Login / Signup
Stealthy attack on graph recommendation system.
Hao Ma
Min Gao
Feng Wei
Zongwei Wang
Feng Jiang
Zehua Zhao
Zhengyi Yang
Published in:
Expert Syst. Appl. (2024)
Keyphrases
</>
attack graph
random walk
bipartite graph
graph theory
graph representation
collaborative filtering
connected components
directed graph
graph structure
graph mining
malicious users
recommender systems
power analysis
graph construction
graph theoretic
graph model
link analysis
context aware