Yayın:
Designing shilling attacks on disguised binary data

dc.contributor.authorBatmaz, Zeynep
dc.contributor.authorPolat, Hüseyin
dc.contributor.orcid0000-0002-7509-9100
dc.contributor.orcid0000-0003-4128-2625
dc.date.accessioned2025-11-13T22:39:31Z
dc.date.issued2017-01-01
dc.identifier.doihttps://doi.org/10.1504/ijdmmm.2017.086576
dc.identifier.endpage185
dc.identifier.issn1759-1163
dc.identifier.issue3
dc.identifier.openalexW4245692048
dc.identifier.startpage185
dc.identifier.urihttps://hdl.handle.net/11421/14880
dc.identifier.urihttps://doi.org/10.1504/ijdmmm.2017.086576
dc.identifier.volume9
dc.language.isoen
dc.relation.ispartofInternational Journal of Data Mining Modelling and Management
dc.rightsrestrictedAccess
dc.subjectComputer science
dc.subjectCollaborative filtering
dc.subjectRobustness (evolution)
dc.subjectBinary number
dc.subjectAttack model
dc.subjectConfidentiality
dc.subjectInformation overload
dc.subjectRecommender system
dc.subjectInformation sensitivity
dc.subjectData mining
dc.subjectBinary data
dc.subjectComputer security
dc.subjectInformation retrieval
dc.subjectWorld Wide Web
dc.subjectMathematics
dc.subject.sdg16
dc.titleDesigning shilling attacks on disguised binary data
dc.typeArticle
dspace.entity.typePublication
local.authorid.openalexA5084931656
local.authorid.openalexA5029891409

Dosyalar

Koleksiyonlar