1. Ricci, F., Rokach, L., Shapira, B.: Recommender Systems Handbook. Springer, Boston (2015)
2. Williams, C., Mobasher, B., Burke, R., Bhaumik, R., Sandvig, J.: Detection of obfuscated attacks in collaborative recommender systems. In: Proceedings of the 17th European Conference on Artificial Intelligence, ECAI 2006 (2006)
3. Pampín, H.J.C., Jerbi, H., O’Mahony, M.P.: Evaluating the relative performance of collaborative filtering recommender systems. J. Univ. Comput. Sci. 21(13), 1849–1868 (2015)
4. Tang, T., Tang, Y.: An effective recommender attack detection method based on time SFM factors. In: 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN), pp. 78–81 (2011).
https://doi.org/10.1109/iccsn.2011.6013780
5. Wu, Z., Wu, J., Cao, J., Tao, D.: HySAD: a semi-supervised hybrid shilling attack detector for trustworthy product recommendation. In: Proceedings of the 18th ACMSIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 985–993. ACM (2012)