Login / Signup
Effective diverse and obfuscated attacks on model-based recommender systems.
Zunping Cheng
Neil Hurley
Published in:
RecSys (2009)
Keyphrases
</>
recommender systems
collaborative filtering
data mining
website
email
digital images
user preferences
reverse engineering
countermeasures
security protocols