Author of the publication

A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems.

, , , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 751-763. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enhanced Monitoring-as-a-Service for Effective Cloud Management., and . IEEE Trans. Computers, 62 (9): 1705-1720 (2013)Anonymizing continuous queries with delay-tolerant mix-zones over road networks., , , , , and . Distributed and Parallel Databases, 32 (1): 91-118 (2014)Editor's Notes.. SIGMOD Record, 32 (3): 2-3 (2003)An XML-enabled data extraction toolkit for web sources., , and . Inf. Syst., 26 (8): 563-583 (2001)A computationally efficient particle-puff model for concentration variance from steady releases., and . Environmental Modelling and Software, 18 (1): 25-33 (2003)Determining the best K., , , and . Data Knowl. Eng., 68 (1): 28-48 (2009)A Distributed Approach to Node Clustering in Decentralized Peer-to-Peer Networks., , and . IEEE Trans. Parallel Distrib. Syst., 16 (9): 814-829 (2005)CPC-based backward-compatible network access for LTE cognitive radio cellular networks., , , and . IEEE Communications Magazine, 53 (7): 93-99 (2015)Constructing New Braided T-Categories over Weak Hopf Algebras., and . Applied Categorical Structures, 18 (4): 431-459 (2010)Distributed Query Scheduling Service: An Architecture and Its Implementation., , and . Int. J. Cooperative Inf. Syst., 7 (2-3): 123-166 (1998)