A reliable reputation computation framework for online items in E-commerce
暂无分享,去创建一个
Lina Yao | Yong Xiang | Shui Yu | Qingqi Pei | Lichuan Ma
[1] Yang Liu,et al. Leveraging Strategic Detection Techniques for Smart Home Pricing Cyberattacks , 2016, IEEE Transactions on Dependable and Secure Computing.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Shui Yu,et al. FUIR: Fusing user and item information to deal with data sparsity by using side information in recommendation systems , 2016, J. Netw. Comput. Appl..
[4] Sunju Park,et al. Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems , 2015, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[5] Yicheng Zhang,et al. Ranking Reputation and Quality in Online Rating Systems , 2013, PloS one.
[6] Bamshad Mobasher,et al. Analysis and Detection of Segment-Focused Attacks Against Collaborative Recommendation , 2005, WEBKDD.
[7] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[8] John Riedl,et al. The Tag Genome: Encoding Community Knowledge to Support Novel Interaction , 2012, TIIS.
[9] R. Radharamanan,et al. Sensitivity analysis on the CUSUM method , 1994 .
[10] Qing Yang,et al. Building Trust in Online Rating Systems Through Signal Modeling , 2007, 27th International Conference on Distributed Computing Systems Workshops (ICDCSW'07).
[11] Bamshad Mobasher,et al. Model-Based Collaborative Filtering as a Defense against Profile Injection Attacks , 2006, AAAI.
[12] Russell Bent,et al. A likelihood ratio anomaly detector for identifying within-perimeter computer network attacks , 2016, J. Netw. Comput. Appl..
[13] David C. Wilson,et al. Attacking item-based recommender systems with power items , 2014, RecSys '14.
[14] Neil J. Hurley,et al. Recommender Systems: Attack Types and Strategies , 2005, AAAI.
[15] Chunyan Miao,et al. Protecting Online Rating Systems from Unfair Ratings , 2005, TrustBus.
[16] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[17] Siyuan Liu,et al. Securing Online Reputation Systems Through Trust Modeling and Temporal Analysis , 2013, IEEE Transactions on Information Forensics and Security.
[18] Elisa Bertino,et al. Collusion Detection in Online Rating Systems , 2013, APWeb.
[19] Bin Fang,et al. A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique , 2015, Inf. Sci..
[20] Jian Wang,et al. A trust-based method for mitigating cache poisoning in Name Data Networking , 2018, J. Netw. Comput. Appl..
[21] F. Maxwell Harper,et al. The MovieLens Datasets: History and Context , 2016, TIIS.
[22] Yuqing Sun,et al. Detecting Malicious Behavior and Collusion for Online Rating System , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[23] Zibin Zheng,et al. Reputation Measurement and Malicious Feedback Rating Prevention in Web Service Recommendation Systems , 2015, IEEE Transactions on Services Computing.
[24] Chun Chen,et al. Improving Collaborative Recommendation via User-Item Subgroups , 2016, IEEE Transactions on Knowledge and Data Engineering.