Online Recommendation Systems in a B2C E-Commerce Context: A Review and Future Directions, Journal of the Association for Information Systems, vol.16, issue.2, pp.72-107, 2015. ,
Social recommendation: a review, Social Network Analysis and Mining, vol.26, issue.3, pp.1113-1133, 2013. ,
DOI : 10.1145/1772690.1772790
LARS: A Location-Aware Recommender System, 2012 IEEE 28th International Conference on Data Engineering, pp.450-461, 2012. ,
DOI : 10.1109/ICDE.2012.54
URL : http://www-users.cs.umn.edu/~mokbel/papers/icde12a.pdf
Progress in Personalized Recommender Systems, Progress in Natural Science, vol.19, issue.1, pp.1-15, 2009. ,
Exploring Social-Historical Ties on Location-Based Social Network ,
Mining (social) Metwork Graphs to Detect Random Link Attacks, Proceedings of IEEE 24th International Conference on Data Engineering, pp.486-495, 2008. ,
DOI : 10.1109/icde.2008.4497457
Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering, Journal of Computer Science and Technology, vol.42, issue.9, pp.616-624, 2013. ,
DOI : 10.2307/2685263
Recommendation in social networks, Proceedings of the 7th ACM conference on Recommender systems, RecSys '13, pp.491-492, 2013. ,
DOI : 10.1145/2507157.2508062
Generating Predictive Movie Recommendations from Trust in Social Networks, 2006. ,
DOI : 10.1007/11755593_8
Nearest neighbour based social recommendation using heat diffusion, Proceedings of the 6th ACM India Computing Convention on, Compute '13, p.10, 2013. ,
DOI : 10.1145/2522548.2522607
A modified random walk framework for handling negative ratings and generating explanations, ACM Transactions on Intelligent Systems and Technology, vol.4, issue.1, p.12, 2013. ,
DOI : 10.1145/2414425.2414437
Leveraging Social Connections to Improve Personalized Ranking for Collaborative Filtering, Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, CIKM '14, pp.261-270, 2014. ,
DOI : 10.1145/2661829.2661998
URL : http://cseweb.ucsd.edu/~jmcauley/pdfs/cikm14.pdf
Scalable Recommendation with Social Contextual Information, IEEE Transactions on Knowledge and Data Engineering, vol.26, issue.11, pp.2789-2802, 2014. ,
DOI : 10.1109/TKDE.2014.2300487
Social Recommendation Based on User Trust and Tensor Decomposition, Journal of Software, vol.12, issue.10, p.2014 ,
mTrust, Proceedings of the fifth ACM international conference on Web search and data mining, WSDM '12, pp.93-102, 2012. ,
DOI : 10.1145/2124295.2124309
Strength of social influence in trust networks in product review sites, Proceedings of the fourth ACM international conference on Web search and data mining, WSDM '11, pp.495-504, 2011. ,
DOI : 10.1145/1935826.1935899
Toward trustworthy recommender systems, ACM Transactions on Internet Technology, vol.7, issue.4, p.23, 2007. ,
DOI : 10.1145/1278366.1278372
Shilling Attack Detection Based on Feature Selection for Recommendation Systems, Acta Electronica Sinica, vol.40, issue.8, pp.1687-1693, 2012. ,
A Metadata-enhanced Variational Bayesian Matrix Factorization Model for Robust Collaborative Recommendation, Acta Automatica Sinica, vol.9, pp.1067-1076, 2011. ,
DOI : 10.1109/icicip.2011.6008281
Shilling Attack Detection???A New Approach for a Trustworthy Recommender System, INFORMS Journal on Computing, vol.24, issue.1, pp.117-131, 2012. ,
DOI : 10.1287/ijoc.1100.0440
Shilling attack detection utilizing semi-supervised learning method for collaborative recommender system, World Wide Web, vol.17, issue.11, pp.5-6, 2013. ,
DOI : 10.1109/TKDE.2005.186
Preventing Recommendation Attack in Trust-Based Recommender Systems, Journal of Computer Science and Technology, vol.160, issue.10, pp.823-828, 2011. ,
DOI : 10.1016/j.fss.2008.11.014
URL : http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.453.6828&rep=rep1&type=pdf
A Service Recommendation Method Based on Trustworthy Community, Journal of Computer, vol.37, issue.2, pp.301-311, 2014. ,
Detection of spam tipping behaviour on foursquare, Proceedings of the 22nd International Conference on World Wide Web, WWW '13 Companion, pp.641-648, 2013. ,
DOI : 10.1145/2124295.2124372
Social Network Anomaly and Attack Patterns Analysis, Proceedings of The 6th International Conference on Networked Computing, pp.1-6, 2010. ,
Understanding and combating link farming in the twitter social network, Proceedings of the 21st international conference on World Wide Web, WWW '12, pp.61-70, 2012. ,
DOI : 10.1145/2187836.2187846
URL : http://www.mpi-sws.mpg.de/%7Egummadi/papers/twitter_vulnerability.pdf