Author of the publication

A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique.

, , , , , and . Inf. Sci., (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Note on "IPad: ID-Based Public Auditing for the Outsourced Data in the Standard Model"., , , and . ICCCS (1), volume 10039 of Lecture Notes in Computer Science, page 335-342. (2016)Entropy-Weighted Instance Matching Between Different Sourcing Points of Interest., , , and . Entropy, 18 (2): 45 (2016)A novel item anomaly detection approach against shilling attacks in collaborative recommendation systems using the dynamic time interval segmentation technique., , , , , and . Inf. Sci., (2015)Research on Distributed Real Time Data Space SCADA Cluster for Large Power Grid., , , , , and . ICSAI, page 161-165. IEEE, (2018)A Trend Filtering Based Prediction Model on Network Traffic., and . ICNC-FSKD, volume 1075 of Advances in Intelligent Systems and Computing, page 874-882. Springer, (2019)Secure Cloud Storage Model Based on TPKE and ECE., and . J. Inf. Hiding Multim. Signal Process., 9 (6): 1549-1558 (2018)Prediction of annual precipitation based on fuzzy and grey Markov process., , , , and . ICMLC, page 1136-1140. IEEE, (2010)DC-Biased Magnetization Based Eddy Current Thermography for Subsurface Defect Detection., , , , , and . IEEE Trans. Ind. Informatics, 15 (12): 6252-6259 (2019)Anti-Attack Scheme for Edge Devices Based on Deep Reinforcement Learning., , , , and . Wirel. Commun. Mob. Comput., (2021)Dynamics of Complex Networks: Malware Propagation Modeling and Analysis in Industrial Internet of Things., , , , and . IEEE Access, (2020)