Author of the publication

Exploiting trustors as well as trustees in trust-based recommendation.

, , , and . CIKM, page 1893-1896. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast random algorithms for manifold based optimization in reconstructing 3D chromosomal structures., , , and . Commun. Inf. Syst., 21 (1): 1-29 (2021)Causal Inference for Knowledge Graph based Recommendation., , , , , and . CoRR, (2022)Data imputation using a trust network for recommendation via matrix factorization., , , and . Comput. Sci. Inf. Syst., 15 (2): 347-368 (2018)Satellite-Derived Bathymetry with Sediment Classification Using ICESat-2 and Multispectral Imagery: Case Studies in the South China Sea and Australia., , , and . Remote. Sens., 15 (4): 1026 (February 2023)Sentiment-aware jump forecasting., , and . Knowl. Based Syst., (2021)Data imputation using a trust network for recommendation., , , and . WWW (Companion Volume), page 299-300. ACM, (2014)On Analyzing User Ratings and Directional Trusts in Epinions.com., , and . DASC, page 1218-1221. IEEE Computer Society, (2011)Bijack: Breaking Bitcoin Network with TCP Vulnerabilities., , , , , and . ESORICS (3), volume 14346 of Lecture Notes in Computer Science, page 306-326. Springer, (2023)A Survey of Controllable Text Generation using Transformer-based Pre-trained Language Models., , , , and . CoRR, (2022)Causal Inference for Knowledge Graph Based Recommendation., , , , , and . IEEE Trans. Knowl. Data Eng., 35 (11): 11153-11164 (November 2023)