Yayın: Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms
| dc.contributor.author | Güneş, İhsan | |
| dc.contributor.author | Bilge, Alper | |
| dc.contributor.author | Polat, Hüseyin | |
| dc.contributor.orcid | 0000-0001-5932-8068 | |
| dc.contributor.orcid | 0000-0003-3467-9915 | |
| dc.contributor.orcid | 0000-0003-4128-2625 | |
| dc.date.accessioned | 2025-11-13T09:39:40Z | |
| dc.date.issued | 2013-05-31 | |
| dc.identifier.doi | https://doi.org/10.3837/tiis.2013.05.019 | |
| dc.identifier.endpage | 1290 | |
| dc.identifier.issn | 1976-7277 | |
| dc.identifier.issue | 5 | |
| dc.identifier.openalex | W2241944016 | |
| dc.identifier.startpage | 1272 | |
| dc.identifier.uri | https://hdl.handle.net/11421/1801 | |
| dc.identifier.uri | https://doi.org/10.3837/tiis.2013.05.019 | |
| dc.identifier.volume | 7 | |
| dc.language.iso | en | |
| dc.relation.ispartof | KSII Transactions on Internet and Information Systems | |
| dc.rights | openAccess | |
| dc.subject | Computer science | |
| dc.subject | Computer security | |
| dc.subject.sdg | 16 | |
| dc.title | Shilling Attacks Against Memory-Based Privacy-Preserving Recommendation Algorithms | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5005510886 | |
| local.authorid.openalex | A5042038212 | |
| local.authorid.openalex | A5029891409 |
