{"id":"https://openalex.org/W2791170775","doi":"https://doi.org/10.1093/comjnl/bxy008","title":"A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network","display_name":"A shilling attack detector based on convolutional neural network for collaborative recommender system in social aware network","publication_year":2018,"publication_date":"2018-01-12","ids":{"openalex":"https://openalex.org/W2791170775","doi":"https://doi.org/10.1093/comjnl/bxy008","mag":"2791170775"},"language":"en","primary_location":{"id":"doi:10.1093/comjnl/bxy008","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy008","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038117386","display_name":"Chao Tong","orcid":"https://orcid.org/0000-0003-4414-4965"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Chao Tong","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5101874108","display_name":"Xiang Yin","orcid":"https://orcid.org/0000-0003-2656-9134"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Xiang Yin","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100361942","display_name":"Jun Li","orcid":"https://orcid.org/0000-0002-7903-8954"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jun Li","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5049022297","display_name":"Tongyu Zhu","orcid":"https://orcid.org/0000-0002-2284-4795"},"institutions":[{"id":"https://openalex.org/I82880672","display_name":"Beihang University","ror":"https://ror.org/00wk2mp56","country_code":"CN","type":"education","lineage":["https://openalex.org/I82880672"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tongyu Zhu","raw_affiliation_strings":["School of Computer Science and Engineering, Beihang University, Beijing, China"],"affiliations":[{"raw_affiliation_string":"School of Computer Science and Engineering, Beihang University, Beijing, China","institution_ids":["https://openalex.org/I82880672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5016174389","display_name":"Renli Lv","orcid":"https://orcid.org/0009-0003-6798-8906"},"institutions":[{"id":"https://openalex.org/I4210123833","display_name":"Civil Aviation Management Institute of China","ror":"https://ror.org/03eh3c696","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123833"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Renli Lv","raw_affiliation_strings":["Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China","institution_ids":["https://openalex.org/I4210123833"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5043777246","display_name":"Liang Sun","orcid":"https://orcid.org/0000-0003-2326-4802"},"institutions":[{"id":"https://openalex.org/I4210123833","display_name":"Civil Aviation Management Institute of China","ror":"https://ror.org/03eh3c696","country_code":"CN","type":"education","lineage":["https://openalex.org/I4210123833"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Liang Sun","raw_affiliation_strings":["Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Department of General Aviation, Civil Aviation Management Institute of China, Beijing, China","institution_ids":["https://openalex.org/I4210123833"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5076776322","display_name":"Joel J. P. C. Rodrigues","orcid":"https://orcid.org/0000-0001-8657-3800"},"institutions":[{"id":"https://openalex.org/I3125581668","display_name":"Universidade de Fortaleza","ror":"https://ror.org/02ynbzc81","country_code":"BR","type":"education","lineage":["https://openalex.org/I3125581668"]},{"id":"https://openalex.org/I71346753","display_name":"National Institute of Telecommunications","ror":"https://ror.org/0378w3a30","country_code":"BR","type":"facility","lineage":["https://openalex.org/I71346753"]},{"id":"https://openalex.org/I4210120471","display_name":"Instituto de Telecomunica\u00e7\u00f5es","ror":"https://ror.org/02ht4fk33","country_code":"PT","type":"nonprofit","lineage":["https://openalex.org/I4210120471"]},{"id":"https://openalex.org/I173089394","display_name":"ITMO University","ror":"https://ror.org/04txgxn49","country_code":"RU","type":"education","lineage":["https://openalex.org/I173089394"]}],"countries":["BR","PT","RU"],"is_corresponding":true,"raw_author_name":"Joel J P C Rodrigues","raw_affiliation_strings":["ITMO University, 49 Kronverksky Pr., 191002 St. Petersburg, Russia","Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, Lisboa, Portugal","National Institute of Telecommunications (Inatel), Av. Jo\u00e3o de Camargo, 510 - Centro, 37540-000 Santa Rita do Sapuca\u00ed, MG, Brazil","University of Fortaleza (UNIFOR), Av. Washington Soares, 1321 Edson Queiroz, Fortaleza\u2014CE, Brazil"],"affiliations":[{"raw_affiliation_string":"ITMO University, 49 Kronverksky Pr., 191002 St. Petersburg, Russia","institution_ids":["https://openalex.org/I173089394"]},{"raw_affiliation_string":"Instituto de Telecomunica\u00e7\u00f5es, Av. Rovisco Pais 1, Lisboa, Portugal","institution_ids":["https://openalex.org/I4210120471"]},{"raw_affiliation_string":"National Institute of Telecommunications (Inatel), Av. Jo\u00e3o de Camargo, 510 - Centro, 37540-000 Santa Rita do Sapuca\u00ed, MG, Brazil","institution_ids":["https://openalex.org/I71346753"]},{"raw_affiliation_string":"University of Fortaleza (UNIFOR), Av. Washington Soares, 1321 Edson Queiroz, Fortaleza\u2014CE, Brazil","institution_ids":["https://openalex.org/I3125581668"]}]}],"institutions":[],"countries_distinct_count":4,"institutions_distinct_count":7,"corresponding_author_ids":["https://openalex.org/A5076776322"],"corresponding_institution_ids":["https://openalex.org/I173089394","https://openalex.org/I3125581668","https://openalex.org/I4210120471","https://openalex.org/I71346753"],"apc_list":{"value":2635,"currency":"GBP","value_usd":3232},"apc_paid":null,"fwci":12.5661,"has_fulltext":false,"cited_by_count":66,"citation_normalized_percentile":{"value":0.9860663,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":"61","issue":"7","first_page":"949","last_page":"958"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10203","display_name":"Recommender Systems and Techniques","score":0.9965999722480774,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9941999912261963,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11165","display_name":"Image and Video Quality Assessment","score":0.9939000010490417,"subfield":{"id":"https://openalex.org/subfields/1707","display_name":"Computer Vision and Pattern Recognition"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.88912433385849},{"id":"https://openalex.org/keywords/collaborative-filtering","display_name":"Collaborative filtering","score":0.8058711886405945},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.7917079925537109},{"id":"https://openalex.org/keywords/recommender-system","display_name":"Recommender system","score":0.78670334815979},{"id":"https://openalex.org/keywords/convolutional-neural-network","display_name":"Convolutional neural network","score":0.7392075061798096},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.5273633599281311},{"id":"https://openalex.org/keywords/social-network","display_name":"Social network (sociolinguistics)","score":0.4961915612220764},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.4708744287490845},{"id":"https://openalex.org/keywords/deep-learning","display_name":"Deep learning","score":0.4636102616786957},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33685004711151123},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.2664918899536133},{"id":"https://openalex.org/keywords/social-media","display_name":"Social media","score":0.17519602179527283},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.14930349588394165}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.88912433385849},{"id":"https://openalex.org/C21569690","wikidata":"https://www.wikidata.org/wiki/Q94702","display_name":"Collaborative filtering","level":3,"score":0.8058711886405945},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.7917079925537109},{"id":"https://openalex.org/C557471498","wikidata":"https://www.wikidata.org/wiki/Q554950","display_name":"Recommender system","level":2,"score":0.78670334815979},{"id":"https://openalex.org/C81363708","wikidata":"https://www.wikidata.org/wiki/Q17084460","display_name":"Convolutional neural network","level":2,"score":0.7392075061798096},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.5273633599281311},{"id":"https://openalex.org/C4727928","wikidata":"https://www.wikidata.org/wiki/Q17164759","display_name":"Social network (sociolinguistics)","level":3,"score":0.4961915612220764},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.4708744287490845},{"id":"https://openalex.org/C108583219","wikidata":"https://www.wikidata.org/wiki/Q197536","display_name":"Deep learning","level":2,"score":0.4636102616786957},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33685004711151123},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.2664918899536133},{"id":"https://openalex.org/C518677369","wikidata":"https://www.wikidata.org/wiki/Q202833","display_name":"Social media","level":2,"score":0.17519602179527283},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.14930349588394165}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1093/comjnl/bxy008","is_oa":false,"landing_page_url":"https://doi.org/10.1093/comjnl/bxy008","pdf_url":null,"source":{"id":"https://openalex.org/S44643521","display_name":"The Computer Journal","issn_l":"0010-4620","issn":["0010-4620","1460-2067"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310311648","host_organization_name":"Oxford University Press","host_organization_lineage":["https://openalex.org/P4310311648","https://openalex.org/P4310311647"],"host_organization_lineage_names":["Oxford University Press","University of Oxford"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"The Computer Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4099999964237213,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https://openalex.org/W1667072054","https://openalex.org/W1968305525","https://openalex.org/W1971040550","https://openalex.org/W1977290284","https://openalex.org/W1989279326","https://openalex.org/W2000855935","https://openalex.org/W2022613648","https://openalex.org/W2057529293","https://openalex.org/W2068722418","https://openalex.org/W2076063813","https://openalex.org/W2099880245","https://openalex.org/W2101926813","https://openalex.org/W2117668875","https://openalex.org/W2117731089","https://openalex.org/W2163605009","https://openalex.org/W2573525856","https://openalex.org/W6637187546","https://openalex.org/W6684191040"],"related_works":["https://openalex.org/W1484355083","https://openalex.org/W2772628444","https://openalex.org/W4220714703","https://openalex.org/W2735929803","https://openalex.org/W2170391450","https://openalex.org/W2098758514","https://openalex.org/W3008845055","https://openalex.org/W4376854386","https://openalex.org/W2508671622","https://openalex.org/W1497071005"],"abstract_inverted_index":{"One":[0],"of":[1,20,33,59,79,163,168],"the":[2,7,16,57,87,133,155,158,165],"most":[3],"fundamental":[4],"tasks":[5],"in":[6,45,183],"socially":[8],"aware":[9],"network":[10,122],"(SAN)":[11],"paradigm":[12],"is":[13,40,161],"to":[14,24,73,85,124,154,179],"explore":[15],"attributes":[17],"and":[18,28,172,181],"behavior":[19,39],"users,":[21,69],"which":[22,76,101,119,177],"helps":[23],"design":[25],"more":[26,140,151],"suitable":[27],"efficient":[29,106],"protocols.":[30],"Particularly,":[31],"detection":[32,92],"shilling":[34,74,90,149],"attackers":[35],"by":[36,68],"mining":[37],"users\u2019":[38],"a":[41,111],"frequently":[42],"discussed":[43],"topic":[44],"many":[46],"social":[47],"scenes":[48],"like":[49],"recommender":[50],"systems":[51],"based":[52,64],"on":[53,65],"collaborative":[54,60],"filtering.":[55],"As":[56],"performances":[58],"filtering":[61],"are":[62,71,102],"entirely":[63],"ratings":[66],"provided":[67],"they":[70],"vulnerable":[72],"attacks":[75,150,170],"perform":[77],"injection":[78],"biased":[80],"profiles":[81],"into":[82],"rating":[83,130,139],"databases":[84],"alter":[86],"systems.":[88],"Current":[89],"attack":[91],"methods":[93],"detect":[94,148],"spam":[95],"users":[96,129,138],"through":[97],"artificially":[98,143],"designed":[99,144],"features,":[100,145],"neither":[103],"robust":[104],"nor":[105],"enough.":[107],"This":[108],"paper":[109],"illustrates":[110],"novel":[112],"convolutional":[113],"neural":[114],"network-based":[115],"method":[116,160],"named":[117],"CNN-SAD,":[118],"applies":[120],"transformed":[121],"structure":[123],"exploit":[125],"deep-level":[126,135],"features":[127,136],"from":[128],"profiles.":[131],"Since":[132],"achieved":[134],"elaborate":[137],"precisely":[141,171],"than":[142],"CNN-SAD":[146],"can":[147],"efficiently.":[152],"According":[153],"experimental":[156],"results,":[157],"proposed":[159],"capable":[162],"detecting":[164],"vast":[166],"majority":[167],"obfuscated":[169],"outperforms":[173],"other":[174],"state-of-the-art":[175],"algorithms,":[176],"contributes":[178],"applications":[180],"security":[182],"SAN.":[184]},"counts_by_year":[{"year":2025,"cited_by_count":10},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":10},{"year":2022,"cited_by_count":8},{"year":2021,"cited_by_count":14},{"year":2020,"cited_by_count":9},{"year":2019,"cited_by_count":8},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
