Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems
暂无分享,去创建一个
[1] Stephen Marsh,et al. Multi-layer cognitive filtering by behavioral modeling , 2011, AAMAS.
[2] Sirkka L. Jarvenpaa,et al. Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[3] Panagiotis Symeonidis,et al. Providing Justifications in Recommender Systems , 2008, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[4] Zunping Cheng,et al. Statistical attack detection , 2009, RecSys '09.
[5] John Riedl,et al. Recommender systems: from algorithms to user experience , 2012, User Modeling and User-Adapted Interaction.
[6] A. Jøsang,et al. Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .
[7] Iraklis Varlamis,et al. A Trust-Aware System for Personalized User Recommendations in Social Networks , 2014, IEEE Transactions on Systems, Man, and Cybernetics: Systems.
[8] Rachel Greenstadt,et al. Using machine learning to augment collaborative filtering of community discussions , 2010, AAMAS.
[9] Pierre Lévy. L'intelligence collective : pour une anthropologie du cyberspace , 1994 .
[10] Jie Zhang,et al. Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach , 2008, Electron. Commer. Res. Appl..
[11] Moez Limayem,et al. What makes consumers buy from Internet? A longitudinal study of online shopping , 2000, IEEE Trans. Syst. Man Cybern. Part A.
[12] Jong-Seok Lee,et al. Shilling Attack Detection - A New Approach for a Trustworthy Recommender System , 2012, INFORMS J. Comput..
[13] Soo Young Rieh,et al. Credibility: A multidisciplinary framework , 2007, Annu. Rev. Inf. Sci. Technol..
[14] Junhui Wang,et al. Detecting group review spam , 2011, WWW.
[15] Junjie Wu,et al. HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation , 2012, KDD.
[16] Eugene Santos,et al. On Deception Detection in Multiagent Systems , 2010, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[17] M. Eisend. Source Credibility Dimensions in Marketing Communication - A Generalized Solution , 2006 .
[18] Chunyan Miao,et al. iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems , 2011, AAMAS.
[19] Bamshad Mobasher,et al. Towards Trustworthy Recommender Systems : An Analysis of Attack Models and Algorithm Robustness , 2007 .
[20] Bamshad Mobasher,et al. Classification features for attack detection in collaborative recommender systems , 2006, KDD '06.
[21] Huseyin Polat,et al. Shilling attacks against recommender systems: a comprehensive survey , 2014, Artificial Intelligence Review.
[22] Ee-Peng Lim,et al. Detecting product review spammers using rating behaviors , 2010, CIKM.
[23] James Surowiecki. The wisdom of crowds: Why the many are smarter than the few and how collective wisdom shapes business, economies, societies, and nations Doubleday Books. , 2004 .
[24] Fillia Makedon,et al. Attack detection in time series for recommender systems , 2006, KDD '06.
[25] Jim Freeman,et al. Outliers in Statistical Data (3rd edition) , 1995 .
[26] Wolfgang Nejdl,et al. Preventing shilling attacks in online recommender systems , 2005, WIDM '05.
[27] Munindar P. Singh,et al. Detecting deception in reputation management , 2003, AAMAS '03.
[28] Valerie J. Trifts,et al. Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids , 2000 .
[29] Nicholas R. Jennings,et al. TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.
[30] Taghi M. Khoshgoftaar,et al. A Survey of Collaborative Filtering Techniques , 2009, Adv. Artif. Intell..