Author of the publication

Quick and accurate attack detection in recommender systems through user attributes.

, , and . RecSys, page 348-352. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Biologically Plausible Speech Recognition using Spike-based Phase Locking Cues., and . ISCAS, page 101-104. IEEE, (2009)Tag testing methodology for RFID enabled temperature tracking and shelf life estimation., , and . RFID-TA, page 8-15. IEEE, (2011)Continuously Differentiable Sample-Spacing Entropy Estimation., , and . IEEE Trans. Neural Networks, 19 (11): 1978-1984 (2008)A probabilistic framework to incorporate mixed-data type features: Matrix factorization with multimodal side information., , and . Neurocomputing, (2019)Sequential Attack Detection in Recommender Systems., , and . IEEE Trans. Inf. Forensics Secur., (2021)ML Approach to Improve the Costs and Reliability of a Wireless Sensor Network., and . Sensors, 23 (9): 4303 (2023)Bio-inspired filter banks for SSVEP-based brain-computer interfaces., , and . BHI, page 144-147. IEEE, (2016)Spike-Based Feature Extraction for Noise Robust Speech Recognition Using Phase Synchrony Coding., , and . ISCAS, page 1529-1532. IEEE, (2007)Precision Agriculture Using Soil Sensor Driven Machine Learning for Smart Strawberry Production., and . Sensors, 23 (4): 2247 (February 2023)Rich learning representations for human activity recognition: How to empower deep feature learning for biological time series., and . J. Biomed. Informatics, (2022)