Author of the publication

A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems.

, , , , and . ADMA (4), volume 14179 of Lecture Notes in Computer Science, page 371-386. Springer, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

From Community Detection to Community Profiling., , , , and . CoRR, (2017)SocialLens: Searching and Browsing Communities by Content and Interaction., , , , , and . ICDE, page 1397-1398. IEEE Computer Society, (2017)An Attention-Based Model for Learning Dynamic Interaction Networks., , , , and . IJCNN, page 1-8. IEEE, (2019)Modeling Marked Temporal Point Process Using Multi-relation Structure RNN., , , , , , and . Cogn. Comput., 12 (3): 499-512 (2020)STFM: a blockchain sharding algorithm based on trust field model for heterogeneous Internet of Things., , , and . J. Supercomput., 80 (3): 3875-3901 (February 2024)Electricity Theft Pinpointing Through Correlation Analysis of Master and Individual Meter Readings., , , , , and . IEEE Trans. Smart Grid, 11 (4): 3031-3042 (2020)Detecting shilling attacks in recommender systems based on analysis of user rating behavior., and . Knowl. Based Syst., (2019)Imagilar: A Real-Time Image Similarity Search System on Mobile Platform., , , and . WISE (2), volume 8181 of Lecture Notes in Computer Science, page 535-538. Springer, (2013)An Algorithm Based on Influence to Predict Invisible Relationship., , and . AsiaJCIS, page 54-61. IEEE Computer Society, (2018)A Poisoning Attack Based on Variant Generative Adversarial Networks in Recommender Systems., , , , and . ADMA (4), volume 14179 of Lecture Notes in Computer Science, page 371-386. Springer, (2023)