Yayın:
Designing shilling attacks on disguised binary data

dc.contributor.authorPolat, Hüseyin
dc.contributor.authorBatmaz, Zeynep
dc.contributor.orcid0000-0003-4128-2625
dc.contributor.orcid0000-0002-7509-9100
dc.date.accessioned2025-11-13T22:31:46Z
dc.date.issued2017-01-01
dc.identifier.doihttps://doi.org/10.1504/ijdmmm.2017.10007683
dc.identifier.endpage185
dc.identifier.issn1759-1163
dc.identifier.issue3
dc.identifier.openalexW2756075076
dc.identifier.startpage185
dc.identifier.urihttps://hdl.handle.net/11421/14464
dc.identifier.urihttps://doi.org/10.1504/ijdmmm.2017.10007683
dc.identifier.volume9
dc.language.isoen
dc.relation.ispartofInternational Journal of Data Mining Modelling and Management
dc.rightsrestrictedAccess
dc.subjectComputer science
dc.subjectCollaborative filtering
dc.subjectRobustness (evolution)
dc.subjectBinary number
dc.subjectInformation overload
dc.subjectConfidentiality
dc.subjectRecommender system
dc.subjectData mining
dc.subjectBinary data
dc.subjectAttack model
dc.subjectInformation sensitivity
dc.subjectComputer security
dc.subjectInformation retrieval
dc.subjectWorld Wide Web
dc.subjectMathematics
dc.subject.sdg16
dc.titleDesigning shilling attacks on disguised binary data
dc.typeArticle
dspace.entity.typePublication
local.authorid.openalexA5029891409
local.authorid.openalexA5084931656

Dosyalar

Koleksiyonlar