لیست زیر مراجع و منابع استفاده شده در این Paper را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود Paper لینک شده اند :
G. Adomavicius, T. Alexander, Toward the next generation of recommender ...
G. Adomavicius, J. J. Zhang, Stability of _ commendatio Algorithms, ...
V. Agarwal, K.K. Bharadwaj, A collaborative filtering framework for friends ...
E. Ayday, F. Fekri, Application of belief propagation to trust ...
E. Ayday, F. Fekri. Iterative trust and reputation management using ...
A. B. Barragans Martinez, _ Costa Montenegro, J. C. Burguillo, ...
decomposition, Information Sciences, 180 (22) (2010) 4290-431 1.DOI: 10. 101 ...
R. Bhaumik, C. Williams, B. Mobasher, R. Burke, Securing collaborative ...
R. Bhaumik, B. Mobasher, R. Burke, A clustering approach to ...
J. Borras, A. Morento, A. Valls, Intelligent tourism recommender systems: ...
K. Bryan, M. O'Mahony, P. Cunningham, Unsupervised Retrieval of Attack ...
systems, In: Proc 12th ACM SIGKDD Int. Conf. Knowledge discovery ...
R. Burke, B. Mobasher, C. Williams, R. Bhaumik, Detecting profile ...
J. Cao, Z. Wu, B. Mao, Y. C. Zhang, Shilling ...
C. Carlos, O. Rodriguez, J. Rivera, J. Betancourt, M. Mendoza, ...
W. Chen, Z. D. Niu, X. Y. Zhao, Y. Li, ...
Z. P. Cheng, N. Hurley, Effective diverse and obfuscated attacks ...
P. A. Chirita, W. Nejdl, C. Zamfir, Preventing shilling attacks ...
Y. H. Cho and J. K. Kim, Application of Web ...
filtering recommendat ons inside large learning object repositories, Information Processing ...
J. L. Devore, Probability and Statistics for Engineering and the ...
M. Gao, K. C. Liu, Z. F. Wu, Personalization in ...
M. Gao, Q. Yuan, B. Ling, Q. Y. Xiong, Detection ...
D. Gavalas, C. Kon stantopoulos, K. Mastakas, G. Pantziou, Mobile ...
I. Gunes, C. Kaleli, A. Bilge, H. Polat, Shilling attacks ...
F. M. He, X. R. Wang, B. X. Liu, Attack ...
[27] N. Hu, P. A. Pavlou, J. Zhang, Why do ...
N. .J. Hurley, Z. P. Cheng, M. Zhang, Statistical attack ...
A. Jssang, R. Ismail, C. Boyd, A survey of trust ...
J. K. Kim, H. K. Kim, H. Y. Oh, Y. ...
Y. Kim, R. Phalak, A trust prediction framework in rating-based ...
J. A. Konstan, B. N. Miller, D. Maltz, J. L. ...
J. S. Lee, D. Zhu, Shilling Attack Detection-A _ Approach ...
Y. Li, L. Lu, X. F. Li, A hybrid collaborative ...
C. Li, Z. G. Luo, Detection of shilling attacks in ...
N. N. Liu, L. H. He, M. Zhao, Social temporal ...
Transactions on Intelligent Systems and Technology (TIST) _ Special section ...
N. Manouselis, Nikos, R. Vuorikari, F. Van Assche, Collaborative re ...
B. Mehta, W. Nejdl, Unsupervised strategies for shilling detection and ...
B. Mobasher, R. Burke, R. Bhaumik, C. Wi lliams, Toward ...
M. Montaner, B. Lopez, J. Lluis de la Rosa, A ...
M. P. O' Mahony, N. J. Hurley, N. Kushmerick, G. ...
M. P. O'Mahony, N. J. Hurley, G. C. M. Silvestre, ...
M. P. O" Mahony, N. J. Hurley, G. C. M. ...
L. Ott, M. T. Longnecker, An Introduction to Statistical Methods ...
C. Porcel, A. Tej eda-Lorente, M.A. Martinez, E. Herrera-V iedma, ...
W. G. Rong, Q. F. Wu, Y. X. Ouyang, K. ...
management, In: Proc. 20th IEEE In. Conf. Web Services (ICWS ...
J. B. Schafer, J. Konstan and . Riedl, Recommender systems ...
J. S errano- Guerrero, E. Herrera-V iedma, J. A. Olivas, ...
behaviour, In: 6th European Workshop on Multi-Agent Systems, Bath, UK, ...
W. T. Teacy, M. Luck, A. Rogers, N. R. Jennings, ...
A. Tej eda-Lorente, C. Porcel, E. Peis, R. Sanz, E. ...
M. G. Vozalis, K. G. Margaritis, Using SD and demographic ...
Z. Wang, L. F. Sun, W. W. Zhu, S. Q. ...
C. A. Williams, B. Mobasher, R. Burke, Defending recommender systems: ...
Z. Wu, J. J. Wu, J. Cao, D. C. Tao, ...
S. Zhang, A. Chakrabarti, J. Ford, F. Makedon, Attack detection ...
S. Zhang, Y. Ouyang, J. Ford, F. Makedon, Analysis of ...
MovieLens, http :/grouplens .org/datasets ...
نمایش کامل مراجع