1 |
M. Eisend, "Source Credibility Dimensions in Marketing Communication-A Generalized Solution," Journal of Empirical Generalisations in Marketing Science, vol. 10, no. 2, 1-33, 2006.
|
2 |
S. Grazioli and S. L. Jarvenpaa, "Perils of Internet Fraud: An Empirical Investigation of Deception and Trust with Experienced Internet Consumers," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp. 395-410, 2000.
DOI
|
3 |
I. Gunes, C. Kaleli, A. Bilge, and H. Polat, "Shilling Attacks against Recommender Systems: A Comprehensive Survey," Artificial Intelligence Review, pp. 1-33, 2012.
|
4 |
G. Häuubl and V. Trifts, "Consumer Decision Making in Online Shopping Environments: The Effects of Interactive Decision Aids," Marketing Science, vol. 19, no. 1, pp. 4-21, 2000.
DOI
|
5 |
J. Howe, "The Rise of Crowdsourcing," Wired, 2006.
|
6 |
N. Hurley, Z. Cheng, and M. Zhang, "Statistical Attack Detection," in Proc. of the 3rd ACM Conf. on Recommender Systems (RecSys), pp. 149-156, 2009.
|
7 |
S. Lam and J. Riedl, "Shilling Recommender Systems for Fun and Profit," in Proc. of the 13th Int'l Conf. on World Wide Web (WWW), pp. 393-402, 2004.
|
8 |
C. Leadbeater, "WE-THINK: Mass Innovation, not Mass Production," Profile Books, 2008.
|
9 |
J.-S. Lee and D. Zhu, "Shilling Attack Detection-A New Approach for a Trustworthy Recommender System," INFORMS Journal on Computing, vol. 24, no. 1, pp. 117-131, 2012.
DOI
|
10 |
P. Levy, "L'Intelligence Collective: Pour Une Anthropologie Du Cyberspace," La Decouverte, 1997.
|
11 |
M. Limayem, M. Khalifa, and A. Frini, "What Makes Consumers Buy from Internet? A Longitudinal Study of Online Shopping," IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans, vol. 30, no. 4, pp.421-432, 2000.
DOI
|
12 |
J. Surowiecki, "The Wisdom of Crowds: Why the Many are Smarter than the Few and how Collective Wisdom Shapes Business, Economies, Societies, and Nations," NY: Doubleday, 2004.
|
13 |
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams, "Towards Trustworthy Recommender Systems: An Analysis of Attack Models and Algorithm Robustness," ACM Transactions on Internet Technology, vol. 7, no. 2, pp. 1-40, 2007.
DOI
|
14 |
Nielsen, "Trends in Online Shopping," a global Nielsen consumer report, Feb. 2008.
|
15 |
H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Can You Trust Online Ratings? A Mutual Reinforcement Model for Trustworthy Online Rating Systems," IEEE Transactions on Systems, Man and Cybernetics: Systems, vol. 45, no. 12, pp. 1564-1576, 2015.
DOI
|
16 |
H.-K. Oh, S.-W. Kim, S. Park, and M. Zhou, "Trustable Aggregation of Online Ratings," in Proc. of the 22nd ACM Int'l Conf. on Information and Knowledge Management (CIKM), pp. 1233-1236, 2013.
|
17 |
S. Y. Rieh and D. Danielson, "Credibility: A Multidisciplinary Framework," Annual Review of Information Science and Technology, vol. 41, no. 1, pp. 307-364, 2007.
DOI
|
18 |
A. Whitby, A. Josang and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," The Icfain Journal of Management Research, vol. 4, no. 2, pp. 48-64, 2005.
|
19 |
Z. Wu, J. Cao, B. Mao, and Y. Wang, "Semi-Sad: Applying Semi-Supervised Learning to Shilling Attack Detection," in Proc. of the 5th ACM Conf. on Recommender Systems (RecSys), pp. 289-292, 2011.
|
20 |
Z. Wu, J. Wu, J. Cao, and D. Tao, "HySAD: A Semi-Supervised Hybrid Shilling Attack Detector for Trustworthy Product Recommendation," in Proc. of the 18th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 985-993, 2012.
|
21 |
H. Ding, Y. Zhang, Y. Ren, B. Shi, and K.-K. R. Choo, "Heterogeneous Investment in Spatial Public Goods Game with Mixed Strategy," Soft Computing, 2016.
|
22 |
S. Zhang, A. Chakrabarti, J. Ford, and F. Makedon, "Attack Detection in Time Series for Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 809-814, 2006.
|
23 |
A. Ng, Machine Learning and AI via Brain simulations, Stanford University, 2015.
|
24 |
"Feature Engineering: How to transform variables and create new ones?" Analytics Vidhya. 2015.
|
25 |
J. Brownlee, "Discover Feature Engineering, How to Engineer Features and How to Get Good at It," Machine Learning Mastery, 2015.
|
26 |
H. Ding, L. Cao, Y. Ren, K.-K. R. Choo, and B. Shi, "Reputation-Based Investment Helps to Optimize Group Behaviors in Spatial Lattice Networks," PLoS ONE, 2016.
|
27 |
H. Ding, J. Huang, Y. Chen, Y. Ren, "Don't Speak to Strangers: The Suspicious Strategy Can Help to Improve Cooperation in Spatial Donation Game," in Proc. of The 13rd IEEE Int'l Conf. on Dependable, Autonomic and Secure Computing (DASC2015), pp. 1954-1959, 2015.
|
28 |
T. Ma, J. Zhou, M. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee, "Social Network and Tag Sources based Augmenting Collaborative Recommender System," IEICE transactions on Information and Systems, vol. E98-D, no.4, pp. 902-910, Apr. 2015.
DOI
|
29 |
B. Gu, X. Sun and V. S. Sheng, "Structural Minimax Probability Machine," IEEE Transactions on Neural Networks and Learning Systems, 2016
|
30 |
Z. Fu, K. Ren, J. Shu, X. Sun, and F. Huang, "Enabling Personalized Search over Encrypted Outsourced Data with Efficiency Improvement," IEEE Transactions on Parallel and Distributed Systems, 2015
|
31 |
P. Chirita, W. Nejdl, and C. Zamfir, "Preventing Shilling Attacks in Online Recommender Systems," in Proc. of the 7th Annual ACM Int'l Workshop on Web Information and Data Management (WIDM), pp. 67-74, 2005.
|
32 |
M. Brennan, S. Wrazien, and R. Greenstadt, "Using Machine Learning to Augment Collaborative Filtering of Community Discussions," in Proc. of the 9th Int'l Joint Conf. on Autonomous Agents and Multiagent Systems (AAMAS), pp. 1569-1570, 2010.
|
33 |
R. Burke, B. Mobasher, C. Williams, and R. Bhaumik, "Classification Features for Attack Detection in Collaborative Recommender Systems," in Proc. of the 12th Int'l Conf. on Knowledge Discovery and Data Mining (KDD), pp. 542-547, 2006.
|