Friends or Foes: Distributed and Randomized Algorithms to Determine Dishonest Recommenders in Online Social Networks
暂无分享,去创建一个
[1] N. Matloff,et al. Message R eaper : Using Social Behavior to Reduce Malicious Activity in Networks , 2008 .
[2] Matthew Richardson,et al. Mining the network value of customers , 2001, KDD '01.
[3] Baochun Li,et al. Null Keys: Limiting Malicious Attacks Via Null Space Properties of Network Coding , 2009, IEEE INFOCOM 2009.
[4] Vladimiro Sassone,et al. A formal model for trust in dynamic networks , 2003, First International Conference onSoftware Engineering and Formal Methods, 2003.Proceedings..
[5] Éva Tardos,et al. Maximizing the Spread of Influence through a Social Network , 2015, Theory Comput..
[6] Matthew Richardson,et al. Mining knowledge-sharing sites for viral marketing , 2002, KDD.
[7] Athanasios V. Vasilakos,et al. BASA: building mobile Ad-Hoc social networks on top of android , 2014, IEEE Network.
[8] Martin Ester,et al. A matrix factorization technique with trust propagation for recommendation in social networks , 2010, RecSys '10.
[9] John S. Baras,et al. Malicious Users in Unstructured Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[10] Rakesh Kumar,et al. Pollution in P2P file sharing systems , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[11] Jure Leskovec,et al. Microscopic evolution of social networks , 2008, KDD.
[12] Ben Y. Zhao,et al. Multi-scale dynamics in a massive online social network , 2012, Internet Measurement Conference.
[13] John C. S. Lui,et al. On Modeling Product Advertisement in Large-Scale Online Social Networks , 2012, IEEE/ACM Transactions on Networking.
[14] Jon M. Kleinberg,et al. Feedback effects between similarity and social influence in online communities , 2008, KDD.
[15] Stephen Weeks,et al. Understanding trust management systems , 2001, Proceedings 2001 IEEE Symposium on Security and Privacy. S&P 2001.
[16] John Riedl,et al. Is seeing believing?: how recommender system interfaces affect users' opinions , 2003, CHI '03.
[17] Donald F. Towsley,et al. On distinguishing between Internet power law topology generators , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[18] Jure Leskovec,et al. The dynamics of viral marketing , 2005, EC '06.
[19] Daqiang Zhang,et al. NextCell: Predicting Location Using Social Interplay from Cell Phone Traces , 2015, IEEE Transactions on Computers.
[20] Mahmudur Rahman,et al. Turning the Tide: Curbing Deceptive Yelp Behaviors , 2014, SDM.
[21] Albert,et al. Emergence of scaling in random networks , 1999, Science.
[22] Gediminas Adomavicius,et al. Toward the next generation of recommender systems: a survey of the state-of-the-art and possible extensions , 2005, IEEE Transactions on Knowledge and Data Engineering.
[23] John C. S. Lui,et al. Stochastic analysis of a randomized detection algorithm for pollution attack in P2P live streaming systems , 2010, Perform. Evaluation.
[24] Abhinav Kumar,et al. Spotting opinion spammers using behavioral footprints , 2013, KDD.
[25] Arjun Mukherjee,et al. Exploiting Burstiness in Reviews for Review Spammer Detection , 2021, ICWSM.
[26] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[27] Jennifer Golbeck,et al. The dynamics of Web-based social networks: Membership, relationships, and change , 2007, First Monday.
[28] John C. S. Lui,et al. Epidemic Attacks in Network-Coding-Enabled Wireless Mesh Networks: Detection, Identification, and Evaluation , 2013, IEEE Transactions on Mobile Computing.
[29] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[30] John C. S. Lui,et al. Mathematical Modeling of Advertisement and Influence Spread in Social Networks , 2009 .
[31] Mogens Nielsen,et al. Trust structures , 2007, International Journal of Information Security.
[32] Jacob Goldenberg,et al. Talk of the Network: A Complex Systems Look at the Underlying Process of Word-of-Mouth , 2001 .
[33] Wei Chen,et al. Scalable influence maximization for prevalent viral marketing in large-scale social networks , 2010, KDD.