


default search action
Fuzhi Zhang
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j39]Peng Zhang
, Zhendong Niu
, Ru Ma
, Fuzhi Zhang
:
Multi-view graph contrastive representation learning for bundle recommendation. Inf. Process. Manag. 62(1): 103956 (2025) - [j38]Fuzhi Zhang
, Chenghang Huo
, Ru Ma
, Jinbo Chao
:
Local interpretable spammer detection model with multi-head graph channel attention network. Neural Networks 184: 107069 (2025) - 2024
- [j37]Yishu Xu, Peng Zhang
, Hongtao Yu, Fuzhi Zhang:
Detecting Group Shilling Attacks In Recommender Systems Based On User Multi-dimensional Features And Collusive Behaviour Analysis. Comput. J. 67(2): 604-616 (2024) - [j36]Peng Zhang
, Zhendong Niu, Ru Ma
, Fuzhi Zhang:
DHCL-BR: Dual Hypergraph Contrastive Learning for Bundle Recommendation. Comput. J. 67(10): 2906-2919 (2024) - [c6]Chenghang Huo
, Jindong Cui
, Ru Ma
, Yunfei Luo
, Fuzhi Zhang
:
Spammer Group Detection Approach Based on Deep Reinforcement Learning. ICIC (9) 2024: 233-244 - 2023
- [j35]Fuzhi Zhang
, Jiayi Wu, Peng Zhang, Ru Ma
, Hongtao Yu:
Detecting collusive spammers with heterogeneous graph attention network. Inf. Process. Manag. 60(3): 103282 (2023) - [j34]Hongtao Yu, Ru Ma
, Jinbo Chao, Fuzhi Zhang
:
An Overlapping Community Detection Approach Based on Deepwalk and Improved Label Propagation. IEEE Trans. Comput. Soc. Syst. 10(1): 311-321 (2023) - [c5]Ru Ma
, Jiachen Zhao
, Chenghang Huo
, Xiaodong Zhan
, Fuzhi Zhang
:
Spammer Groups Detection Based on Hypergraph Embedding And Autoencoder Classifier Model. EITCE 2023: 1400-1405 - 2022
- [j33]Fuzhi Zhang, Shuai Yuan, Jiayi Wu, Peng Zhang, Jinbo Chao:
Detecting collusive spammers on e-commerce websites based on reinforcement learning and adversarial autoencoder. Expert Syst. Appl. 203: 117482 (2022) - [j32]Shilei Wang, Peng Zhang, Hui Wang, Hongtao Yu, Fuzhi Zhang:
Detecting shilling groups in online recommender systems based on graph convolutional network. Inf. Process. Manag. 59(5): 103031 (2022) - [j31]Fuzhi Zhang, Shuai Yuan, Peng Zhang, Jinbo Chao, Hongtao Yu:
Detecting review spammer groups based on generative adversarial networks. Inf. Sci. 606: 819-836 (2022) - [j30]Jinbo Chao
, Chunhui Zhao
, Fuzhi Zhang
:
Network Embedding-Based Approach for Detecting Collusive Spamming Groups on E-Commerce Platforms. Secur. Commun. Networks 2022: 4354086:1-4354086:13 (2022) - 2021
- [j29]Hongyun Cai
, Fuzhi Zhang
:
An Unsupervised Approach for Detecting Group Shilling Attacks in Recommender Systems Based on Topological Potential and Group Behaviour Features. Secur. Commun. Networks 2021: 2907691:1-2907691:18 (2021) - [j28]Yaojun Hao
, Fuzhi Zhang:
An unsupervised detection method for shilling attacks based on deep learning and community detection. Soft Comput. 25(1): 477-494 (2021) - [j27]Hongyun Cai
, Fuzhi Zhang
:
BS-SC: An Unsupervised Approach for Detecting Shilling Profiles in Collaborative Recommender Systems. IEEE Trans. Knowl. Data Eng. 33(4): 1375-1388 (2021) - 2020
- [j26]Fuzhi Zhang, Xiaoyan Hao, Jinbo Chao, Shuai Yuan:
Label propagation-based approach for detecting review spammer groups on e-commerce websites. Knowl. Based Syst. 193: 105520 (2020) - [j25]Fuzhi Zhang, Yueqi Qu, Yishu Xu, Shilei Wang:
Graph embedding-based approach for detecting group shilling attacks in collaborative recommender systems. Knowl. Based Syst. 199: 105984 (2020) - [j24]Fuzhi Zhang
, Shilei Wang:
Detecting Group Shilling Attacks in Online Recommender Systems Based on Bisecting K-Means Clustering. IEEE Trans. Comput. Soc. Syst. 7(5): 1189-1199 (2020)
2010 – 2019
- 2019
- [j23]Hongyun Cai, Fuzhi Zhang
:
An Unsupervised Method for Detecting Shilling Attacks in Recommender Systems by Mining Item Relationship and Identifying Target Items. Comput. J. 62(4): 579-597 (2019) - [j22]Fuzhi Zhang, Zhoujun Ling, Shilei Wang:
Unsupervised approach for detecting shilling attacks in collaborative recommender systems based on user rating behaviours. IET Inf. Secur. 13(3): 174-187 (2019) - [j21]Hongtao Yu, Lijun Sun, Fuzhi Zhang:
A Robust Bayesian Probabilistic Matrix Factorization Model for Collaborative Filtering Recommender Systems Based on User Anomaly Rating Behavior Detection. KSII Trans. Internet Inf. Syst. 13(9): 4684-4705 (2019) - [j20]Yali Si, Fuzhi Zhang, Wenyuan Liu:
An adaptive point-of-interest recommendation method for location-based social networks based on user activity and spatial features. Knowl. Based Syst. 163: 267-282 (2019) - [j19]Hongyun Cai, Fuzhi Zhang:
Detecting shilling attacks in recommender systems based on analysis of user rating behavior. Knowl. Based Syst. 177: 22-43 (2019) - [j18]Yishu Xu, Fuzhi Zhang:
Detecting shilling attacks in social recommender systems based on time series analysis and trust features. Knowl. Based Syst. 178: 25-47 (2019) - [j17]Yaojun Hao
, Fuzhi Zhang
, Jian Wang, Qingshan Zhao, Jianfang Cao
:
Detecting Shilling Attacks with Automatic Features from Multiple Views. Secur. Commun. Networks 2019: 6523183:1-6523183:13 (2019) - 2018
- [j16]Yaojun Hao, Fuzhi Zhang:
Detecting shilling profiles in collaborative recommender systems via multidimensional profile temporal features. IET Inf. Secur. 12(4): 362-374 (2018) - [j15]Fuzhi Zhang, Zening Zhang, Peng Zhang, Shilei Wang:
UD-HMM: An unsupervised method for shilling attack detection based on hidden Markov model and hierarchical clustering. Knowl. Based Syst. 148: 146-166 (2018) - [j14]Yaojun Hao
, Peng Zhang, Fuzhi Zhang
:
Multiview Ensemble Method for Detecting Shilling Attacks in Collaborative Recommender Systems. Secur. Commun. Networks 2018: 8174603:1-8174603:33 (2018) - 2017
- [j13]Hongtao Yu, Ruibo Gao, Kun Wang, Fuzhi Zhang:
A novel robust recommendation method based on kernel matrix factorization. J. Intell. Fuzzy Syst. 32(3): 2101-2109 (2017) - [j12]Fuzhi Zhang, Yuanli Lu, Jianmin Chen, Shaoshuai Liu, Zhoujun Ling:
Robust collaborative filtering based on non-negative matrix factorization and R1-norm. Knowl. Based Syst. 118: 177-190 (2017) - [j11]Yali Si, Fuzhi Zhang, Wenyuan Liu:
CTF-ARA: An adaptive method for POI recommendation based on check-in and temporal features. Knowl. Based Syst. 128: 59-70 (2017) - 2016
- [j10]Huawei Yi, Fuzhi Zhang:
Robust recommendation method based on suspicious users measurement and multidimensional trust. J. Intell. Inf. Syst. 46(2): 349-367 (2016) - [j9]Fuzhi Zhang, Honghong Chen:
An ensemble method for detecting shilling attacks based on ordered item sequences. Secur. Commun. Networks 9(7): 680-696 (2016) - 2015
- [j8]Fuzhi Zhang, Quanqiang Zhou
:
Ensemble detection model for profile injection attacks in collaborative recommender systems based on BP neural network. IET Inf. Secur. 9(1): 24-31 (2015) - [j7]Fuzhi Zhang, Shuangxia Sun, Huawei Yi:
Robust collaborative recommendation algorithm based on kernel function and Welsch reweighted M-estimator. IET Inf. Secur. 9(5): 257-265 (2015) - 2014
- [j6]Fuzhi Zhang, Shuangxia Sun:
A Robust Collaborative Recommendation Algorithm Based on Least Median Squares Estimator. J. Comput. 9(2): 308-314 (2014) - [j5]Fuzhi Zhang, Huan Wang, Huawei Yi:
An Adaptive Recommendation Method Based on Small-World Implicit Trust Network. J. Comput. 9(3): 618-625 (2014) - [j4]Dongyan Jia, Fuzhi Zhang:
A Robust Collaborative Recommendation Algorithm Incorporating Trustworthy Neighborhood Model. J. Comput. 9(10): 2328-2334 (2014) - [j3]Fuzhi Zhang, Quanqiang Zhou
:
HHT-SVM: An online method for detecting profile injection attacks in collaborative recommender systems. Knowl. Based Syst. 65: 96-105 (2014) - 2013
- [j2]Dongyan Jia, Fuzhi Zhang, Sai Liu:
A Robust Collaborative Filtering Recommendation Algorithm Based on Multidimensional Trust Model. J. Softw. 8(1): 11-18 (2013) - 2012
- [j1]Fuzhi Zhang, Quanqiang Zhou
:
A Meta-learning-based Approach for Detecting Profile Injection Attacks in Collaborative Recommender Systems. J. Comput. 7(1): 226-234 (2012)
2000 – 2009
- 2009
- [c4]Fuzhi Zhang, Long Bai, Feng Gao:
A User Trust-Based Collaborative Filtering Recommendation Algorithm. ICICS 2009: 411-424 - 2008
- [c3]Fuzhi Zhang, Yujing Ma, Na Hou, Hui Liu:
An Ant-Based Fast Text Clustering Approach Using Pheromone. FSKD (2) 2008: 385-389 - 2007
- [c2]Fuzhi Zhang, Yan Wang, Lin Wang:
A Web service discovery algorithm based on dynamic composition. SNPD (2) 2007: 42-46 - 2006
- [c1]Fuzhi Zhang, Zhizheng Song, He Zhang:
Web Service Based Architecture and Ontology Based User Model for Cross-System Personalization. Web Intelligence 2006: 849-852
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:18 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint