Yayın: Designing shilling attacks on disguised binary data
| dc.contributor.author | Polat, Hüseyin | |
| dc.contributor.author | Batmaz, Zeynep | |
| dc.contributor.orcid | 0000-0003-4128-2625 | |
| dc.contributor.orcid | 0000-0002-7509-9100 | |
| dc.date.accessioned | 2025-11-13T22:31:46Z | |
| dc.date.issued | 2017-01-01 | |
| dc.identifier.doi | https://doi.org/10.1504/ijdmmm.2017.10007683 | |
| dc.identifier.endpage | 185 | |
| dc.identifier.issn | 1759-1163 | |
| dc.identifier.issue | 3 | |
| dc.identifier.openalex | W2756075076 | |
| dc.identifier.startpage | 185 | |
| dc.identifier.uri | https://hdl.handle.net/11421/14464 | |
| dc.identifier.uri | https://doi.org/10.1504/ijdmmm.2017.10007683 | |
| dc.identifier.volume | 9 | |
| dc.language.iso | en | |
| dc.relation.ispartof | International Journal of Data Mining Modelling and Management | |
| dc.rights | restrictedAccess | |
| dc.subject | Computer science | |
| dc.subject | Collaborative filtering | |
| dc.subject | Robustness (evolution) | |
| dc.subject | Binary number | |
| dc.subject | Information overload | |
| dc.subject | Confidentiality | |
| dc.subject | Recommender system | |
| dc.subject | Data mining | |
| dc.subject | Binary data | |
| dc.subject | Attack model | |
| dc.subject | Information sensitivity | |
| dc.subject | Computer security | |
| dc.subject | Information retrieval | |
| dc.subject | World Wide Web | |
| dc.subject | Mathematics | |
| dc.subject.sdg | 16 | |
| dc.title | Designing shilling attacks on disguised binary data | |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.authorid.openalex | A5029891409 | |
| local.authorid.openalex | A5084931656 |
