1 |
Bouayad L, Padmanabhan B, Chari K. Can recommender systems reduce healthcare costs? The role of time pressure and cost transparency in prescription choice[J]. MIS Quarterly, 2020, 44(4):1859-1902.
|
2 |
梁昌勇, 冷亚军, 王勇胜,等. 电子商务推荐系统中群体用户推荐问题研究[J]. 中国管理科学, 2013, 21(3):153-158.
|
|
Liang C H, Leng Y J, Wang Y S. Research on group recommendation in E-commerce recommender systems[J]. Chinese Journal of Management Science, 2013, 21(3):153-158.
|
3 |
黄立威, 江碧涛, 吕守业,等. 基于深度学习的推荐系统研究综述[J]. 计算机学报, 2018, 41(7): 1619-1647.
|
|
Huang L W, Jiang B T, Lv S Y, et al. Survey on deep learning based recommender systems [J]. Chinese Journal of Computers, 2018, 41(7): 1619-1647.
|
4 |
Samtani S, Chai Y, Chen H. Linking exploits from the dark web to known vulnerabilities for proactive cyber threat intelligence: An attention-based deep structured semantic model[J]. MIS Quarterly, 2022, 46(2): 911-946.
|
5 |
张林鹏, 魏一鸣. 电子商务中的安全问题及法律保护[J].中国管理科学, 2000,8(S1): 740-747.
|
|
Zhang L P, Wei Y M. The security of legal protection of electronic commerce[J]. Chinese Journal of Management Science, 2000,8(S1): 740-747.
|
6 |
Yang Z, Sun Q, Zhang Y, et al. Identification of malicio us injection attacks in dense rating and Co-visitation behaviors[J]. IEEE Transactions on Information Forensics and Security, 2020, 16: 537-552.
|
7 |
胡春华, 邓奥, 童小芹,等. 社交电商中融合信任和声誉的图神经网络推荐研究[J]. 中国管理科学, 2021, 29(10): 202-212.
|
|
Hu C H, Deng A, Tong X Q, et al. A graph neural network recommendation study combining trust and reputation in social E- commerce[J]. Chinese Journal of Management Science, 2021, 29(10): 202-212.
|
8 |
伍之昂, 王有权, 曹杰. 推荐系统托攻击模型与检测技术[J]. 科学通报, 2014, 59(7): 551-560.
|
|
Wu Z A, Wang Y Q, Cao J. A survey on shilling attack models and detection techniques for recommender systems[J]. Chinese Science Bulletin, 2014, 59(7): 551-560.
|
9 |
Zügner D, Akbarnejad A, Günnemann S. Adversarial attacks on neural networks for graph data[C]//Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London, United Kingdom, August 19-23, ACM, 2018: 2847-2856.
|
10 |
Ma J, Ding S, Mei Q. Towards more practical adversarial attacks on graph neural networks[J]. Advances in Neural Information Processing Systems, 2020, 33: 4756-4766.
|
11 |
Takahashi T. Indirect adversarial attacks via poisoning neighbors for graph convolutional networks[C]// Proceedings of the 6th IEEE International Conference on Big Data, Los Angeles, USA, December 9-12, IEEE, 2019: 1395-1400.
|
12 |
Li J, Xie T, Liang C, et al. Adversarial attack on large scale graph[J]. IEEE Transactions on Knowledge and Data Engineering, 2021, 35(1): 82-95.
|
13 |
Chang H, Rong Y, Xu T, et al. A restricted Black-box adversarial framework towards attacking graph embedding models[C]// Proceedings of the 34th AAAI Conference on Artificial Intelligence, New York, USA, February 7-12 , AAAI Press, 2020: 3389-3396.
|
14 |
Sun Y, Wang S, Tang X, et al. Non-target-specific node injection attacks on graph neural networks: A hierarchical reinforcement learning approach[C]// Proceedings of the 29th International Conference of World Wide Web, Taipei, China, April 20-24, ACM/IW3C2, 2020: 673-683.
|
15 |
Wang J, Luo M, Suya F, et al. Scalable attack on graph data by injecting vicious nodes[J]. Data Mining and Knowledge Discovery, 2020, 34: 1363-1389.
|
16 |
Williams C A, Mobasher B, Burke R. Defending recommender systems: Detection of profile injection attacks[J]. Service Oriented Computing & Applications, 2007, 1(3):157-170.
|
17 |
单晓菲,米传民,马静.基于选择性随机游走的协同过滤推荐算法研究[J]. 中国管理科学, 2014, 22(S1): 73-78.
|
|
Shan X F, Mi C M, Ma J. Cokkaborative filtering algorihm based on random walk with choice[J]. Chinese Journal of Management Science, 2014, 22(S1): 73-78.
|
18 |
陈国青,曾大军,卫强,等.大数据环境下的决策范式转变与使能创新[J].管理世界, 2020, 36(2): 95-105.
|
|
Cheng G Q, Zeng D J, Wei Q, et al. Transitions of Decision-making paradigms and enabled innovations in the context of big data[J]. Journal of Management World, 2020, 36(2): 95-105.
|
19 |
Xu K, Li C, Tian Y, et al. Representation learning on graphs with jumping knowledge networks[C]// Proceedings of the 35th International Conference on Machine Learning, Sweden, Stockholm, July 10-15 , PMLR, 2018: 5453-5462.
|
20 |
Gabel S, Timoshenko A. Product choice with large assortmets: A scalable deep-learning model[J]. Management Science, 2022, 68(3): 1808-1827.
|
21 |
王静红,梁丽娜,李昊康,等. 基于注意力网络特征的社区发现算法[J]. 山东大学学报(理学版), 2021, 56(9): 1-12+20.
|
|
Wang J H, Liang L N, Li H K, et al. Community discovery algorithm based on attention network feature[J]. Journal of Shandong University(Natural Science), 2021, 56(9): 1-12+20.
|
22 |
李永立, 罗鹏, 张书瑞. 基于决策分析的社交网络链路预测方法[J]. 管理科学学报, 2017, 20(1): 64-74.
|
|
Li Y L, Luo P, Zhang S R. Link prediction in social networks based on decision analysis[J]. Journal of Management Sciences in China, 2017, 20(1): 64-74.
|
23 |
Raghavan U N, Albert R, Kumara S. Near linear time algorithm to etect community structures in Large-scale networks[J]. Physical Review E, 2007, 76(3):1-11.
|
24 |
孟祥武, 梁弼, 杜雨露,等. 基于位置的移动推荐系统效用评价研究[J]. 计算机学报, 2019, 42(12): 2695-2721.
|
|
Meng X W, Liang B, Du Y L, et al. A survey of evaluation of Location-based mobile recommender systems[J]. Chinese Journal of Computers, 2019, 42(12): 2695-2721.
|
25 |
李琳, 刘锦行, 孟祥福, 等. 融合评分矩阵与评论文本的商品推荐模型[J]. 计算机学报, 2018, 41(7): 1559-1573.
|
|
Li L, Liu J X, Meng X F, et al. Reconnebdation models by exploiting rating matrix and review text[J]. Chinese Journal of Computers, 2018, 41(7): 1559-1573.
|
26 |
He J N, Xiao F, Liu H Y, et al. Mobile app recommendation: An involvement-enhanced approach[J]. MIS Quarterly, 2019, 43(3): 827-850.
|
27 |
黄震华, 张佳雯,田春岐,等. 基于排序学习的推荐算法研究综述[J]. 软件学报, 2016 (3): 691-713.
|
|
Huang Z H, Zhang J W, Tian C Q, et al. Survey on Learning-to-rank based recommendation algorithms[J]. Journal of Software, 2016 (3): 691-713.
|
28 |
Bergr V D, Kipf T N, Welling M. Graph convolutional matrix completion [C] // Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, London, United Kingdom, August 19-23, 2018.
|
29 |
Wang X, He X, Wang M, et al. Neural graph collaborative filtering[C]// Proceedings of the 42nd International ACM SIGIR Conference on Research and Development in Information Retrieval, Paris, France, July 21-25, ACM, 2019: 165-174.
|
30 |
李文涛,高旻,李华,等. 一种基于流行度分类特征的托攻击检测算法[J]. 自动化学报, 2015, 41(9): 1563-1576.
|
|
Li W T, Gao Y, Li H, et al. An shilling attack detection algorithm based on popularity degree features[J]. Acta Automatica Sinica, 2015, 41(9): 1563-1576.
|
31 |
Gupta V, Chakraborty T. VIKING: Adversarial attack on network eEmbeddings via supervised network poisoning[C]// Proceedings of the 25th Pacific-Asia Conference on Knowledge Discovery and Data Mining. Delhi, India, May 11-14, Springer, 2021: 103-115.
|
32 |
Rong Y, Huang W, Xu T, et al. Dropedge: Towards deep graph convolutional networks on node classification [C]// Proceedings of the 7th International Conference on Learning Representations, Addis Ababa, Ethiopia, April 25-30, 2020.
|
33 |
Bojchevski A, Shchur O, Zügner D, et al. Netgan: Generating graphs via random walks[C]// Proceedings of the 5th International Conference on Machine Learning, Vancouver, Canada, May 21-25 , PMLR, 2018: 610-619.
|