References
- M. Brennan, S. Wrazien, and R. Greenstadt, "Using Machine Learning to Augment Collaborative Filtering of Community Discussions," in Proc. of the 9th Int'l Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1569-1570, 2010.
- R. Burke, B. Mobasher, C. Williams, and R. Bhaumik, "Classification Features for Attack Detection in Collaborative Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 542-547, 2006.
- P. Chirita, W. Nejdl, and C. Zamfir, "Preventing Shilling Attacks in Online Recommender Systems," in Proc. of the 7th Annual ACM Int'l Workshop on Web Information and Data Management (WIDM), pp. 67-74, 2005.
- M. Eisend, "Source Credibility Dimensions in Marketing Communication-A Generalized Solution," Journal of Empirical Generalisations in Marketing Science, vol. 10, no. 2, 1-33, 2006.
- S. Grazioli and S. L. Jarvenpaa, "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp. 395-410, 2000. https://doi.org/10.1109/3468.852434
- I. Gunes, C. Kaleli, A. Bilge, and H. Polat, "Shilling Attacks against Recommender Systems: A Comprehensive Survey," Artificial Intelligence Review, pp. 1-33, 2012.
- G. Häuubl and V. Trifts, "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids," Marketing Science, vol. 19, no. 1, pp. 4-21, 2000. https://doi.org/10.1287/mksc.19.1.4.15178
- J. Howe, "The Rise of Crowdsourcing," Wired, 2006.
- N. Hurley, Z. Cheng, and M. Zhang, "Statistical Attack Detection," in Proc. of the 3rd ACM Conf. on Recommender Systems (RecSys), pp. 149-156, 2009.
- S. Lam and J. Riedl, "Shilling Recommender Systems for Fun and Profit," in Proc. of the 13th Int'l Conf. on World Wide Web (WWW), pp. 393-402, 2004.
- C. Leadbeater, "WE-THINK: Mass Innovation, not Mass Production," Profile Books, 2008.
- J.-S. Lee and D. Zhu, "Shilling Attack Detection-A New Approach for a Trustworthy Recommender System," INFORMS Journal on Computing, vol. 24, no. 1, pp. 117-131, 2012. https://doi.org/10.1287/ijoc.1100.0440
- P. Levy, "L'Intelligence Collective: Pour Une Anthropologie Du Cyberspace," La Decouverte, 1997.
- M. Limayem, M. Khalifa, and A. Frini, "What Makes Consumers Buy from Internet? A Longitudinal Study of Online Shopping," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp.421-432, 2000. https://doi.org/10.1109/3468.852436
- B. Mobasher, R. Burke, R. Bhaumik, and C. Williams, "Towards Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness," ACM Transactions on Internet Technology, vol. 7, no. 2, pp. 1-40, 2007. https://doi.org/10.1145/1189740.1189741
- Nielsen, "Trends in Online Shopping," a global Nielsen consumer report, Feb. 2008.
- H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems," IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 45, no. 12, pp. 1564-1576, 2015. https://doi.org/10.1109/TSMC.2015.2416126
- H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Trustable Aggregation of Online Ratings," in Proc. of the 22nd ACM Int'l Conf. on Information and Knowledge Management (CIKM), pp. 1233-1236, 2013.
- S. Y. Rieh and D. Danielson, "Credibility: A Multidisciplinary Framework," Annual Review of Information Science and Technology, vol. 41, no. 1, pp. 307-364, 2007. https://doi.org/10.1002/aris.2007.1440410114
- J. Surowiecki, "The Wisdom of Crowds: Why the Many are Smarter than the Few and how Collective Wisdom Shapes Business, Economies, Societies, and Nations," NY: Doubleday, 2004.
- A. Whitby, A. Josang and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," The Icfain Journal of Management Research, vol. 4, no. 2, pp. 48-64, 2005.
- Z. Wu, J. Cao, B. Mao, and Y. Wang, "Semi-Sad: Applying Semi-Supervised Learning to Shilling Attack Detection," in Proc. of the 5th ACM Conf. on Recommender Systems (RecSys), pp. 289-292, 2011.
- Z. Wu, J. Wu, J. Cao, and D. Tao, "HySAD: A Semi-Supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation," in Proc. of the 18th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 985-993, 2012.
- S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon, "Attack Detection in Time Series for Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 809-814, 2006.
- A. Ng, Machine Learning and AI via Brain simulations, Stanford University, 2015.
- "Feature Engineering: How to transform variables and create new ones?" Analytics Vidhya. 2015.
- J. Brownlee, "Discover Feature Engineering, How to Engineer Features and How to Get Good at It," Machine Learning Mastery, 2015.
- H. Ding, L. Cao, Y. Ren, K.-K. R. Choo, and B. Shi, "Reputation-Based Investment Helps to Optimize Group Behaviors in Spatial Lattice Networks," PLoS ONE, 2016.
- H. Ding, Y. Zhang, Y. Ren, B. Shi, and K.-K. R. Choo, "Heterogeneous Investment in Spatial Public Goods Game with Mixed Strategy," Soft Computing, 2016.
- H. Ding, J. Huang, Y. Chen, Y. Ren, "Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game," in Proc. of The 13rd IEEE Int'l Conf. on Dependable, Autonomic and Secure Computing (DASC2015), pp. 1954-1959, 2015.
- T. Ma, J. Zhou, M. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee, "Social Network and Tag Sources based Augmenting Collaborative Recommender System," IEICE transactions on Information and Systems, vol. E98-D, no.4, pp. 902-910, Apr. 2015. https://doi.org/10.1587/transinf.2014EDP7283
- B. Gu, X. Sun and V. S. Sheng, "Structural Minimax Probability Machine," IEEE Transactions on Neural Networks and Learning Systems, 2016
- Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," IEEE Transactions on Parallel and Distributed Systems, 2015