{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,19]],"date-time":"2025-08-19T09:59:19Z","timestamp":1755597559981,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T00:00:00Z","timestamp":1131321600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2005,11,7]]},"DOI":"10.1145\/1102120.1102156","type":"proceedings-article","created":{"date-parts":[[2006,2,6]],"date-time":"2006-02-06T15:52:40Z","timestamp":1139241160000},"page":"270-279","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["An auctioning reputation system based on anomaly"],"prefix":"10.1145","author":[{"given":"Shai","family":"Rubin","sequence":"first","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Mihai","family":"Christodorescu","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Vinod","family":"Ganapathy","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Jonathon T.","family":"Giffin","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Louis","family":"Kruger","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]},{"given":"Nicholas","family":"Kidd","sequence":"additional","affiliation":[{"name":"University of Wisconsin, Madison, WI"}]}],"member":"320","published-online":{"date-parts":[[2005,11,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.2307\/1593721"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1214\/ss\/1042727940"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/850950.853684"},{"issue":"1","key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1515\/zfsoz-2001-0102","article-title":"`Face to Interface': Zum Problem der Vertrauenskonstitution im Internet am Beispiel von elektronischen Auktionen","volume":"30","author":"Brinkmann U.","year":"2001","unstructured":"U. Brinkmann and M. Seifert . `Face to Interface': Zum Problem der Vertrauenskonstitution im Internet am Beispiel von elektronischen Auktionen . Zeitschrift f\u00fcr Soziologie , 30 ( 1 ): 23 -- 47 , Feb. 2001 . U. Brinkmann and M. Seifert. `Face to Interface': Zum Problem der Vertrauenskonstitution im Internet am Beispiel von elektronischen Auktionen. Zeitschrift f\u00fcr Soziologie, 30(1):23--47, Feb. 2001.","journal-title":"Zeitschrift f\u00fcr Soziologie"},{"key":"e_1_3_2_1_5_1","first-page":"561","article-title":"Nonparametric estimation of conditional quantiles using quantile regression trees","volume":"8","author":"Chaudhuri P.","year":"2002","unstructured":"P. Chaudhuri and W.-Y. Loh . Nonparametric estimation of conditional quantiles using quantile regression trees . Bernoulli , 8 : 561 -- 576 , 2002 . P. Chaudhuri and W.-Y. Loh. Nonparametric estimation of conditional quantiles using quantile regression trees. Bernoulli, 8:561--576, 2002.","journal-title":"Bernoulli"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/501158.501175"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/352871.352889"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.49.10.1407.17308"},{"volume-title":"Trust in electronic markets: Price discovery in generalist versus specialty online auctions. Working paper, available a http:\/\/databases.si.umich.edu\/reputations\/bib\/papers\/Dewan&Hsu.doc","author":"Dewan S.","key":"e_1_3_2_1_9_1","unstructured":"S. Dewan and V. Hsu . Trust in electronic markets: Price discovery in generalist versus specialty online auctions. Working paper, available a http:\/\/databases.si.umich.edu\/reputations\/bib\/papers\/Dewan&Hsu.doc , University of Michigan , Ann Arbor, MI . S. Dewan and V. Hsu. Trust in electronic markets: Price discovery in generalist versus specialty online auctions. Working paper, available a http:\/\/databases.si.umich.edu\/reputations\/bib\/papers\/Dewan&Hsu.doc, University of Michigan, Ann Arbor, MI."},{"key":"e_1_3_2_1_10_1","volume-title":"Pattern Classification","author":"Duda R. O.","year":"2000","unstructured":"R. O. Duda , P. E. Hart , and D. G. Stork . Pattern Classification . John Wiley and Sons, Inc. , New York, NY , 2 nd edition, 2000 . R. O. Duda, P. E. Hart, and D. G. Stork. Pattern Classification. John Wiley and Sons, Inc., New York, NY, 2nd edition, 2000.","edition":"2"},{"key":"e_1_3_2_1_11_1","volume-title":"Policy: Seller shill bidding. Published online at http:\/\/pages.ebay.com\/help\/policies\/seller-shill-bidding. html (last accessed","author":"eBay Inc.","year":"2005","unstructured":"eBay Inc. Policy: Seller shill bidding. Published online at http:\/\/pages.ebay.com\/help\/policies\/seller-shill-bidding. html (last accessed May 4, 2005 ). eBay Inc. Policy: Seller shill bidding. Published online at http:\/\/pages.ebay.com\/help\/policies\/seller-shill-bidding. html (last accessed May 4, 2005)."},{"key":"e_1_3_2_1_12_1","volume-title":"April","author":"eBay Inc.","year":"2005","unstructured":"eBay Inc. First quarter 2005 financial results , April 2005 . eBay Inc. First quarter 2005 financial results, April 2005."},{"volume-title":"Shill-proof fee (SPF) schedule: the sunscreen against seller self-collusion in online English auctions. Working paper","author":"Hidv\u00e9gi Z.","key":"e_1_3_2_1_13_1","unstructured":"Z. Hidv\u00e9gi , W. Wang , and A. B. Whinston . Shill-proof fee (SPF) schedule: the sunscreen against seller self-collusion in online English auctions. Working paper , Emory University, Atlanta , GA. Z. Hidv\u00e9gi, W. Wang, and A. B. Whinston. Shill-proof fee (SPF) schedule: the sunscreen against seller self-collusion in online English auctions. Working paper, Emory University, Atlanta, GA."},{"key":"e_1_3_2_1_14_1","volume-title":"Journal of Economics and Management Strategy","author":"Houser D.","year":"2004","unstructured":"D. Houser and J. Wooders . Reputation in auctions: Theory, and evidence from eBay . Journal of Economics and Management Strategy , 2004 . D. Houser and J. Wooders. Reputation in auctions: Theory, and evidence from eBay. Journal of Economics and Management Strategy, 2004."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1515\/9781400830138","volume-title":"Common Value Auctions and the Winner's Curse","author":"Kagel J. H.","year":"2002","unstructured":"J. H. Kagel and D. Levin . Common Value Auctions and the Winner's Curse . Princeton University Press , 2002 . J. H. Kagel and D. Levin. Common Value Auctions and the Winner's Curse. Princeton University Press, 2002."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/948005.948040"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/1913643"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/508791.508835"},{"key":"e_1_3_2_1_20_1","first-page":"120","volume-title":"IEEE Symposium on Security and Privacy","author":"Lee W.","year":"1999","unstructured":"W. Lee , S. J. Stolfo , and K. W. Mok . A data mining framework for building intrusion detection models . In IEEE Symposium on Security and Privacy , pages 120 -- 132 , Oakland, CA , 1999 . W. Lee, S. J. Stolfo, and K. W. Mok. A data mining framework for building intrusion detection models. In IEEE Symposium on Security and Privacy, pages 120--132, Oakland, CA, 1999."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/646257.685228"},{"key":"e_1_3_2_1_22_1","volume-title":"Shill bidding exposed in online auctions","author":"Attorney General New York","year":"2004","unstructured":"New York Attorney General . Shill bidding exposed in online auctions . Press release, Nov. 2004 . New York Attorney General. Shill bidding exposed in online auctions. Press release, Nov. 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/355112.355122"},{"key":"e_1_3_2_1_24_1","series-title":"Advances in Applied Microeconomics","volume-title":"The Economics of the Internet and E-Commerce","author":"Resnick P.","year":"2002","unstructured":"P. Resnick and R. Zeckhauser . Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system . In M. R. Baye, editor, The Economics of the Internet and E-Commerce , volume 11 of Advances in Applied Microeconomics . Elsevier Science , Amsterdam, Netherlands , 2002 . P. Resnick and R. Zeckhauser. Trust among strangers in Internet transactions: Empirical analysis of eBay's reputation system. In M. R. Baye, editor, The Economics of the Internet and E-Commerce, volume 11 of Advances in Applied Microeconomics. Elsevier Science, Amsterdam, Netherlands, 2002."},{"volume-title":"The value of reputation on eBay: A controlled experiment. Working paper,","author":"Resnick P.","key":"e_1_3_2_1_25_1","unstructured":"P. Resnick , R. Zeckhauser , J. Swanson , and K. Lockwood . The value of reputation on eBay: A controlled experiment. Working paper, available at http:\/\/www.si.umich.edu\/~presnick\/papers\/postcards\/, University of Michigan , Ann Arbor, MI . P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood. The value of reputation on eBay: A controlled experiment. Working paper, available at http:\/\/www.si.umich.edu\/~presnick\/papers\/postcards\/, University of Michigan, Ann Arbor, MI."},{"key":"e_1_3_2_1_26_1","volume-title":"Duxbury Press","author":"Rice J. A.","year":"1994","unstructured":"J. A. Rice . Mathematical Statistics and Data Analysis . Duxbury Press , 2 nd edition, 1994 . J. A. Rice. Mathematical Statistics and Data Analysis. Duxbury Press, 2nd edition, 1994.","edition":"2"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39663-5_2"}],"event":{"name":"CCS05: 12th ACM Conference on Computer and Communications Security 2005","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control","ACM Association for Computing Machinery"],"location":"Alexandria VA USA","acronym":"CCS05"},"container-title":["Proceedings of the 12th ACM conference on Computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102156","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1102120.1102156","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:07Z","timestamp":1750262887000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1102120.1102156"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,11,7]]},"references-count":26,"alternative-id":["10.1145\/1102120.1102156","10.1145\/1102120"],"URL":"https:\/\/doi.org\/10.1145\/1102120.1102156","relation":{},"subject":[],"published":{"date-parts":[[2005,11,7]]},"assertion":[{"value":"2005-11-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}