-
1
-
-
0002734008
-
Horting hatches an egg: A new graph-theoretic approach to collaborative filtering
-
AGGARWAL, C. C., WOLF, J. L., WU, K.-L., AND YU, P. S. 1999. Horting hatches an egg: A new graph-theoretic approach to collaborative filtering. In Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 201-212.
-
(1999)
Proceedings of the 5th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 201-212
-
-
Aggarwal, C.C.1
Wolf, J.L.2
Wu, K.-L.3
Yu, P.S.4
-
3
-
-
26644470309
-
A trust-enhanced recommender system application: Moleskiing
-
ACM, New York
-
AVESANI, P., MASSA, P., AND TIELLA, R. 2005. A trust-enhanced recommender system application: Moleskiing. In Proceedings of the ACM Symposium on Applied Computing. ACM, New York, 1589-1593.
-
(2005)
Proceedings of the ACM Symposium on Applied Computing
, pp. 1589-1593
-
-
Avesani, P.1
Massa, P.2
Tiella, R.3
-
5
-
-
63049136298
-
Identifying video spammers in online social networks
-
ACM, New York
-
BENEVENUTO, F., RODRIGUES, T., ALMEIDA, V., ALMEIDA, J., ZHANG, C., AND ROSS, K. 2008. Identifying video spammers in online social networks. In Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web. ACM, New York, 45-52.
-
(2008)
Proceedings of the 4th International Workshop on Adversarial Information Retrieval on the Web
, pp. 45-52
-
-
Benevenuto, F.1
Rodrigues, T.2
Almeida, V.3
Almeida, J.4
Zhang, C.5
Ross, K.6
-
7
-
-
33846014713
-
Securing collaborative filtering against malicious attacks through anomaly detection
-
BHAUMIK, R., WILLIAMS, C., MOBASHER, B., AND BURKE, R. 2006. Securing collaborative filtering against malicious attacks through anomaly detection. In Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization.
-
(2006)
Proceedings of the 4th Workshop on Intelligent Techniques for Web Personalization
-
-
Bhaumik, R.1
Williams, C.2
Mobasher, B.3
Burke, R.4
-
8
-
-
33845215883
-
'Knowing me, knowing you' - Using profiles and social networking to improve recommender systems
-
DOI 10.1007/s10550-006-0080-3
-
BONHARD, P. AND SASSE, M. A. 2006. 'Knowing me, knowing you'-using profiles and social networking to improve recommender systems. BT Technol. J. 24, 3, 84-98. (Pubitemid 44848493)
-
(2006)
BT Technology Journal
, vol.24
, Issue.3
, pp. 84-98
-
-
Bonhard, P.1
Sasse, M.A.2
-
9
-
-
34548577464
-
Segment-Based injection attacks against collaborative filtering recommender systems
-
BURKE, R., MOBASHER, B., BHAUMIK, R., AND WILLIAMS, C. 2005. Segment-Based injection attacks against collaborative filtering recommender systems. In Proceedings of the 5th IEEE International Conference on Data Mining.
-
(2005)
Proceedings of the 5th IEEE International Conference on Data Mining
-
-
Burke, R.1
Mobasher, B.2
Bhaumik, R.3
Williams, C.4
-
10
-
-
84982474806
-
An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation): Symbolic branch-and-bound search vs. connectionist Hopfield net activation
-
CHEN, H. AND NG, T. 1999. An algorithmic approach to concept exploration in a large knowledge network (automatic thesaurus consultation): Symbolic branch-and-bound search vs. connectionist Hopfield net activation. J. Amer. Soc. Inform. Sci. 46, 5, 348-369.
-
(1999)
J. Amer. Soc. Inform. Sci.
, vol.46
, Issue.5
, pp. 348-369
-
-
Chen, H.1
Ng, T.2
-
14
-
-
3042821101
-
Item-Based top-n recommendation algorithms
-
DESHPANDE, M. AND KARYPIS, G. 2004. Item-Based top-n recommendation algorithms. ACM Trans. Inform. Syst. 22, 1, 177.
-
(2004)
ACM Trans. Inform. Syst.
, vol.22
, Issue.1
, pp. 177
-
-
Deshpande, M.1
Karypis, G.2
-
16
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
FELDMAN, M., LAI, K., STOICA, I., AND CHUANG, J. 2004. Robust incentive techniques for peer-to-peer networks. In Proceedings of the ACM Conference on Electronic Commerce (EC'04).
-
(2004)
Proceedings of the ACM Conference on Electronic Commerce (EC'04)
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
17
-
-
84924122981
-
Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments
-
FOGARAS, D., RACZ, B., CSALOGANY, K., AND SARLOS, T. 2005. Towards scaling fully personalized pagerank: Algorithms, lower bounds, and experiments. Internet Math. 2, 3.
-
(2005)
Internet Math
, vol.2
, pp. 3
-
-
Fogaras, D.1
Racz, B.2
Csalogany, K.3
Sarlos, T.4
-
19
-
-
80051481471
-
Approximating personalized pagerank with minimal use of webgraph data
-
GLEICH, D. AND POLITO, M. 2006. Approximating personalized pagerank with minimal use of webgraph data. Internet Math. 3, 3, 257-294.
-
(2006)
Internet Math
, vol.3
, Issue.3
, pp. 257-294
-
-
Gleich, D.1
Polito, M.2
-
21
-
-
52249121408
-
Weaving a Web of Trust
-
GOLBECK, J. 2008. Weaving a Web of Trust. Sci., 1640-1641.
-
(2008)
Sci.
, pp. 1640-1641
-
-
Golbeck, J.1
-
23
-
-
19944395899
-
Propagation of trust and distrust
-
Thirteenth International World Wide Web Conference Proceedings, WWW2004
-
GUHA, R., KUMAR, R., RAGHAVAN, P., AND TOMKINS, A. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web (WWW'04). 403-412. (Pubitemid 40752775)
-
(2004)
Thirteenth International World Wide Web Conference Proceedings, WWW2004
, pp. 403-412
-
-
Guha, R.1
Raghavan, P.2
Kumar, R.3
Tomkins, A.4
-
26
-
-
12244308827
-
An analytical comparison of approaches to personalizing Pagerank
-
Stanford InfoLab
-
HAVELIWALA, T., KAMVAR, A., AND JEH, G. 2003. An analytical comparison of approaches to personalizing Pagerank. Tech. rep., Stanford InfoLab.
-
(2003)
Tech. Rep.
-
-
Haveliwala, T.1
Kamvar, A.2
Jeh, G.3
-
27
-
-
2942519772
-
The second eigenvalue of the google matrix
-
Stanford University
-
HAVELIWALA, T. AND KAMVAR, S. 2003. The second eigenvalue of the google matrix. Tech. rep. 20/2003, Stanford University.
-
(2003)
Tech. Rep. 20/2003
-
-
Haveliwala, T.1
Kamvar, S.2
-
28
-
-
0041848443
-
Topic-sensitive pagerank: A context-sensitive ranking algorithm for web search
-
HAVELIWALA, T. H. 2003. Topic-Sensitive PageRank: A context-sensitive ranking algorithm for web search. IEEE Trans. Knowl. Data Engin. 15.
-
(2003)
IEEE Trans. Knowl. Data Engin
, pp. 15
-
-
Haveliwala, T.H.1
-
30
-
-
67049164166
-
Collaborative filtering for implicit feedback datasets
-
IEEE Computer Society, Los Alamitos, CA
-
HU, Y., KOREN, Y., AND VOLINSKY, C. 2008. Collaborative filtering for implicit feedback datasets. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM'08). IEEE Computer Society, Los Alamitos, CA, 263-272.
-
(2008)
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM'08)
, pp. 263-272
-
-
Hu, Y.1
Koren, Y.2
Volinsky, C.3
-
31
-
-
3042819722
-
Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering
-
HUANG, Z., CHEN, H., AND ZENG, D. 2004. Applying associative retrieval techniques to alleviate the sparsity problem in collaborative filtering. ACM Trans. Inform. Syst. 22, 1, 116-142.
-
(2004)
ACM Trans. Inform. Syst.
, vol.22
, Issue.1
, pp. 116-142
-
-
Huang, Z.1
Chen, H.2
Zeng, D.3
-
32
-
-
27544435556
-
Link prediction approach to collaborative filtering
-
Proceedings of the 5th ACM/IEEE Joint Conference on Digital Libraries - Digital Libraries: Cyberinfrastructure for Research and Education
-
HUANG, Z., LI, X., AND CHEN, H. 2005. Link prediction approach to collaborative filtering. In Proceedings of the 5th ACM/IEEE-CS Joint Conference on Digital libraries. 141-142. (Pubitemid 41543540)
-
(2005)
Proceedings of the ACM/IEEE Joint Conference on Digital Libraries
, pp. 141-142
-
-
Huang, Z.1
Li, X.2
Chen, H.3
-
33
-
-
80051531169
-
Why does collaborative filtering work?-Recommendation model validation and selection by analyzing random bipartite graphs
-
HUANG, Z. AND ZENG, D. 2005. Why does collaborative filtering work?-Recommendation model validation and selection by analyzing random bipartite graphs. In Proceedings of the 15th Annual Workshop on Information Technologies and Systems. 33-38.
-
(2005)
Proceedings of the 15th Annual Workshop on Information Technologies and Systems
, pp. 33-38
-
-
Huang, Z.1
Zeng, D.2
-
34
-
-
38549175723
-
Analyzing consumer-product graphs: Empirical findings and applications in recommender systems
-
DOI 10.1287/mnsc.1060.0619
-
HUANG, Z., ZENG, D. D., AND CHEN, H. 2007. Analyzing consumer-product graphs: Empirical findings and applications in recommender systems. Manag. Sci. 53, 7, 1146-1164. (Pubitemid 351159617)
-
(2007)
Management Science
, vol.53
, Issue.7
, pp. 1146-1164
-
-
Huang, Z.1
Zeng, D.D.2
Chen, H.3
-
35
-
-
34250028396
-
Attacking recommender systems: A cost-benefit analysis
-
DOI 10.1109/MIS.2007.44
-
HURLEY, N. J., O'MAHONY, M. P., AND SILVESTRE, G. C. M. 2007. Attacking recommender systems: A cost-benefit analysis. IEEE Intell. Syst. 22, 3, 64-68. (Pubitemid 46883397)
-
(2007)
IEEE Intelligent Systems
, vol.22
, Issue.3
, pp. 64-68
-
-
Hurley, N.J.1
O'Mahony, M.P.2
Silvestre, G.C.M.3
-
39
-
-
0031103689
-
Combining social networks and collaborative filtering
-
KAUTZ, H., SELMAN, B., AND SHAH, M. 1997. Referral web: Combining social networks and collaborative filtering. Comm. ACM 40, 3, 63-65. (Pubitemid 127441132)
-
(1997)
Communications of the ACM
, vol.40
, Issue.3
, pp. 63-65
-
-
Kautz, H.1
Selman, B.2
Shah, M.3
-
40
-
-
4243148480
-
Authoritative sources in a hyperlinked environment
-
KLEINBERG, J. M. 1999. Authoritative sources in a hyperlinked environment. J. ACM 46, 604-632.
-
(1999)
J. ACM
, vol.46
, pp. 604-632
-
-
Kleinberg, J.M.1
-
42
-
-
26844521066
-
FOAF-realm-control your friends' access to the resource
-
KRUK, S. 2004. FOAF-Realm-Control your friends' access to the resource. In Proceedings of the FOAF Workshop.
-
(2004)
Proceedings of the FOAF Workshop
-
-
Kruk, S.1
-
43
-
-
33746637971
-
Do you trust your recommendations? An exploration of security and privacy issues in recommender systems
-
DOI 10.1007/11766155-2, Emerging Trends in Information and Communication Security - International Conference, ETRICS 2006, Proceedings
-
LAM, S., FRANKOWSKI, D., AND RIEDL, J. 2006. Do you trust your recommendations? An exploration of security and privacy issues in recommender systems. Emerg. Trends Inform. Comm. Secur., 14-29. (Pubitemid 44156237)
-
(2006)
Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3995
, pp. 14-29
-
-
Lam, S.K.1
Frankowski, D.2
Riedl, J.3
-
47
-
-
56749095761
-
The effect of correlation coefficients on communities of recommenders
-
LATHIA, N., HAILES, S., AND CAPRA, L. 2008b. The effect of correlation coefficients on communities of recommenders. In Proceedings of the 23rd Annual ACM Symposium on Applied Computing-Trust, Recommendations, Evidence and Other Collaboration Know-How (TRECK) Track.
-
(2008)
Proceedings of the 23rd Annual ACM Symposium on Applied Computing-trust, Recommendations, Evidence and Other Collaboration Know-how (TRECK) Track
-
-
Lathia, N.1
Hailes, S.2
Capra, L.3
-
48
-
-
0001313149
-
SALSA: The stochastic approach for link-structure analysis
-
LEMPEL, R. AND MORAN, S. 2001. Salsa: The stochastic approach for link-structure analysis. ACM Trans. Inform. Syst. 19, 2, 131-160. (Pubitemid 33720981)
-
(2001)
ACM Transactions on Information Systems
, vol.19
, Issue.2
, pp. 131-160
-
-
Lempel, R.1
Moran, S.2
-
50
-
-
70449458666
-
A survey of attack-resistant collaborative filtering algorithms
-
MEHTA, B. AND HOFMANN, T. 2008. A survey of attack-resistant collaborative filtering algorithms. Bull. Techn. Comm. Data Engin. 31, 2, 14-22.
-
(2008)
Bull. Techn. Comm. Data Engin
, vol.31
, Issue.2
, pp. 14-22
-
-
Mehta, B.1
Hofmann, T.2
-
51
-
-
34250012271
-
Attacks and remedies in collaborative recommendation
-
DOI 10.1109/MIS.2007.45
-
MOBASHER, B., BURKE, R., BHAUMIK, R., AND SANDVIG, J. J. 2007a. Attacks and remedies in collaborative recommendation. IEEE Intell. Syst. 22, 3, 56-63. (Pubitemid 46883396)
-
(2007)
IEEE Intelligent Systems
, vol.22
, Issue.3
, pp. 56-63
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Sandvig, J.J.4
-
52
-
-
35348969366
-
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
-
MOBASHER, B., BURKE, R., BHAUMIK, R., AND WILLIAMS, C. 2007b. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Inter. Tech. 7, 4, 23.
-
(2007)
ACM Trans. Inter. Tech
, vol.7
, Issue.4
, pp. 23
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Williams, C.4
-
54
-
-
0032507958
-
Evolution of indirect reciprocity by image scoring
-
DOI 10.1038/31225
-
NOWAK, M. A. AND SIGMUND, K. 1998. Evolution of indirect reciprocity by image scoring. Nature 393, 6685, 573-577. (Pubitemid 28319245)
-
(1998)
Nature
, vol.393
, Issue.6685
, pp. 573-577
-
-
Nowak, M.A.1
Sigmund, K.2
-
55
-
-
33746052888
-
Is trust robust? An analysis of trust-based recommendation
-
DOI 10.1145/1111449.1111476, IUI 06 - 2006 International Conference on Intelligent User Interfaces
-
O'DONOVAN, J. AND SMYTH, B. 2006. Is trust robust?: An analysis of trust-based recommendation. In Proceedings of the 11th International Conference on Intelligent User Interfaces. 101-108. (Pubitemid 44074856)
-
(2006)
International Conference on Intelligent User Interfaces, Proceedings IUI
, vol.2006
, pp. 101-108
-
-
O'Donovan, J.1
Smyth, B.2
-
56
-
-
3843101482
-
An evaluation of neighbourhood formation on the performance of collaborative filtering
-
O'MAHONY, M. P., HURLEY, N. J., AND SILVESTRE, G. C. M. 2004. An evaluation of neighbourhood formation on the performance of collaborative filtering. Artif. Intell. Rev. 21, 3, 215-228.
-
(2004)
Artif. Intell. Rev
, vol.21
, Issue.3
, pp. 215-228
-
-
O'Mahony, M.P.1
Hurley, N.J.2
Silvestre, G.C.M.3
-
57
-
-
84949780329
-
Promoting recommendations: An attack on collaborative filtering
-
Springer
-
O'MAHONY, M., HURLEY, N., AND SILVESTRE, G. 2002. Promoting recommendations: An attack on collaborative filtering. In Database and Expert Systems Applications. Lecture Notes in Computer Science, vol. 2453. Springer, 213-241.
-
(2002)
Database and Expert Systems Applications. Lecture Notes in Computer Science
, vol.2453
, pp. 213-241
-
-
O'Mahony, M.1
Hurley, N.2
Silvestre, G.3
-
58
-
-
0003780986
-
The PageRank citation ranking: Bringing order to the web
-
Stanford Digital Library Technologies Project
-
PAGE, L., BRIN, S., MOTWANI, R., AND WINOGRAD, T. 1998. The PageRank citation ranking: Bringing order to the web. Tech. rep., Stanford Digital Library Technologies Project.
-
(1998)
Tech. rep.
-
-
Page, L.1
Brin, S.2
Motwani, R.3
Winograd, T.4
-
61
-
-
42149166795
-
The influence limiter: Provably manipulation-resistant recommender systems
-
DOI 10.1145/1297231.1297236, RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems
-
RESNICK, P. AND SAMI, R. 2007. The influence limiter: Provably manipulation-resistant recommender systems. In Proceedings of the ACM Conference on Recommender Systems (RecSys'07). ACM, New York, 25-32. (Pubitemid 351528409)
-
(2007)
RecSys'07: Proceedings of the 2007 ACM Conference on Recommender Systems
, pp. 25-32
-
-
Resnick, P.1
Sami, R.2
-
65
-
-
74949088520
-
A survey of collaborative recommendation and the robustness of model-based algorithms
-
SANDVIG, J. J., MOBASHER, B., AND BURKE, R. 2008. A survey of collaborative recommendation and the robustness of model-based algorithms. Bull. Techn. Comm. Data Engin. 31, 2, 3-13.
-
(2008)
Bull. Techn. Comm. Data Engin
, vol.31
, Issue.2
, pp. 3-13
-
-
Sandvig, J.J.1
Mobasher, B.2
Burke, R.3
-
67
-
-
33745872861
-
A user-item relevance model for log-based collaborative filtering
-
Advances in Information Retrieval - 28th European Conference on IR Research, ECIR 2006, Proceedings
-
WANG, J., DE VRIES, A., AND REINDERS, M. 2006. A user-item relevance model for log-based collaborative filtering. In Advances in Information Retrieval, M. Lalmas, A. MacFarlane, S. Rüger, A. Tombros, T. Tsikrika, and A. Yavlinsky, Eds., Vol. 3936. Springer, 37-48. (Pubitemid 44029451)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3936
, pp. 37-48
-
-
Wang, J.1
De Vies, A.P.2
Reinders, M.J.T.3
-
68
-
-
35648963540
-
Defending recommender systems: Detection of profile injection attacks
-
DOI 10.1007/s11761-007-0013-0, The best Papers from the Joint EEE/CEC Conference
-
WILLIAMS, C., MOBASHER, B., AND BURKE, R. 2007. Defending recommender systems: Detection of profile injection attacks. Service Orient. Comput. Appl. 1, 3, 157-170. (Pubitemid 350032257)
-
(2007)
Service Oriented Computing and Applications
, vol.1
, Issue.3
, pp. 157-170
-
-
Williams, C.A.1
Mobasher, B.2
Burke, R.3
-
69
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAXMAN, A. 2006. Sybilguard: defending against sybil attacks via social networks. In Proceedings of ACM SIGCOMM. 267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
70
-
-
33749547652
-
Attack detection in time series for recommender systems
-
KDD 2006: Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
-
ZHANG, S., CHAKRABARTI, A., FORD, J., AND MAKEDON, F. 2006. Attack detection in time series for recommender systems. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 809-814. (Pubitemid 44535595)
-
(2006)
Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, vol.2006
, pp. 809-814
-
-
Zhang, S.1
Chakrabarti, A.2
Ford, J.3
Makedon, F.4
-
71
-
-
77950580918
-
Social network collaborative filtering
-
New York University. September
-
ZHENG, R., PROVOST, F., AND GHOSE, A. 2007. Social network collaborative filtering. Tech. rep. CeDER-07-04, New York University. September.
-
(2007)
Tech. Rep. CeDER-07-04
-
-
Zheng, R.1
Provost, F.2
Ghose, A.3
|