\u2013162. https:\/\/doi.org\/10.1145\/1454008.1454034","DOI":"10.1145\/1454008.1454034"},{"key":"7644_CR10","unstructured":"Bhaumik, R., Mobasher, B., and Burke, R., A clustering approach to unsupervised attack detection in collaborative recommender systems, Proc. Int. Conf. on Data Science (ICDATA).\u2014The Steering Committee of the World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp), Las Veas, 2011, Stahlbock, R., Ed., CSREA Press, 2011, p. 1."},{"key":"7644_CR11","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1016\/j.procs.2014.05.257","volume":"31","author":"A. Bilge","year":"2014","unstructured":"Bilge, A., Ozdemir, Z., and Polat, H., A novel shilling attack detection method, Procedia Comput. Sci., 2014, vol. 31, pp. 165\u2013174. https:\/\/doi.org\/10.1016\/j.procs.2014.05.257","journal-title":"Procedia Comput. Sci."},{"key":"7644_CR12","doi-asserted-by":"publisher","first-page":"314","DOI":"10.1016\/j.dss.2013.01.020","volume":"55","author":"Ch.-Ya. Chung","year":"2013","unstructured":"Chung, Ch.-Ya., Hsu, P.-Yu., and Huang, Sh.-H., \u03b2P: A novel approach to filter out malicious rating profiles from recommender systems, Decision Support Syst., 2013, vol. 55, no. 1, pp. 314\u2013325. https:\/\/doi.org\/10.1016\/j.dss.2013.01.020","journal-title":"Decision Support Syst."},{"key":"7644_CR13","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1016\/j.knosys.2018.02.032","volume":"148","author":"F. Zhang","year":"2018","unstructured":"Zhang, F., Zhang, Z., Zhang, P., and Wang, S., UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering, Knowl.-Based Syst., 2018, vol. 148, pp. 146\u2013166. https:\/\/doi.org\/10.1016\/j.knosys.2018.02.032","journal-title":"Knowl.-Based Syst."},{"key":"7644_CR14","doi-asserted-by":"publisher","unstructured":"Zhang, F., Deng, Z.-J., He, Zh.-M., Lin, X.-Ch., and Sun, L.-L., Detection of shilling attack in collaborative filtering recommender system by PCA and data complexity, 2018 Int. Conf. on Machine Learning and Cybernetics (ICMLC), Chengdu, China, 2018, IEEE, 2018, pp. 673\u2013678. https:\/\/doi.org\/10.1109\/icmlc.2018.8526965","DOI":"10.1109\/icmlc.2018.8526965"},{"key":"7644_CR15","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2827872","volume":"5","author":"F. Maxwell Harper","year":"2015","unstructured":"Maxwell Harper, F. and Konstan, J.A., The MovieLens datasets: History and context, ACM Trans. Interactive Intell. Syst. \n               (TiiS), 2015, vol. 5, no. 4, p. 19. https:\/\/doi.org\/10.1145\/2827872","journal-title":"ACM Trans. Interactive Intell. Syst."}],"container-title":["Automatic Control and Computer Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080047.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.3103\/S0146411623080047","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.3103\/S0146411623080047.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,15]],"date-time":"2026-03-15T22:05:58Z","timestamp":1773612358000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.3103\/S0146411623080047"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,12]]},"references-count":15,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2023,12]]}},"alternative-id":["7644"],"URL":"https:\/\/doi.org\/10.3103\/s0146411623080047","relation":{},"ISSN":["0146-4116","1558-108X"],"issn-type":[{"value":"0146-4116","type":"print"},{"value":"1558-108X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,12]]},"assertion":[{"value":"3 February 2023","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"28 February 2023","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"3 March 2023","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"29 February 2024","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"The authors of this work declare that they have no conflicts of interest.","order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"CONFLICT OF INTEREST"}}]}}