
Citation: Xin Liu, Yingyuan Xiao, Xu Jiao, Wenguang Zheng, Zihao Ling. A novel Kalman Filter based shilling attack detection algorithm[J]. Mathematical Biosciences and Engineering, 2020, 17(2): 1558-1577. doi: 10.3934/mbe.2020081
[1] | Florencia G. Palis, R. M. Lampayan, R.J. Flor, E. Sibayan . A multi-stakeholder partnership for the dissemination of alternate wetting and drying water-saving technology for rice farmers in the Philippines. AIMS Agriculture and Food, 2017, 2(3): 290-309. doi: 10.3934/agrfood.2017.3.290 |
[2] | Theodor Friedrich, Amir Kassam . Food security as a function of Sustainable Intensification of Crop Production. AIMS Agriculture and Food, 2016, 1(2): 227-238. doi: 10.3934/agrfood.2016.2.227 |
[3] | Boris Boincean, Amir Kassam, Gottlieb Basch, Don Reicosky, Emilio Gonzalez, Tony Reynolds, Marina Ilusca, Marin Cebotari, Grigore Rusnac, Vadim Cuzeac, Lidia Bulat, Dorian Pasat, Stanislav Stadnic, Sergiu Gavrilas, Ion Boaghii . Towards Conservation Agriculture systems in Moldova. AIMS Agriculture and Food, 2016, 1(4): 369-386. doi: 10.3934/agrfood.2016.4.369 |
[4] | Isaac Busayo Oluwatayo . Towards assuring food security in South Africa: Smallholder farmers as drivers. AIMS Agriculture and Food, 2019, 4(2): 485-500. doi: 10.3934/agrfood.2019.2.485 |
[5] | Fernando Arias, Maytee Zambrano, Kathia Broce, Carlos Medina, Hazel Pacheco, Yerenis Nunez . Hyperspectral imaging for rice cultivation: Applications, methods and challenges. AIMS Agriculture and Food, 2021, 6(1): 273-307. doi: 10.3934/agrfood.2021018 |
[6] | J.M.A. Duncan, J. Dash, E.L. Tompkins . Observing adaptive capacity in Indian rice production systems. AIMS Agriculture and Food, 2017, 2(2): 165-182. doi: 10.3934/agrfood.2017.2.165 |
[7] | Raulston Derrick Gillette, Norio Sakai, Godfrid Erasme Ibikoule . Role and impact of contract farming under various pricing standards: A case of Guyana's rice sector. AIMS Agriculture and Food, 2024, 9(1): 336-355. doi: 10.3934/agrfood.2024020 |
[8] | Karin Lindsjö, Agnes Anderssonc Djurfeldt, Aida Cuthbert Isinika, Elibariki Msuya . Youths' participation in agricultural intensification in Tanzania. AIMS Agriculture and Food, 2020, 5(4): 681-699. doi: 10.3934/agrfood.2020.4.681 |
[9] | Abbas Ali Chandio, Yuansheng Jiang, Abdul Rehman, Rahman Dunya . The linkage between fertilizer consumption and rice production: Empirical evidence from Pakistan. AIMS Agriculture and Food, 2018, 3(3): 295-305. doi: 10.3934/agrfood.2018.3.295 |
[10] | Deborah Nabuuma, Beatrice Ekesa, Mieke Faber, Xikombiso Mbhenyane . Food security and food sources linked to dietary diversity in rural smallholder farming households in central Uganda. AIMS Agriculture and Food, 2021, 6(2): 644-662. doi: 10.3934/agrfood.2021038 |
Currently it is the digital era where there is a steady flood of information. Such information inundation makes a variety of mass media more important, for example, newspapers, broadcast, social network system media, and public speaking. Before developing mass media, rumors propagated by word of mouth and played a crucial role in communication between people or groups. This process can be understood as a kind of homogenization of information system and social interaction [1]. With the emergence of multimedia and social media, rumors have spread faster and have wide transmissions [5]. However, some harmful and powerful rumor outbreaks arise from such wide transmission via these media [10,14,18]. Moreover, their influence causes multiple effects for a variety of situations rather than the mono effect for localized situations [12].
As a benefit in return for the homogenization, personality is more heavily emphasized and the diversity of people has garnered much attention in our social community. In the microscopic viewpoint of rumor spreading, this variety of characteristics is important. Many researchers already have investigated that the degree of belief is important in rumor spreading [8,16]. From this perspective, we assume that there will be various groups that share the same trust rate. In this paper, we propose an SIR type rumor spreading model with given spreading rate distributions
Next we provide a brief historical review of the rumor spreading model. Starting the pioneering studies by Daley and Kendall [3,4], a lot of researchers have studied rumor spreading and tried to build mathematical models [11,17]. Zanette [23,24] numerically obtained the existence of a critical threshold for a rumor spreading model regarding small-world networks. In [13], the authors derived the mean-field equation of complex heterogeneous networks. For other topological settings, see [7,15]. Most mathematical models for rumor spreading are based on the epidemic model. In [27], the authors considered an SIR type rumor spreading model with forgetting mechanism. See also [6,28] for other models with forgetting mechanisms. In [26], the authors added a hibernator variable to the SIR type rumor spreading model. Similarly, in [20,22], the authors adapted several new variables to construct a more realistic model for the rumor spreading phenomena. In [25], the authors employed the probability that ignorants directly become stiflers when they are aware of a rumor. We refer to papers [2,9,29] for other rumor spreading models.
The paper is organized as follows. In Section 2, we present the trust distribution and its mechanism in the SIR type model. In Section 3, we derive a single equation for the rumor size
Notation: Throughout the paper, we use the following simplified notation:
I(t)=(I1(t),…,IN(t)), ˚I=(˚I1,…,˚IN), ˚In=(˚In1,…,˚InN), n,N∈N. |
Let
There are three groups of populations: ignorants (I), spreaders (S), and stiflers (R). At the first stage, ignorants contact a spreader, realize a rumor, and accept the hearsay. According to the acceptance with rate
˙I=−kλSI,˙S=kλSI−kS(σ1S+σ2R),˙R=kσS(S+R), |
where
As in [25], we assume that spreaders lose their interest in rumors with probability
˙Ii=−kλiSIi, i=1,…,N,˙S=N∑i=1kλiSIi−kσS(S+R)−δS,˙R=kσS(S+R)+δS, | (1) |
subject to initial data
Throughout this paper, we assume that
(1)
(2) The spreading (trust) rate distribution
We will consider a family of initial data
˚T=(N∑j=1˚Ij)+˚S+˚R |
for a fixed total initial population
Next, we define the rumor size, a momentum type quantity of the initial data and rumor outbreak.
Definition 2.1. [19,25,26]For a solution
ϕ(t)=∫t0S(τ)dτ. |
Definition 2.2. Let
M1(˚I)=N∑i=1λi˚Ii |
and total population with initial
T(t)=(N∑i=1Ii(t))+S(t)+R(t). |
Definition 2.3. Let
ϕ∞(˚I,˚S):=limt→∞ϕ(t). |
Definition 2.4. For a given initial data
˚In→˚I, ˚Sn→0 as n→∞ |
and
˚Sn>0, ˚Rn=0 for n∈N. |
We additionally assume that the total populations are the same:
˚T=(N∑i=1˚Ii)+˚S+˚R=(N∑i=1˚Ini)+˚Sn+˚Rn=˚Tn. |
We say that a rumor outbreak occurs if the following limit exists
ϕe(˚I)=limn→∞ϕ∞(˚In,˚Sn) |
and
Remark 1. (1) In [13,15,25], the authors define that the rumor outbreak occurs if
lim˚R→0R(∞)>0. |
This is essentially equivalent to Definition 2.4. We use
(2) The rumor spreading begins with one spreader. Therefore,
The following is the main theorem of this paper.
Theorem 2.5. Let
We assume that each
˚T=(N∑k=1˚Ink)+˚Sn=N∑i=1˚Ii. |
Then, there exists the following limit of steady states:
ϕe=ϕe(˚I)=lim˚Sn→0,˚In→˚Iϕ∞(˚In,˚Sn), |
where
Furthermore, if
Remark 2. An equivalent condition of occurring a rumor outbreak is
kM1(˚I)>δ. |
In this section, we derive a single equation for
Lemma 3.1. Let
Ii(t)=˚Iie−kλiϕ(t), i=1,…,N, | (2) |
where
Proof. From the first equation of system (1), we have
ddtlogIi(t)=−kλiS(t), i=1,…,N. |
Integrating the above relation gives
logIi(t)=log˚Ii−∫t0kλiS(τ)dτ, i=1,…,N. |
For the population density of
Ii(t)=˚Iie−∫t0kλiS(τ)dτ, i=1,…,N. |
Clearly, we have
Lemma 3.2. Let
T(t)=˚T, for any t>0. | (3) |
Proof. Note that the summation of all equations in system (1) yields
(N∑i=1˙Ii)+˙S+˙R=0. |
Integrating the above equation leads to
T(t)=(N∑i=1Ii(t))+S(t)+R(t)=(N∑i=1˚Ii)+˚S+˚R=˚T. |
Remark 3. By the conservation property (3) in Lemma 3.2 and the formula in (2), we easily obtain the following formula for
S(t)=˚T−N∑i=1Ii(t)−R(t)=˚T−N∑i=1˚Iie−kλiϕ(t)−R(t). | (4) |
Lemma 3.3. Let
R(t)=R(ϕ(t))=˚R+kσ˚Tϕ(t)−kσ∑λi≠0˚Ii1−e−kλiϕ(t)kλi−kσ∑λi=0˚Iiϕ(t)+δϕ(t). |
Proof. The third equation in system (1) gives us that
R(t)−˚R=∫t0˙R(τ)dτ=∫t0[kσS(τ)(S(τ)+R(τ))+δS(τ)]dτ. |
From (4) and the definition of
R(t)−˚R=kσ∫t0S(τ)[S(τ)+R(τ)]dτ+δϕ(t)=kσ∫t0S(τ)(˚T−N∑i=1Ii(τ))dτ+δϕ(t)=kσ∫t0ϕ′(τ)(˚T−N∑i=1˚Iie−kλiϕ(τ))dτ+δϕ(t)=kσ˚T∫t0ϕ′(τ)dτ−∑λi≠0kσ∫t0ϕ′(τ)˚Iie−kλiϕ(τ)dτ−∑λi=0kσ∫t0ϕ′(τ)˚Iie−kλiϕ(τ)dτ+δϕ(t)=K1+K2+K3+K4. |
We directly have
K1=kσ˚Tϕ(t) and K4=δϕ(t). |
For
K2=−∑λi≠0kσ∫t0ϕ′(τ)e−kλiϕ(τ)dτ=−∑λi≠0kσ∫ϕ(t)ϕ(0)e−kλiηdη=−∑λi≠0kσe−kλiϕ(0)−e−kλiϕ(t)kλi=−∑λi≠0kσ1−e−kλiϕ(t)kλi. |
Similarly, we have
K3=−∑λi=0kσ∫t0ϕ′(τ)e−kλiϕ(τ)dτ=−∑λi=0kσ∫t0ϕ′(τ)dτ=−∑λi=0kσ(ϕ(t)−ϕ(0))=−∑λi=0kσϕ(t). |
Therefore, the above elementary calculations yield
R(t)−˚R=kσ˚Tϕ(t)−kσ∑λi≠0˚Ii1−e−kλiϕ(t)kλi−kσ∑λi=0˚Iiϕ(t)+δϕ(t). |
The formula (4) of
dϕ(t)dt=S(t)=˚T−N∑i=1˚Iie−kλiϕ(t)−R(t). |
By the result in Lemma 3.3, we derive a single decoupled equation for
dϕ(t)dt=˚T−N∑i=1˚Iie−kλiϕ(t)−˚R−kσ˚Tϕ(t)+kσ∑λi≠0˚Ii1−e−kλiϕ(t)kλi+kσ∑λi=0˚Iiϕ(t)−δϕ(t). |
For simplicity, we define
F(ϕ)=F(ϕ,˚I,˚S,˚R,˚T):=˚T−N∑i=1˚Iie−kλiϕ−˚R−kσ˚Tϕ+kσ∑λi≠0˚Ii1−e−kλiϕkλi+kσ∑λi=0˚Iiϕ(t)−δϕ. | (5) |
Then,
˙ϕ(t)=F(ϕ(t)). | (6) |
In this section, we use the steady state analysis to obtain the threshold phenomena for asymptotic behavior of the solution to system (1). To obtain the asymptotic behavior of solutions to (6), we first consider a steady state
F(ϕ)=0, | (7) |
where
G(ϕ)=G(ϕ,˚I,˚S,˚R,˚T)=˚T−N∑i=1˚Iie−kλiϕ−˚R+kσ∑λi≠0˚Ii1−e−kλiϕkλi | (8) |
and
H(ϕ)=H(ϕ,˚I,˚S,˚R,˚T)=(δ+kσ˚T−kσ∑λi=0˚Ii)ϕ. | (9) |
Then, we divide
H(ϕ)=G(ϕ). |
Lemma 4.1. Let
G(0)=˚S, and limϕ→∞G(ϕ)<∞, if ˚R=0. |
Proof. By the definition of
For the next result, we take the limit such that
limϕ→∞G(ϕ)=limϕ→∞(˚T−N∑i=1˚Iie−kλiϕ−˚R+kσ∑λi≠0˚Ii1−e−kλiϕkλi)=limϕ→∞(˚T−∑λi≠0˚Iie−kλiϕ−∑λi=0˚Ii−˚R+kσ∑λi≠0˚Ii1−e−kλiϕkλi)=˚T−∑λi=0˚Ii−˚R+kσ∑λi≠0˚Iikλi. |
Therefore, we have
kσ∑λi≠0˚Iikλi<∞. |
Therefore, we conclude that
Lemma 4.2. Assume that
dGdϕ=∑λi≠0(kλi˚Iie−kλiϕ+kσ˚Iie−kλiϕ)>0. |
Proof. Note that the derivative of
dGdϕ=−ddϕN∑i=1˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ. |
We can calculate the first term in the above as
ddϕN∑i=1˚Iie−kλiϕ=ddϕ∑λi≠0˚Iie−kλiϕ+ddϕ∑λi=0˚Iie−kλiϕ=ddϕ∑λi≠0˚Iie−kλiϕ+ddϕ∑λi=0˚Ii=−∑λi≠0kλi˚Iie−kλiϕ. |
Thus, if at least one non-zero
dGdϕ=∑λi≠0kλi˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ>0. |
Lemma 4.3. Let
Proof. Note that
δ+kσ˚T−kσ∑λi=0˚Ii=δ+kσ(N∑i=1˚Ii+˚S+˚R)−kσ∑λi=0˚Ii=δ+kσ(∑λi≠0˚Ii+˚S+˚R). |
Therefore,
Proposition 1. Let
Then there is a final rumor size
ϕ∞(˚I,˚S):=limt→∞ϕ(t), |
where
F(ϕ∞(˚I,˚S))=0. |
Proof. This follows from an elementary result of ordinary differential equations. Note that for given initial data
F(0)=G(0)−H(0)=˚S>0, |
and
limϕ→∞F(ϕ)=G(ϕ)−H(ϕ)=−∞. |
By the intermediate value theorem, there is at least one positive solution
For a fixed
Proposition 2. Let
The equation
Proof. We have, by Lemma 4.1 and 4.3,
G(0)=˚S=0, limϕ→∞G(ϕ)<∞ |
and
H(0)=0, limϕ→∞H(ϕ)=∞. |
It follows that
limϕ→∞F(ϕ)=−∞. | (10) |
Lemma 4.2 implies that the derivative of
dGdϕ=∑λi≠0kλi˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ>0. |
Moreover, if
dHdϕ(ϕ,˚I,˚S,˚R,˚T)=δ+kσ˚T−kσ∑λi=0˚Ii. |
Therefore,
dFdϕ=dGdϕ−dHdϕ=∑λi≠0kλi˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ−(δ+kσ˚T−kσ∑λi=0˚Ii). | (11) |
So,
dFdϕ(0)=dGdϕ(0)−dHdϕ(0)=∑λi≠0kλi˚Ii+kσ∑λi≠0˚Ii−(δ+kσ˚T−kσ∑λi=0˚Ii)=∑λi≠0kλi˚Ii−δ=kM1−δ. |
This yields
kM1>δ⇒dFdϕ(0)>0, | (12) |
and the continuity of
F(ϕϵ)>0. |
Thus, the intermediate value theorem and (10) show that
In order to complete the proof of this proposition, it suffices to verify that the equation has a unique solution
We now assume that
dFdϕ=∑λi≠0kλi˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ−(δ+kσ˚T−kσ∑λi=0˚Ii)=∑λi≠0kλi˚Iie−kλiϕ+kσ∑λi≠0˚Iie−kλiϕ−(δ+kσ˚T−kσ∑λi=0˚Iie−kλiϕ)=N∑i=1kλi˚Iie−kλiϕ+kσN∑i=1˚Iie−kλiϕ−δ−kσ˚T. |
Since we assume that
dFdϕ≤N∑i=1kλi˚Iie−kλiϕ+kσN∑i=1˚Iie−kλiϕ−N∑i=1kλi˚Ii−kσN∑i=1˚Ii=N∑i=1kλi˚Ii(e−kλiϕ−1)+kσN∑i=1˚Ii(e−kλiϕ−1). |
This implies that
dFdϕ<0 if ϕ>0, and dFdϕ≤0 if ϕ=0. |
The fact in (10) with
F(ϕ)<0 for ϕ>0. |
Therefore, we complete the proof.
We are now ready to prove the main theorem.
The proof of the main theorem. Let
˚In→˚I, ˚Sn→0. | (13) |
We denote
F(ϕ,˚Sn)=F(ϕ,˚In,˚Sn,˚Rn,˚T) and F∞(ϕ)=F(ϕ,˚I,˚S,˚R,˚T). |
First, assume that
F∞(0)=0 and ddϕF∞(ϕ)|ϕ=0>0. |
Note that (11) implies that
∂F∂ϕ(ϕ,˚In,˚Sn,˚Rn,˚T)=∑λi≠0kλi˚Inie−kλiϕ+kσ∑λi≠0˚Inie−kλiϕ−(δ+kσ˚T−kσ∑λi=0˚Ini)=∑λi≠0kλi˚Inie−kλiϕ+kσ∑λi≠0˚Inie−kλiϕ−(δ+kσ˚T−kσ∑λi=0˚Inie−kλiϕ)=N∑i=1kλi˚Inie−kλiϕ+kσN∑i=1˚Inie−kλiϕ−δ−kσ˚T=N∑i=1kλi˚Ini(e−kλiϕ−1)+N∑i=1kλi˚Ini+kσN∑i=1˚Inie−kλiϕ−δ−kσ((N∑i=1˚Ini)+˚Sn). |
Therefore,
∂F∂ϕ(ϕ,˚In,˚Sn,˚Rn,˚T)=N∑i=1kλi˚Ini(e−kλiϕ−1)+kσN∑i=1˚Ini(e−kλiϕ−1)−kσ˚Sn+kM1(˚In)−δ. |
By (13), there is
kM1(˚In)−δ>12(kM1(˚I)−δ) |
and
kσ˚Sn≤14(kM1(˚I)−δ). |
Since
|N∑i=1kλi˚Ini(e−kλiϕ−1)+kσN∑i=1˚Ini(e−kλiϕ−1)|≤14(kM1(˚I)−δ). |
Thus, there are constants
∂F∂ϕ(ϕ,˚In,˚Sn,˚Rn,˚T)>0. | (14) |
In order to prove convergence, we consider differentiable functions
I(1/n)=˚In, S(1/n)=˚Sn, R(1/n)=˚Rn, n∈N, |
and
˚T=(N∑i=1Ii(s))+S(s)+R(s). |
We denote
We now prove that
For
For the last part, we assume that
Let
limn→∞F(ϕnn,˚Inn,˚Snn,˚Rnn,˚T)=F(ϕn∞,˚I,0,0,˚T). |
Therefore, by Proposition 2,
limn→∞ϕn=0. |
In this section, we numerically provide the solutions to system (1) with respect to several
For the numerical simulations, we used the fourth-order Runge-Kutta method with the following parameters:
λ1=1, λ2=2, λ3=3, σ=0.2, k=10. |
We take sufficiently large initial data
˚I1=˚I2=˚I3=9999, ˚S=3, ˚R=0. |
To see the threshold phenomena for
Note that in Proposition 1, we rigorously obtained that the final size of the rumor
In Figure 2, we plotted the densities of the spreaders (S) and the stiflers (R) with respect to several
In Figure 3, we plotted
From our analytic results, we can expect that the threshold occurs when
In this paper, we consider the rumor spreading model with the trust rate distribution. The model consists of several ignorants with trust rates
[1] | P. A. Chirita, W. Nejdl and C. Zamfir, Preventing shilling attacks in online recommender systems, 2005 ACM International Workshop on Web Information and Data Management (WIDM), 2005. Available from: https://dlnext.acm.org/doi/abs/10.1145/1147376.1147387. |
[2] | R. Burke, B. Mobasher, C. Williams and R. Bhaumik, Classification features for attack detection in collaborative recommender systems, 2006 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD), 2006. Available from: https://dlnext.acm.org/doi/proceedings/10.1145/1150402. |
[3] | C. A. Williams, B. Mobasher and R. Burke, Defending recommender systems: detection of profile injection attacks, SOCA, 1 (2007), 157-170. |
[4] | B. Mehta, Unsupervised shilling detection for collaborative filtering, 2007 National Conference on Artificial Intelligence, 2007. Available from: https://www.aaai.org/Library/AAAI/2007/aaai07-222.php. |
[5] | F. Peng, X. Zeng, H. Deng and L. Liu, Unsupervised detection of shilling attack for recommender system based on feature subset, Comput. Eng., 40 (2014), 109-114. |
[6] | Z. Zhang and S. R. Kulkarni, Graph-based detection of shilling attacks in recommender systems, 2013 IEEE International Workshop on Machine Learning for Signal Processing (MLSP), 2013. Available from: https://ieeexplore.ieee.org/xpl/conhome/6648476/proceeding. |
[7] | Z. Wu, J. Cao, B. Mao and Y. Wang, Semi-SAD: Applying semi-supervised learning to shilling attack detection, 2011 ACM Conference on Recommender Systems (RecSys), 2011. Available from: https://dlnext.acm.org/doi/proceedings/10.1145/2043932. |
[8] | C. Lv and W. Wang, Semi-supervised shilling attacks detection method based on SVM-KNN, Comput. Eng. Appl., 49 (2013), 7-10. |
[9] | M. Gao, Q. Yuan, B. Ling and Q. Xiong, Detection of abnormal item based on time intervals for recommender systems, Sci. World J., 2014 (2014), 1-8. |
[10] | Z. Yang and Z. Cai, Detecting abnormal profiles in collaborative filtering recommender systems, J. Intell. Inf. Syst., 48 (2017), 499-518. |
[11] | W. Bhebe and O. P. Kogeda, Shilling attack detection in collaborative recommender systems using a meta learning strategy, 2015 International Conference on Emerging Trends in Networks and Computer Communications (ETNCC), 2015. Available from: https://ieeexplore.ieee.org/xpl/conhome/7164876/proceeding. |
[12] | W. Zhou, J. Wen, Q. Xiong, M. Gao and J. Zeng, SVM-TIA a shilling attack detection method based on SVM and target item analysis in recommender systems, Neurocomputing, 210 (2016), 197-205. |
[13] | M. O'Mahony, N. Hurley, N. Kushmerick and G. Silvestre, Collaborative recommendation: A robustness analysis, ACM Trans. Internet. Technol., 4 (2004), 344-377. |
[14] | B. Mobasher, R. Burke, R. Bhaumik and C. Williams, Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness, ACM Trans. Internet. Technol., 7 (2007), 23-60. |
[15] | R. T. Sikora and K. Chauhan, Estimating sequential bias in online reviews: A Kalman Filtering approach, Knowledge-Based Syst., 27(2012), 314-321. |
[16] | K. Inuzuka, T. Hayashi and T. Takagi, Recommendation system based on prediction of user preference changes, 2016 IEEE/WIC/ACM International Conference on Web Intelligence (WI), 2016. Available from: https://ieeexplore.ieee.org/xpl/conhome/7814734/proceeding. |
[17] | C. Williams and B. Mobasher, Profile injection attack detection for securing collaborative recommender systems, DePaul Univ. CTI Technol. Repo., 2006 (2006), 1-47. |
[18] | K. Fang and J. Wang, Shilling attacks detection algorithm based on nonnegative matrix factorization, Comput. Eng. Appl., 53 (2017), 150-154. |
1. | Carlos Ballester, Camilla Vote, John Hornbuckle, Thavone Inthavong, Vanndy Lim, Chantha Oeurng, Wendy Quayle, Vang Seng, Pheng Sengxua, Vorachith Sihathep, Veasna Touch, Philip Eberbach, Effects of Frequency of Irrigation on Dry-Season Furrow-Irrigated Maize and Peanut Production in the Rice-Growing Lowlands of the Lower Mekong Basin, 2019, 9, 2077-0472, 128, 10.3390/agriculture9060128 | |
2. | Hao Yuan Chan, Sarina Abdul Halim-Lim, Tai Boon Tan, Nitty Hirawaty Kamarulzaman, Adi Ainurzaman Jamaludin, Wan Abd Al Qadr Imad Wan-Mohtar, Exploring the Drivers and the Interventions towards Sustainable Food Security in the Food Supply Chain, 2020, 12, 2071-1050, 7890, 10.3390/su12197890 | |
3. | Abha Mishra, Jan Willem Ketelaar, Norman Uphoff, Max Whitten, Food security and climate-smart agriculture in the lower Mekong basin of Southeast Asia: evaluating impacts of system of rice intensification with special reference to rainfed agriculture, 2021, 1473-5903, 1, 10.1080/14735903.2020.1866852 | |
4. | Thi Bui, Huu Tran, Hossein Azadi, Philippe Lebailly, Improving the Technical Efficiency of Sengcu Rice Producers through Better Financial Management and Sustainable Farming Practices in Mountainous Areas of Vietnam, 2018, 10, 2071-1050, 2279, 10.3390/su10072279 | |
5. | Muhammad Shahbaz Farooq, Hira Fatima, Obaid Ur Rehman, Muhammad Yousuf, Rabia Kalsoom, Sajid Fiaz, Muhammad Ramzan Khan, Muhammad Uzair, Shuhao Huo, Major challenges in widespread adaptation of aerobic rice system and potential opportunities for future sustainability, 2023, 159, 02546299, 231, 10.1016/j.sajb.2023.06.017 | |
6. | Yun-Ho Lee, Seong-Woo Cho, Tae-Young Hwang, On-Farm Assessment of the System of Rice Intensification (SRI) Under Rainfed Lowland Fields of Southern Cambodia, 2024, 36, 1225-8504, 63, 10.12719/KSIA.2024.36.1.63 |