参考文献
[1]Jindal N,Liu Bing.Opinion Spam and Analysis[C]//Proceedings of International Conference on Web Search and Data Mining.New York,USA:ACM Press,2008:219-230.
[2]Li Fangtao,Huang Minglie,Yang Yi,et al.Learning to Identify Review Spam[C]//Proceedings of International Joint Conference on Artificial Intelligence.San Francisco,USA:AAAI Press,2011:2488-2492.
[3]Jinda N,Liu Bing,Lim E P.Finding Unusual Review Patterns Using Unexpected Rules[C]//Proceedings of International Conference on Information and Knowledge Management.New York,USA:ACM Press,2010:1549-1552.
[4]Mukherjee A,Liu Bing,Glance N.Spotting Fake Reviewer Groups in Consumer Reviews[C]//Proceedings of International Conference on World Wide Web.New York,USA:ACM Press,2012:191-200.
[5]Mukherjee A,Liu Bing,Wang J.Detecting Group Review Spam[C]//Proceedings of International Conference Companion on World Wide Web.New York,USA:ACM Press,2011:93-94.
[6]Su Xuefeng,Zeng Huajun,Chen Zheng.Finding Group Shilling in Recommendation System[C]//Proceedings of International Conference on World Wide Web.New York,USA:ACM Press,2005:960-961.
[7]Liu Yuhong,Sun Yan,Yu Ting.Defending Multiple-user-multiple-target Attacks in Online Reputation Systems[C]//Proceedings of the 3rd International Conference on Social Computing.Washington D.C.,USA:IEEE Press,2011:425-434.
[8]Koutrika G,Effendi F A,Gyongyi Z.Combating Spam in Tagging Systems[C]//Proceedings of International Workshop on Adversarial Information Retrieval on the Web.New York,USA:ACM Press,2007:57-64.
[9]Liu Jingjing,Cao Yunbo,Lin C Y,et al,Low-quality Product Review Detection in Opinion Summariza-tion[C]//Proceedings of Joint Conference on Empirical Methods in Natural Language Processing and Compute Natural Language
Earning.Washington D.C.,USA:IEEE Press,2007:334-342.
[10]Burke R,Mobasher B,Williams C,et al.Classification Features for Attack Detection in Collaborative Recom-mender Systems[C]//Proceedings of International Conference on Knowledge Discovery and Data Mining.New York,USA:ACM
Press,2006:542-547.
[11]伍之昂,庄毅,王有权,等.基于特征选择的推荐系统托攻击检测算法[J].电子学报,2012,40(8):1687-1693.
[12]李聪,骆志刚,石金龙.一种探测推荐系统托攻击的无监督算法[J].自动化学报,2011,37(2):160-167.
[13]Chirita P A,Nejdl W,Zamfir C.PreventingShilling Attacks in Online Recommender Systems[C]//Proceedings of International Workshop on Web Information and Data Management.New York,USA:ACM Press,2005:67-74.
编辑陆燕菲 |