8   Artículos

 
en línea
Quanqiang Zhou, Cheng Huang and Liangliang Duan    
Recommendation attack attempts to bias the recommendation results of collaborative recommender systems by injecting malicious ratings into the rating database. A lot of methods have been proposed for detecting such attacks. Among these works, the deep le... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Yelyzaveta Meleshko     Pág. 52 - 57
The subject matter of the research is the process of identifying information attacks on the recommendation system. The goal of this work is to develop a method for detecting information attack objects in a recommendation system based on the analysis of t... ver más

 
en línea
Yelyzaveta Meleshko,Oleksandr Drieiev,Mykola Yakymenko,Dmytro Lysytsia     Pág. 14 - 24
The recommendation systems used to form a news feed in social networks or to create recommendation lists on content websites or Internet stores are often exposed to information profile injection attacks. These attacks are aimed at changing ratings, and t... ver más
Revista: Eastern-European Journal of Enterprise Technologies    Formato: Electrónico

 
en línea
Vlastimil Clupek, Tomas Horvath, Petr Munster and Vaclav Oujezsky    
Passive optical networks are currently the most promising solution for access networks. These networks rely on broadcast signal distribution in the downstream direction and unicast signal transmission in the upstream direction. The upstream direction is ... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »