Identifying Attack Models for Secure Recommendation
暂无分享,去创建一个
Robin Burke | Bamshad Mobasher | Roman Zabicki | Runa Bhaumik | R. Burke | B. Mobasher | Runa Bhaumik | Roman Zabicki
[1] Jaideep Srivastava,et al. Web usage mining: discovery and applications of usage patterns from Web data , 2000, SKDD.
[2] Bamshad Mobasher,et al. Web Usage Mining and Personalization , 2004, The Practical Handbook of Internet Computing.
[3] Jaideep Srivastava,et al. Data Preparation for Mining World Wide Web Browsing Patterns , 1999, Knowledge and Information Systems.
[4] John Riedl,et al. Shilling recommender systems for fun and profit , 2004, WWW '04.
[5] John Riedl,et al. Item-based collaborative filtering recommendation algorithms , 2001, WWW '01.
[6] Jaime Teevan,et al. Implicit feedback for inferring user preference: a bibliography , 2003, SIGF.
[7] Sergey Brin,et al. The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.
[8] Robin D. Burke,et al. Hybrid Recommender Systems: Survey and Experiments , 2002, User Modeling and User-Adapted Interaction.
[9] Jonathan L. Herlocker,et al. Evaluating collaborative filtering recommender systems , 2004, TOIS.
[10] Ken Lang,et al. NewsWeeder: Learning to Filter Netnews , 1995, ICML.
[11] Robin Burke,et al. Knowledge-based recommender systems , 2000 .
[12] Dorothy E. Denning,et al. An Intrusion-Detection Model , 1986, 1986 IEEE Symposium on Security and Privacy.
[13] Aaron Tucker,et al. A Bibliography. , 1902, British medical journal.
[14] Neil J. Hurley,et al. Collaborative recommendation: A robustness analysis , 2004, TOIT.