-
1
-
-
20844435854
-
Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions
-
DOI 10.1109/TKDE.2005.99
-
ADOMAVICIUS, G. AND TUZHILIN, A. 2005. Toward the next generation of recommender systems: A survey of the state-of-the-art and possible extensions. IEEE Trans. Know. Data Eng. 17, 6, 734-749. (Pubitemid 40860454)
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.6
, pp. 734-749
-
-
Adomavicius, G.1
Tuzhilin, A.2
-
2
-
-
72449179929
-
The wisdom of the few: A collaborative filtering approach based on expert opinions from the web
-
ACM Press, New York, NY
-
AMATRIAIN, X., LATHIA, N. M., PUJOL, J., KWAK, H., AND OLIVER, N. 2009. The wisdom of the few: A collaborative filtering approach based on expert opinions from the web. In Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval. ACM Press, New York, NY, 532-539.
-
(2009)
Proceedings of the 32nd International ACM SIGIR Conference on Research and Development in Information Retrieval
, pp. 532-539
-
-
Amatriain, X.1
Lathia, N.M.2
Pujol, J.3
Kwak, H.4
Oliver, N.5
-
5
-
-
70350564215
-
The social trust framework for trusted social information management
-
CAVERLEE, J., LIU, L., AND WEBB, S. 2010. The social trust framework for trusted social information management. Arch. Algorith. Inf. Sci. 180, 1, 95-112.
-
(2010)
Arch. Algorith. Inf. Sci.
, vol.180
, Issue.1
, pp. 95-112
-
-
Caverlee, J.1
Liu, L.2
Webb, S.3
-
6
-
-
0242641140
-
The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms
-
DELLAROCAS, C. 2003. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Manage. Sci. 49, 10, 1407-1424.
-
(2003)
Manage. Sci.
, vol.49
, Issue.10
, pp. 1407-1424
-
-
Dellarocas, C.1
-
8
-
-
0033204106
-
On power-law relationships of the Internet topology
-
DOI 10.1145/316194.316229
-
FALOUTSOS, M., FALOUTSOS, P., AND FALOUTSOS, C. 1999. On power-law relationships of the Internet topology. SIGCOMM Comp. Comm. Rev. 29, 4, 251-262. (Pubitemid 32081870)
-
(1999)
Computer Communication Review
, vol.29
, Issue.4
, pp. 251-262
-
-
Faloutsos, M.1
Faloutsos, P.2
Faloutsos, C.3
-
9
-
-
78149266057
-
Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses
-
FENG, Q., SUN, Y., LIU, L., YANG, Y., AND DAI, Y. 2010. Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses. IEEE Trans. Knowl. Data Eng. 1766-1780.
-
(2010)
IEEE Trans. Knowl. Data Eng
, pp. 1766-1780
-
-
Feng, Q.1
Sun, Y.2
Liu, L.3
Yang, Y.4
Dai, Y.5
-
13
-
-
55149107112
-
-
Tech. repo. CSD TR # 07-013, Purdue University
-
HOFFMAN, K., ZAGE, D., AND NITA-ROTARU, C. 2007. A survey of attack and defense techniques for reputation systems. Tech. repo. CSD TR # 07-013, Purdue University.
-
(2007)
A Survey of Attack and Defense Techniques for Reputation Systems
-
-
Hoffman, K.1
Zage, D.2
Nita-Rotaru, C.3
-
15
-
-
79952398813
-
CoBayes: Bayesian knowledge corroboration with assessors of unknown areas of expertise
-
KASNECI, G., GAEL, J. V., STERN, D., AND GRAEPEL, T. 2011. CoBayes: Bayesian knowledge corroboration with assessors of unknown areas of expertise. In Proceedings of the 4th ACM International Conference on Web Search and Data Mining. 465-474.
-
(2011)
Proceedings of the 4th ACM International Conference on Web Search and Data Mining
, pp. 465-474
-
-
Kasneci, G.1
Gael, J.V.2
Stern, D.3
Graepel, T.4
-
16
-
-
77953576532
-
Using probabilistic confidence models for trust inference in Web-based social networks
-
Article 8
-
KUTER, U. AND GOLBECK, J. 2010. Using probabilistic confidence models for trust inference in Web-based social networks. ACM Trans. Int. Tech. 10, 2, Article 8.
-
(2010)
ACM Trans. Int. Tech.
, vol.10
, pp. 2
-
-
Kuter, U.1
Golbeck, J.2
-
18
-
-
35348969366
-
Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness
-
Article 23
-
MOBASHER, B., BURKE, R., BHAUMIK, R., AND WILLIAMS, C. 2007. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Trans. Int. Tech. 7, 4, Article 23.
-
(2007)
ACM Trans. Int. Tech.
, vol.7
, pp. 4
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Williams, C.4
-
21
-
-
33744807496
-
The value of reputation on eBay: A controlled experiment
-
DOI 10.1007/s10683-006-4309-2
-
RESNICK, P., ZECKHAUSER, R., SWANSONAND, J., AND LOCKWOOD, K. 2006. The value of reputation on eBay: A controlled experiment, Experim. Econ. l9, 2, 79-101. (Pubitemid 43830181)
-
(2006)
Experimental Economics
, vol.9
, Issue.2
, pp. 79-101
-
-
Resnick, P.1
Zeckhauser, R.2
Swanson, J.3
Lockwood, K.4
-
22
-
-
70449664666
-
-
Social Media
-
SALEH, K. 2008. An interview with Digg top user. http://www.invesp.com/ blog/social-media/an-interview-with-digg-top-user.html. Social Media.
-
(2008)
An Interview with Digg Top User
-
-
Saleh, K.1
-
24
-
-
33746978174
-
Securing decentralized reputation management using TrustGuard
-
DOI 10.1016/j.jpdc.2006.04.003, PII S0743731506000918
-
SRIVATSA, M. AND LIU, L. 2006. Securing decentralized reputation management using TrustGuard. J. Parall. Dist. Comp. 66, 9, 1217-1232. (Pubitemid 44205400)
-
(2006)
Journal of Parallel and Distributed Computing
, vol.66
, Issue.9
, pp. 1217-1232
-
-
Srivatsa, M.1
Liu, L.2
-
26
-
-
39049116456
-
A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks
-
SUN, Y. L., HAN, Z., YU, W., LIU, AND K. J. R. 2006. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of IEEE INFOCOM.
-
(2006)
Proceedings of IEEE INFOCOM
-
-
Sun, Y.L.1
Han, Z.2
Liu, Y.U.W.3
R, K.J.4
-
27
-
-
84863238587
-
-
TAOBAOZUAN
-
TAOBAOZUAN. 2010. http://www.taobaozuan.com.
-
(2010)
-
-
-
28
-
-
84887052468
-
Sybil-resilient online content voting
-
USENIX Association, Berkeley, CA
-
TRAN, N., MIN, B., LI, J., AND SUBRAMANIAN, L. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation. USENIX Association, Berkeley, CA, 15-28.
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation
, pp. 15-28
-
-
Tran, N.1
Min, B.2
J, L.I.3
Subramanian, L.4
-
29
-
-
51749107030
-
ReCAPTCHA: Human-based character Recognition via web security measures
-
VON AHN, L., MAURER, B., MCMILLEN, C., ABRAHAM, D., AND BLUM, M. 2008. reCAPTCHA: Human-based character Recognition via web security measures. Science, 321, 5895, 1465-1468.
-
(2008)
Science
, vol.321
, Issue.5895
, pp. 1465-1468
-
-
Von Ahn, L.1
Maurer, B.2
McMillen, C.3
Abraham, D.4
Blum, M.5
-
30
-
-
84863258020
-
Impact of trust management and information sharing to adversarial cost in ranking systems
-
VU, L., PAPAIOANNOU, T., AND ABERER, K. 2010. Impact of trust management and information sharing to adversarial cost in ranking systems. In IFIP Advances in Information and Communication Technology, Trust Management IV, 321, 108-124.
-
(2010)
IFIP Advances in Information and Communication Technology, Trust Management IV
, vol.321
, pp. 108-124
-
-
L, V.U.1
Papaioannou, T.2
Aberer, K.3
-
31
-
-
72249101051
-
Personalized and dynamic trust in social networks
-
ACM Press, New York, NY
-
WALTER, F. E., BATTISTON, S., AND SCHWEITZER, F. 2009. Personalized and dynamic trust in social networks. In Proceedings of the 3rd ACM Conference on Recommender Systems. ACM Press, New York, NY, 197-204.
-
(2009)
Proceedings of the 3rd ACM Conference on Recommender Systems
, pp. 197-204
-
-
Walter, F.E.1
Battiston, S.2
Schweitzer, F.3
-
32
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
XIONG, L. AND LIU, L. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities, IEEE Trans. Knowl. Data Eng. 16, 7, 843-857.
-
(2004)
IEEE Trans. Knowl. Data Eng.
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
33
-
-
70349594324
-
Dishonest behaviors in online rating systems: Cyber competition, attack models, and attack generator
-
YANG, Y., FENG, Q., SUN, Y., AND DAI, Y. 2009. Dishonest behaviors in online rating systems: Cyber competition, attack models, and attack generator. J. Comp. Sci. Tech. 24, 5, 855-867.
-
(2009)
J. Comp. Sci. Tech.
, vol.24
, Issue.5
, pp. 855-867
-
-
Yang, Y.1
Feng, Q.2
Sun, Y.3
Dai, Y.4
-
34
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
DOI 10.1145/1151659.1159945
-
YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAXMAN, A. 2006. SybilGuard: Defending against sybil attacks via social networks. SIGCOMM Comp. Comm. Rev. 36, 4, 267-278. (Pubitemid 44623733)
-
(2006)
Computer Communication Review
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|