-
2
-
-
34548577464
-
Segment-based injection attacks against collaborative filtering recommender systems
-
R. Burke, B.Mobasher, R. Bhaumik, and C. Williams. Segment-based injection attacks against collaborative filtering recommender systems. In Proc. IEEE ICDM '05, 2005.
-
(2005)
Proc. IEEE ICDM '05
-
-
Burke, R.1
Mobasher, B.2
Bhaumik, R.3
Williams, C.4
-
5
-
-
44049085402
-
Manipulability of pagerank under sybil strategies
-
E. J. Friedman and A. Cheng. Manipulability of pagerank under sybil strategies. In Proc. NetEcon06, 2006.
-
(2006)
Proc. NetEcon06
-
-
Friedman, E.J.1
Cheng, A.2
-
8
-
-
44049101927
-
The right type of trust for distributed systems
-
A. Josang. The right type of trust for distributed systems. Proc. Proc. ACM NSPW '96, 1996.
-
(1996)
Proc. Proc. ACM NSPW '96
-
-
Josang, A.1
-
9
-
-
0031103689
-
-
H. Kautz, B. Selman, andM. Shah. Referral web: Combining social networks and collaborative filtering. Commun. ACM, 40(3):63-65, March 1997.
-
H. Kautz, B. Selman, andM. Shah. Referral web: Combining social networks and collaborative filtering. Commun. ACM, 40(3):63-65, March 1997.
-
-
-
-
10
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
J. M. Kleinberg. Authoritative sources in a hyperlinked environment. JACM, 46, 1999.
-
(1999)
JACM
, vol.46
-
-
Kleinberg, J.M.1
-
11
-
-
44049086463
-
-
S. Lam, D. Frankowski, and J. Riedl. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. In Proc. ETRICS '06, 2006.
-
S. Lam, D. Frankowski, and J. Riedl. Do You Trust Your Recommendations? An Exploration of Security and Privacy Issues in Recommender Systems. In Proc. ETRICS '06, 2006.
-
-
-
-
12
-
-
33749027083
-
When trust does not compute - the role of trust in ubiquitous computing
-
October
-
M. Langheinrich. When trust does not compute - the role of trust in ubiquitous computing. Workshop on Privacy at Ubicomp 2003, October 2003.
-
(2003)
Workshop on Privacy at Ubicomp 2003
-
-
Langheinrich, M.1
-
13
-
-
0001313149
-
Salsa: The stochastic approach for link-structure analysis
-
April
-
R. Lempel and S. Moran. Salsa: The stochastic approach for link-structure analysis. ACM Trans. Inf. Syst., 19(2):131-160, April 2001.
-
(2001)
ACM Trans. Inf. Syst
, vol.19
, Issue.2
, pp. 131-160
-
-
Lempel, R.1
Moran, S.2
-
15
-
-
35348969366
-
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
-
B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM TOIT, 7(4):23, 2007.
-
(2007)
ACM TOIT
, vol.7
, Issue.4
, pp. 23
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Williams, C.4
-
16
-
-
36348978097
-
Model-based collaborative filtering as a defense against profile injection attacks
-
B. Mobasher, R. Burke, and J. J. Sandvig. Model-based collaborative filtering as a defense against profile injection attacks. In Proc. AAAI'06, 2006.
-
(2006)
Proc. AAAI'06
-
-
Mobasher, B.1
Burke, R.2
Sandvig, J.J.3
-
17
-
-
0032507958
-
Evolution of indirect reciprocity by image scoring
-
M. A. Nowak and K. Sigmund. Evolution of indirect reciprocity by image scoring. Nature, 393(6685):573-577, 1998.
-
(1998)
Nature
, vol.393
, Issue.6685
, pp. 573-577
-
-
Nowak, M.A.1
Sigmund, K.2
-
20
-
-
33750285481
-
Sybilguard: Defending against Sybil attacks via social networks
-
ACM
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending against Sybil attacks via social networks. In ACM SIGCOMM 2006, pages 267-278. ACM, 2006.
-
(2006)
ACM SIGCOMM 2006
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|