S. S. Li and E. Karahanna, Online Recommendation Systems in a B2C E-Commerce Context: A Review and Future Directions, Journal of the Association for Information Systems, vol.16, issue.2, pp.72-107, 2015.

J. Tang, X. Hu, and H. Liu, Social recommendation: a review, Social Network Analysis and Mining, vol.26, issue.3, pp.1113-1133, 2013.
DOI : 10.1145/1772690.1772790

J. J. Levandoski, M. Sarwat, A. Eldawy, and M. F. Mokbel, LARS: A Location-Aware Recommender System, 2012 IEEE 28th International Conference on Data Engineering, pp.450-461, 2012.
DOI : 10.1109/ICDE.2012.54

URL : http://www-users.cs.umn.edu/~mokbel/papers/icde12a.pdf

J. Liu, T. Zhou, and B. Wang, Progress in Personalized Recommender Systems, Progress in Natural Science, vol.19, issue.1, pp.1-15, 2009.

H. Gao, J. Tang, and H. Liu, Exploring Social-Historical Ties on Location-Based Social Network

N. Shrivastava, A. Majumder, and R. Rastogi, Mining (social) Metwork Graphs to Detect Random Link Attacks, Proceedings of IEEE 24th International Conference on Data Engineering, pp.486-495, 2008.
DOI : 10.1109/icde.2008.4497457

X. L. Zhang, T. M. Lee, and G. Pitsilis, Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering, Journal of Computer Science and Technology, vol.42, issue.9, pp.616-624, 2013.
DOI : 10.2307/2685263

M. Ester, Recommendation in social networks, Proceedings of the 7th ACM conference on Recommender systems, RecSys '13, pp.491-492, 2013.
DOI : 10.1145/2507157.2508062

J. Golbeck, Generating Predictive Movie Recommendations from Trust in Social Networks, 2006.
DOI : 10.1007/11755593_8

J. Justin and A. S. Beegom, Nearest neighbour based social recommendation using heat diffusion, Proceedings of the 6th ACM India Computing Convention on, Compute '13, p.10, 2013.
DOI : 10.1145/2522548.2522607

Y. C. Chen, Y. S. Lin, Y. C. Shen, and S. D. Lin, A modified random walk framework for handling negative ratings and generating explanations, ACM Transactions on Intelligent Systems and Technology, vol.4, issue.1, p.12, 2013.
DOI : 10.1145/2414425.2414437

T. Zhao, J. Mcauley, and I. King, Leveraging Social Connections to Improve Personalized Ranking for Collaborative Filtering, Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM '14, pp.261-270, 2014.
DOI : 10.1145/2661829.2661998

URL : http://cseweb.ucsd.edu/~jmcauley/pdfs/cikm14.pdf

M. Jiang, P. Cui, F. Wang, W. Zhu, and S. Yang, Scalable Recommendation with Social Contextual Information, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2789-2802, 2014.
DOI : 10.1109/TKDE.2014.2300487

B. Zou, C. Li, L. Tan, H. Chen, and S. Wang, Social Recommendation Based on User Trust and Tensor Decomposition, Journal of Software, vol.12, issue.10, p.2014

J. Tang, H. Gao, and H. Liu, mTrust, Proceedings of the fifth ACM international conference on Web search and data mining, WSDM '12, pp.93-102, 2012.
DOI : 10.1145/2124295.2124309

A. C. Yeung and T. Iwata, Strength of social influence in trust networks in product review sites, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.495-504, 2011.
DOI : 10.1145/1935826.1935899

B. Mobasher, R. Burke, R. Bhaumik, and C. Williams, Toward trustworthy recommender systems, ACM Transactions on Internet Technology, vol.7, issue.4, p.23, 2007.
DOI : 10.1145/1278366.1278372

Z. Wu, Y. Zhuang, Y. Wang, and J. Cao, Shilling Attack Detection Based on Feature Selection for Recommendation Systems, Acta Electronica Sinica, vol.40, issue.8, pp.1687-1693, 2012.

C. Li and Z. Luo, A Metadata-enhanced Variational Bayesian Matrix Factorization Model for Robust Collaborative Recommendation, Acta Automatica Sinica, vol.9, pp.1067-1076, 2011.
DOI : 10.1109/icicip.2011.6008281

J. S. Lee and D. Zhu, Shilling Attack Detection???A New Approach for a Trustworthy Recommender System, INFORMS Journal on Computing, vol.24, issue.1, pp.117-131, 2012.
DOI : 10.1287/ijoc.1100.0440

J. Cao, Z. Wu, B. Mao, and Y. Zhang, Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system, World Wide Web, vol.17, issue.11, pp.5-6, 2013.
DOI : 10.1109/TKDE.2005.186

F. G. Zhang, Preventing Recommendation Attack in Trust-Based Recommender Systems, Journal of Computer Science and Technology, vol.160, issue.10, pp.823-828, 2011.
DOI : 10.1016/j.fss.2008.11.014

URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.453.6828&rep=rep1&type=pdf

H. Wang, W. Yang, S. Wang, and S. Li, A Service Recommendation Method Based on Trustworthy Community, Journal of Computer, vol.37, issue.2, pp.301-311, 2014.

A. Aggarwal, J. Almeida, and P. Kumaraguru, Detection of spam tipping behaviour on foursquare, Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, pp.641-648, 2013.
DOI : 10.1145/2124295.2124372

P. Limsaiprom and P. Tantatsanawong, Social Network Anomaly and Attack Patterns Analysis, Proceedings of The 6th International Conference on Networked Computing, pp.1-6, 2010.

S. Ghosh, B. Viswanath, and F. Kooti, Understanding and combating link farming in the twitter social network, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.61-70, 2012.
DOI : 10.1145/2187836.2187846

URL : http://www.mpi-sws.mpg.de/%7Egummadi/papers/twitter_vulnerability.pdf