Login / Signup

Effective diverse and obfuscated attacks on model-based recommender systems.

Zunping ChengNeil Hurley
Published in: RecSys (2009)
Keyphrases
  • recommender systems
  • collaborative filtering
  • data mining
  • website
  • email
  • digital images
  • user preferences
  • reverse engineering
  • countermeasures
  • security protocols