Author of the publication

Forgetting User Preference in Recommendation Systems with Label-Flipping.

, and . IEEE Big Data, page 271-281. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Abstracting Audit Data for Lightweight Intrusion Detection., , and . ICISS, volume 6503 of Lecture Notes in Computer Science, page 201-215. Springer, (2010)Analysis and Modeling of Social Influence in High Performance Computing Workloads., , , , and . Euro-Par (1), volume 6852 of Lecture Notes in Computer Science, page 193-204. Springer, (2011)Cost Reduction for Web-Based Data Imputation., , , and . DASFAA (2), volume 8422 of Lecture Notes in Computer Science, page 438-452. Springer, (2014)Randomizing SVM Against Adversarial Attacks Under Uncertainty., , and . PAKDD (3), volume 10939 of Lecture Notes in Computer Science, page 556-568. Springer, (2018)High-speed web attack detection through extracting exemplars from HTTP traffic., and . SAC, page 1538-1543. ACM, (2011)TideWatch: Fingerprinting the cyclicality of big data workloads., , , and . INFOCOM, page 2031-2039. IEEE, (2014)Delve: A Data Set Retrieval and Document Analysis System., and . ECML/PKDD (3), volume 10536 of Lecture Notes in Computer Science, page 400-403. Springer, (2017)A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security., , and . ISNN (2), volume 3174 of Lecture Notes in Computer Science, page 657-662. Springer, (2004)Constructing attribute weights from computer audit data for effective intrusion detection., , and . J. Syst. Softw., 82 (12): 1974-1981 (2009)Robust Federated Training via Collaborative Machine Teaching using Trusted Instances., and . CoRR, (2019)