|
|
|
Quanqiang Zhou, Cheng Huang and Liangliang Duan
Recommendation attack attempts to bias the recommendation results of collaborative recommender systems by injecting malicious ratings into the rating database. A lot of methods have been proposed for detecting such attacks. Among these works, the deep le...
ver más
|
|
|
|
|
|
|
Yelyzaveta Meleshko
Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t...
ver más
|
|
|
|
|
|
|
Yelyzaveta Meleshko,Oleksandr Drieiev,Mykola Yakymenko,Dmytro Lysytsia
Pág. 14 - 24
The recommendation systems used to form a news feed in social networks or to create recommendation lists on content websites or Internet stores are often exposed to information profile injection attacks. These attacks are aimed at changing ratings, and t...
ver más
|
|
|
|
|
|
|
Vlastimil Clupek, Tomas Horvath, Petr Munster and Vaclav Oujezsky
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is ...
ver más
|
|
|
|