Author of the publication

Towards a Tricksy Group Shilling Attack Model against Recommender Systems.

, , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 675-688. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Replica Replacement Algorithm Based on Value-Cost Prediction., , and . CSCWD (Selected Papers), volume 5236 of Lecture Notes in Computer Science, page 365-373. Springer, (2007)Popular Items or Niche Items: Flexible Recommendation Using Cosine Patterns., , , , and . ICDM Workshops, page 205-212. IEEE Computer Society, (2014)Towards a Tricksy Group Shilling Attack Model against Recommender Systems., , , and . ADMA, volume 7713 of Lecture Notes in Computer Science, page 675-688. Springer, (2012)Understanding Network Characteristics of Spam Users in Social Media., , and . CBD, page 171-176. IEEE, (2020)SEA: a system for event analysis on chinese tweets., , , , , and . KDD, page 1498-1501. ACM, (2013)Efficiently Translating Complex SQL Query to MapReduce Jobflow on Cloud., , , , and . IEEE Trans. Cloud Comput., 8 (2): 508-517 (2020)Link prediction in temporal networks: Integrating survival analysis and game theory., , , , , and . Inf. Sci., (2019)Efficient batch similarity join processing of social images based on arbitrary features., , , , and . World Wide Web, 19 (4): 725-753 (2016)QoS Deviation Distance Based Negotiation Algorithm in Grid Resource Advance Reservation., , , and . CSCWD, page 605-610. IEEE, (2007)Online Matching with Stochastic Rewards: Advanced Analyses Using Configuration Linear Programs., , , , , and . WINE, volume 14413 of Lecture Notes in Computer Science, page 384-401. Springer, (2023)