Noisy but non-malicious user detection in social recommender systems
暂无分享,去创建一个
Chengqi Zhang | Bin Li | Ling Chen | Xingquan Zhu | Xingquan Zhu | Ling Chen | Chengqi Zhang | Bin Li
[1] Bhaskar Mehta,et al. Unsupervised strategies for shilling detection and robust collaborative filtering , 2009, User Modeling and User-Adapted Interaction.
[2] I. Berlin. I like it. , 1921 .
[3] Bin Li,et al. Cross-Domain Collaborative Filtering: A Brief Survey , 2011, 2011 IEEE 23rd International Conference on Tools with Artificial Intelligence.
[4] Bamshad Mobasher,et al. Defending recommender systems: detection of profile injection attacks , 2007, Service Oriented Computing and Applications.
[5] Neil J. Hurley,et al. Detecting noise in recommender system databases , 2006, IUI '06.
[6] Bing Liu,et al. Review spam detection , 2007, WWW '07.
[7] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[8] Thomas Hofmann,et al. Lies and propaganda: detecting spam users in collaborative filtering , 2007, IUI '07.
[9] Athman Bouguettaya,et al. Rater Credibility Assessment in Web Services Interactions , 2009, World Wide Web.
[10] John Riedl,et al. GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.
[11] Xiaoyong Du,et al. Finding superior skyline points for multidimensional recommendation applications , 2011, World Wide Web.
[12] Garcia-MolinaHector,et al. Combating spam in tagging systems , 2008 .
[13] Bhaskar Mehta. Unsupervised Shilling Detection for Collaborative Filtering , 2007, AAAI.
[14] Kyumin Lee,et al. Uncovering social spammers: social honeypots + machine learning , 2010, SIGIR.
[15] Virgílio A. F. Almeida,et al. Detecting Spammers and Content Promoters in Online Video Social Networks , 2009, IEEE INFOCOM Workshops 2009.
[16] Peter G. Doyle,et al. Random Walks and Electric Networks: REFERENCES , 1987 .
[17] Markus Jakobsson,et al. Social phishing , 2007, CACM.
[18] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[19] Gerard Salton,et al. Research and Development in Information Retrieval , 1982, Lecture Notes in Computer Science.
[20] Neil J. Hurley,et al. Collaborative recommendation: A robustness analysis , 2004, TOIT.
[21] Georgia Koutrika,et al. Combating spam in tagging systems , 2007, AIRWeb '07.
[22] Neil J. Hurley. Robustness of recommender systems , 2011, RecSys '11.
[23] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[24] Nuria Oliver,et al. I Like It... I Like It Not: Evaluating User Ratings Noise in Recommender Systems , 2009, UMAP.
[25] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[26] Neil J. Hurley,et al. Recommender Systems: Attack Types and Strategies , 2005, AAAI.
[27] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[28] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[29] Kevin Borders,et al. Social networks and context-aware spam , 2008, CSCW.
[30] Xiaojin Zhu,et al. --1 CONTENTS , 2006 .
[31] David Carmel,et al. Social recommender systems , 2011, Recommender Systems Handbook.
[32] Qiang Yang,et al. Can Movies and Books Collaborate? Cross-Domain Collaborative Filtering for Sparsity Reduction , 2009, IJCAI.