{"id":"https://openalex.org/W3155761614","doi":"https://doi.org/10.1007/s40747-021-00357-2","title":"A genre trust model for defending shilling attacks in recommender systems","display_name":"A genre trust model for defending shilling attacks in recommender systems","publication_year":2021,"publication_date":"2021-04-15","ids":{"openalex":"https://openalex.org/W3155761614","doi":"https://doi.org/10.1007/s40747-021-00357-2","mag":"3155761614"},"language":"en","primary_location":{"id":"doi:10.1007/s40747-021-00357-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00357-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00357-2.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","doaj"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00357-2.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100341560","display_name":"Yang Li","orcid":"https://orcid.org/0000-0002-5634-0245"},"institutions":[{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Li Yang","raw_affiliation_strings":["Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5103099146","display_name":"Xinxin Niu","orcid":"https://orcid.org/0000-0002-8143-0189"},"institutions":[{"id":"https://openalex.org/I178232147","display_name":"Guizhou University","ror":"https://ror.org/02wmsc916","country_code":"CN","type":"education","lineage":["https://openalex.org/I178232147"]},{"id":"https://openalex.org/I139759216","display_name":"Beijing University of Posts and Telecommunications","ror":"https://ror.org/04w9fbh59","country_code":"CN","type":"education","lineage":["https://openalex.org/I139759216"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xinxin Niu","raw_affiliation_strings":["Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China","Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, China"],"affiliations":[{"raw_affiliation_string":"Computer Science and Technology, Beijing University of Posts and Telecommunications, Beijing, China","institution_ids":["https://openalex.org/I139759216"]},{"raw_affiliation_string":"Guizhou Provincial Key Laboratory of Public Big Data, Guizhou University, Guiyang, China","institution_ids":["https://openalex.org/I178232147"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5100341560"],"corresponding_institution_ids":["https://openalex.org/I139759216"],"apc_list":{"value":1320,"currency":"GBP","value_usd":1619},"apc_paid":{"value":1320,"currency":"GBP","value_usd":1619},"fwci":2.2708,"has_fulltext":true,"cited_by_count":15,"citation_normalized_percentile":{"value":0.89909723,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":94,"max":99},"biblio":{"volume":"9","issue":"3","first_page":"2929","last_page":"2942"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9968000054359436,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10927","display_name":"Access Control and Trust","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.890567421913147},{"id":"https://openalex.org/keywords/credibility","display_name":"Credibility","score":0.8280503749847412},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8019900321960449},{"id":"https://openalex.org/keywords/vulnerability","display_name":"Vulnerability (computing)","score":0.5683304071426392},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.5252306461334229},{"id":"https://openalex.org/keywords/information-overload","display_name":"Information overload","score":0.44444209337234497},{"id":"https://openalex.org/keywords/information-retrieval","display_name":"Information retrieval","score":0.397286057472229},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3687363862991333},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.25326353311538696}],"concepts":[{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.890567421913147},{"id":"https://openalex.org/C2780224610","wikidata":"https://www.wikidata.org/wiki/Q1530061","display_name":"Credibility","level":2,"score":0.8280503749847412},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8019900321960449},{"id":"https://openalex.org/C95713431","wikidata":"https://www.wikidata.org/wiki/Q631425","display_name":"Vulnerability (computing)","level":2,"score":0.5683304071426392},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.5252306461334229},{"id":"https://openalex.org/C186625053","wikidata":"https://www.wikidata.org/wiki/Q1130191","display_name":"Information overload","level":2,"score":0.44444209337234497},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.397286057472229},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3687363862991333},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.25326353311538696},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1007/s40747-021-00357-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00357-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00357-2.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},{"id":"pmh:oai:doaj.org/article:e8c28488c7fd4238b2949fc2865edee9","is_oa":true,"landing_page_url":"https://doaj.org/article/e8c28488c7fd4238b2949fc2865edee9","pdf_url":null,"source":{"id":"https://openalex.org/S112646816","display_name":"SHILAP Revista de lepidopterolog\u00eda","issn_l":"0300-5267","issn":["0300-5267","2340-4078"],"is_oa":true,"is_in_doaj":true,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Complex & Intelligent Systems, Vol 9, Iss 3, Pp 2929-2942 (2021)","raw_type":"article"}],"best_oa_location":{"id":"doi:10.1007/s40747-021-00357-2","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s40747-021-00357-2","pdf_url":"https://link.springer.com/content/pdf/10.1007/s40747-021-00357-2.pdf","source":{"id":"https://openalex.org/S3035462843","display_name":"Complex & Intelligent Systems","issn_l":"2198-6053","issn":["2198-6053","2199-4536"],"is_oa":true,"is_in_doaj":true,"is_core":true,"host_organization":"https://openalex.org/P4310319900","host_organization_name":"Springer Science+Business Media","host_organization_lineage":["https://openalex.org/P4310319900","https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Science+Business Media","Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Complex &amp; Intelligent Systems","raw_type":"journal-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W3155761614.pdf","grobid_xml":"https://content.openalex.org/works/W3155761614.grobid-xml"},"referenced_works_count":37,"referenced_works":["https://openalex.org/W1589148151","https://openalex.org/W1599112090","https://openalex.org/W1724456722","https://openalex.org/W1980127182","https://openalex.org/W1985376385","https://openalex.org/W1995632843","https://openalex.org/W2000855935","https://openalex.org/W2045049260","https://openalex.org/W2055299609","https://openalex.org/W2064637959","https://openalex.org/W2070845054","https://openalex.org/W2072651985","https://openalex.org/W2082182279","https://openalex.org/W2082945558","https://openalex.org/W2097726984","https://openalex.org/W2098685442","https://openalex.org/W2105805302","https://openalex.org/W2114038260","https://openalex.org/W2116354394","https://openalex.org/W2168183804","https://openalex.org/W2323062091","https://openalex.org/W2343644403","https://openalex.org/W2580505502","https://openalex.org/W2604853602","https://openalex.org/W2613037166","https://openalex.org/W2760195486","https://openalex.org/W2808955393","https://openalex.org/W2884690005","https://openalex.org/W2890666358","https://openalex.org/W2913560946","https://openalex.org/W2963363076","https://openalex.org/W2970841909","https://openalex.org/W2995341338","https://openalex.org/W3023315169","https://openalex.org/W4206836763","https://openalex.org/W4211136504","https://openalex.org/W4254809550"],"related_works":["https://openalex.org/W1484355083","https://openalex.org/W2772628444","https://openalex.org/W4220714703","https://openalex.org/W2735929803","https://openalex.org/W2170391450","https://openalex.org/W3008845055","https://openalex.org/W2041004656","https://openalex.org/W2612578021","https://openalex.org/W4376854386","https://openalex.org/W2098758514"],"abstract_inverted_index":{"Abstract":[0],"Shilling":[1],"attacks":[2],"have":[3,37],"been":[4,21,38],"a":[5,34,128],"significant":[6],"vulnerability":[7],"of":[8,30,49,73,76,93,104,138,166],"collaborative":[9],"filtering":[10],"(CF)":[11],"recommender":[12,18,142],"systems,":[13],"and":[14,78,83,108,155],"trust":[15,41,51,61,67,81,106,134,158],"in":[16,42,71,97],"CF":[17],"algorithms":[19],"has":[20],"proven":[22],"to":[23,40,52,100,122,126],"be":[24],"helpful":[25],"for":[26,161],"improving":[27],"the":[28,47,65,74,102,119,139,147,153],"accuracy":[29],"system":[31,143],"recommendations.":[32],"As":[33],"few":[35],"studies":[36],"devoted":[39],"this":[43],"area,":[44],"we":[45,63],"explore":[46],"benefits":[48],"using":[50,59],"resist":[53],"shilling":[54,94,114,167],"attacks.":[55,115,168],"Rather":[56],"than":[57],"simply":[58],"user-generated":[60],"values,":[62],"propose":[64],"genre":[66,133,140,157],"degree,":[68],"which":[69],"differ":[70],"terms":[72],"genres":[75],"items":[77],"take":[79],"both":[80],"value":[82],"user":[84,124],"credibility":[85],"into":[86],"consideration.":[87],"This":[88],"paper":[89],"introduces":[90],"different":[91,164],"types":[92,165],"attack":[95],"methods":[96],"an":[98],"attempt":[99],"study":[101],"impact":[103],"users\u2019":[105],"values":[107],"behavior":[109],"features":[110],"on":[111,132,146],"defending":[112,162],"against":[113,163],"Meanwhile,":[116],"it":[117],"improves":[118],"approach":[120],"used":[121],"calculate":[123],"similarities":[125],"form":[127],"recommendation":[129],"model":[130],"based":[131],"degrees.":[135],"The":[136],"performance":[137],"trust-based":[141],"is":[144],"evaluated":[145],"Ciao":[148],"dataset.":[149],"Experimental":[150],"results":[151],"demonstrated":[152],"superior":[154],"comparable":[156],"degrees":[159],"recommended":[160]},"counts_by_year":[{"year":2025,"cited_by_count":7},{"year":2024,"cited_by_count":3},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3}],"updated_date":"2026-03-20T23:20:44.827607","created_date":"2025-10-10T00:00:00"}
