메뉴 건너뛰기




Volumn 263, Issue , 2008, Pages 135-150

SOFIA: Social filtering for robust recommendations

Author keywords

[No Author keywords available]

Indexed keywords

ECONOMICS; NETWORK SECURITY;

EID: 44049092178     PISSN: 15715736     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-0-387-09428-1_9     Document Type: Conference Paper
Times cited : (22)

References (20)
  • 2
    • 34548577464 scopus 로고    scopus 로고
    • Segment-based injection attacks against collaborative filtering recommender systems
    • R. Burke, B.Mobasher, R. Bhaumik, and C. Williams. Segment-based injection attacks against collaborative filtering recommender systems. In Proc. IEEE ICDM '05, 2005.
    • (2005) Proc. IEEE ICDM '05
    • Burke, R.1    Mobasher, B.2    Bhaumik, R.3    Williams, C.4
  • 5
    • 44049085402 scopus 로고    scopus 로고
    • Manipulability of pagerank under sybil strategies
    • E. J. Friedman and A. Cheng. Manipulability of pagerank under sybil strategies. In Proc. NetEcon06, 2006.
    • (2006) Proc. NetEcon06
    • Friedman, E.J.1    Cheng, A.2
  • 8
    • 44049101927 scopus 로고    scopus 로고
    • The right type of trust for distributed systems
    • A. Josang. The right type of trust for distributed systems. Proc. Proc. ACM NSPW '96, 1996.
    • (1996) Proc. Proc. ACM NSPW '96
    • Josang, A.1
  • 9
    • 0031103689 scopus 로고    scopus 로고
    • H. Kautz, B. Selman, andM. Shah. Referral web: Combining social networks and collaborative filtering. Commun. ACM, 40(3):63-65, March 1997.
    • H. Kautz, B. Selman, andM. Shah. Referral web: Combining social networks and collaborative filtering. Commun. ACM, 40(3):63-65, March 1997.
  • 10
    • 4243148480 scopus 로고    scopus 로고
    • Authoritative sources in a hyperlinked environment
    • J. M. Kleinberg. Authoritative sources in a hyperlinked environment. JACM, 46, 1999.
    • (1999) JACM , vol.46
    • Kleinberg, J.M.1
  • 11
    • 44049086463 scopus 로고    scopus 로고
    • S. Lam, D. Frankowski, and J. Riedl. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. In Proc. ETRICS '06, 2006.
    • S. Lam, D. Frankowski, and J. Riedl. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. In Proc. ETRICS '06, 2006.
  • 12
    • 33749027083 scopus 로고    scopus 로고
    • When trust does not compute - the role of trust in ubiquitous computing
    • October
    • M. Langheinrich. When trust does not compute - the role of trust in ubiquitous computing. Workshop on Privacy at Ubicomp 2003, October 2003.
    • (2003) Workshop on Privacy at Ubicomp 2003
    • Langheinrich, M.1
  • 13
    • 0001313149 scopus 로고    scopus 로고
    • Salsa: The stochastic approach for link-structure analysis
    • April
    • R. Lempel and S. Moran. Salsa: The stochastic approach for link-structure analysis. ACM Trans. Inf. Syst., 19(2):131-160, April 2001.
    • (2001) ACM Trans. Inf. Syst , vol.19 , Issue.2 , pp. 131-160
    • Lempel, R.1    Moran, S.2
  • 15
    • 35348969366 scopus 로고    scopus 로고
    • Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
    • B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM TOIT, 7(4):23, 2007.
    • (2007) ACM TOIT , vol.7 , Issue.4 , pp. 23
    • Mobasher, B.1    Burke, R.2    Bhaumik, R.3    Williams, C.4
  • 16
    • 36348978097 scopus 로고    scopus 로고
    • Model-based collaborative filtering as a defense against profile injection attacks
    • B. Mobasher, R. Burke, and J. J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. In Proc. AAAI'06, 2006.
    • (2006) Proc. AAAI'06
    • Mobasher, B.1    Burke, R.2    Sandvig, J.J.3
  • 17
    • 0032507958 scopus 로고    scopus 로고
    • Evolution of indirect reciprocity by image scoring
    • M. A. Nowak and K. Sigmund. Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573-577, 1998.
    • (1998) Nature , vol.393 , Issue.6685 , pp. 573-577
    • Nowak, M.A.1    Sigmund, K.2
  • 20
    • 33750285481 scopus 로고    scopus 로고
    • Sybilguard: Defending against Sybil attacks via social networks
    • ACM
    • H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending against Sybil attacks via social networks. In ACM SIGCOMM 2006, pages 267-278. ACM, 2006.
    • (2006) ACM SIGCOMM 2006 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.