Author of the publication

Detection of Shilling Attack Based on Bayesian Model and User Embedding.

, , , , and . ICTAI, page 639-646. IEEE, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

CardioSentinal: A 24-hour Heart Care and Monitoring System., , , , and . JCSE, 6 (1): 67-78 (2012)FILA: Fine-grained indoor localization., , , , and . INFOCOM, page 2210-2218. IEEE, (2012)Personalisation in web computing and informatics: Theories, techniques, applications, and future research., , and . Information Systems Frontiers, 12 (5): 607-629 (2010)An alternating iterative algorithm for the synthesis of complex-excitation and pattern reconfigurable planar sparse array., , , , and . Signal Processing, (2017)QoS Prediction for Web Service Recommendation with Network Location-Aware Neighbor Selection., , , , and . International Journal of Software Engineering and Knowledge Engineering, 26 (4): 611-632 (2016)Applications of Formal And Semi-formal Verification on Software Testing, High-level Synthesis And Energy Internet.. University of California, Los Angeles, USA, (2018)base-search.net (ftcdlib:qt6jj2b6jn).Important User Group Based Web Service Recommendation., , , , and . IIAI-AAI, page 413-418. IEEE Computer Society, (2017)A Shilling Attack Detection Method Based on SVM and Target Item Analysis in Collaborative Filtering Recommender Systems., , , , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 751-763. Springer, (2015)Distributed Localization Refinements for Mobile Sensor Networks., , and . ICCNMC, volume 3619 of Lecture Notes in Computer Science, page 3-12. Springer, (2005)Detection of Shilling Attack Based on Bayesian Model and User Embedding., , , , and . ICTAI, page 639-646. IEEE, (2018)