{"id":"https://openalex.org/W4412404647","doi":"https://doi.org/10.1109/cniot65435.2025.11070566","title":"Multi-Scale Feature Fusion-Based Shilling Attack Detection Algorithm","display_name":"Multi-Scale Feature Fusion-Based Shilling Attack Detection Algorithm","publication_year":2025,"publication_date":"2025-05-23","ids":{"openalex":"https://openalex.org/W4412404647","doi":"https://doi.org/10.1109/cniot65435.2025.11070566"},"language":"en","primary_location":{"id":"doi:10.1109/cniot65435.2025.11070566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cniot65435.2025.11070566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5035061159","display_name":"Junjie Jia","orcid":"https://orcid.org/0000-0001-6250-0156"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Junjie Jia","raw_affiliation_strings":["Northwest Normal University,Gansu,China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University,Gansu,China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5015926318","display_name":"Tianle Li","orcid":null},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Tianle Li","raw_affiliation_strings":["Northwest Normal University,Gansu,China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University,Gansu,China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5067671443","display_name":"Wei Zhao","orcid":"https://orcid.org/0000-0002-6060-1022"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Wei Zhao","raw_affiliation_strings":["Northwest Normal University,Gansu,China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University,Gansu,China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5083458652","display_name":"Zhiru Liu","orcid":null},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Zhiru Liu","raw_affiliation_strings":["Northwest Normal University,Gansu,China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University,Gansu,China","institution_ids":["https://openalex.org/I68986083"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5038675948","display_name":"Jiabin Feng","orcid":"https://orcid.org/0000-0001-9890-0119"},"institutions":[{"id":"https://openalex.org/I68986083","display_name":"Northwest Normal University","ror":"https://ror.org/00gx3j908","country_code":"CN","type":"education","lineage":["https://openalex.org/I68986083"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Jiabin Feng","raw_affiliation_strings":["Northwest Normal University,Gansu,China"],"affiliations":[{"raw_affiliation_string":"Northwest Normal University,Gansu,China","institution_ids":["https://openalex.org/I68986083"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":5,"corresponding_author_ids":["https://openalex.org/A5035061159"],"corresponding_institution_ids":["https://openalex.org/I68986083"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.22478148,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9702000021934509,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9643999934196472,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T13731","display_name":"Advanced Computing and Algorithms","score":0.9506999850273132,"subfield":{"id":"https://openalex.org/subfields/3322","display_name":"Urban Studies"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.728837251663208},{"id":"https://openalex.org/keywords/scale","display_name":"Scale (ratio)","score":0.6277881264686584},{"id":"https://openalex.org/keywords/fusion","display_name":"Fusion","score":0.5456756353378296},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.5259395241737366},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.42230966687202454},{"id":"https://openalex.org/keywords/pattern-recognition","display_name":"Pattern recognition (psychology)","score":0.3366515040397644},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3258872926235199}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.728837251663208},{"id":"https://openalex.org/C2778755073","wikidata":"https://www.wikidata.org/wiki/Q10858537","display_name":"Scale (ratio)","level":2,"score":0.6277881264686584},{"id":"https://openalex.org/C158525013","wikidata":"https://www.wikidata.org/wiki/Q2593739","display_name":"Fusion","level":2,"score":0.5456756353378296},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.5259395241737366},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.42230966687202454},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.3366515040397644},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3258872926235199},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cniot65435.2025.11070566","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cniot65435.2025.11070566","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 6th International Conference on Computing, Networks and Internet of Things (CNIOT)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":9,"referenced_works":["https://openalex.org/W2072651985","https://openalex.org/W3012231004","https://openalex.org/W3209941761","https://openalex.org/W4200196625","https://openalex.org/W4282835044","https://openalex.org/W4283314653","https://openalex.org/W4388461972","https://openalex.org/W4391787756","https://openalex.org/W4402527006"],"related_works":["https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W4409439182","https://openalex.org/W2053286651","https://openalex.org/W2181743346","https://openalex.org/W2187401768","https://openalex.org/W2181413294","https://openalex.org/W2052122378","https://openalex.org/W2544423928","https://openalex.org/W2062023542"],"abstract_inverted_index":{"With":[0],"the":[1,5,36,42,91,119],"rapid":[2],"development":[3],"of":[4,38,44,51],"internet":[6],"and":[7,48,81,100],"information":[8,20],"technology,":[9],"recommendation":[10],"systems":[11,25],"have":[12],"become":[13],"a":[14,63,72,83,105],"crucial":[15],"tool":[16],"for":[17,112],"delivering":[18],"personalized":[19],"to":[21,29,76,86],"users.":[22],"However,":[23],"these":[24],"are":[26],"often":[27],"vulnerable":[28],"shilling":[30,57],"attacks,":[31],"which":[32],"can":[33],"significantly":[34],"degrade":[35],"accuracy":[37],"recommendations.":[39],"To":[40],"address":[41],"issues":[43],"poor":[45],"model":[46,111],"generalization":[47],"suboptimal":[49],"detection":[50,59,67,131],"cold-start":[52,136],"fraudulent":[53,137],"users":[54,138],"in":[55,90,134],"existing":[56],"attack":[58,113,127],"methods,":[60],"we":[61,103],"propose":[62],"multi-scale":[64,73,106],"feature":[65,107],"fusion":[66,108],"algorithm.":[68],"The":[69],"algorithm":[70,121],"leverages":[71],"neural":[74,109],"network":[75,110],"extract":[77],"users'":[78],"rating":[79],"profiles":[80],"employs":[82],"Variational":[84],"Autoencoder":[85],"uncover":[87],"latent":[88],"features":[89],"ratings.":[92],"By":[93],"incorporating":[94],"self-attention":[95],"mechanisms,":[96],"probability":[97],"density":[98],"distributions,":[99],"user":[101],"preferences,":[102],"construct":[104],"detection.":[114],"Experimental":[115],"results":[116],"demonstrate":[117],"that":[118],"proposed":[120],"exhibits":[122],"robust":[123],"performance":[124],"across":[125],"various":[126],"scenarios,":[128],"showing":[129],"superior":[130],"accuracy,":[132],"especially":[133],"identifying":[135],"at":[139],"lower":[140],"fill":[141],"rates.":[142]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
