Detection of profile-injection attacks in recommender systems using outlier analysis
P Chakraborty, S Karforma - Procedia Technology, 2013 - Elsevier
E-Commerce recommender systems are vulnerable to different types of profile-injection
attacks where a number of fake user profiles are inserted into the system to influence the …
attacks where a number of fake user profiles are inserted into the system to influence the …
[PDF][PDF] Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis
P Chakrabortya, S Karformab - Procedia Technology, 2013 - cyberleninka.org
E-Commerce recommender systems are vulnerable to different types of profile-injection
attacks where a number of fake user profiles are inserted into the system to influence the …
attacks where a number of fake user profiles are inserted into the system to influence the …
[PDF][PDF] Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis
P Chakraborty, S Karforma - Procedia Technology, 2013 - academia.edu
E-Commerce recommender systems are vulnerable to different types of profile-injection
attacks where a number of fake user profiles are inserted into the system to influence the …
attacks where a number of fake user profiles are inserted into the system to influence the …
[PDF][PDF] Detection of Profile-injection attacks in Recommender Systems using Outlier Analysis
P Chakrabortya, S Karformab - Procedia Technology, 2013 - core.ac.uk
E-Commerce recommender systems are vulnerable to different types of profile-injection
attacks where a number of fake user profiles are inserted into the system to influence the …
attacks where a number of fake user profiles are inserted into the system to influence the …
Detection of Profile-injection Attacks in Recommender Systems Using Outlier Analysis
P Chakraborty, S Karforma - Procedia Technology, 2013 - infona.pl
E-Commerce recommender systems are vulnerable to different types of profile-injection
attacks where a number of fake user profiles are inserted into the system to influence the …
attacks where a number of fake user profiles are inserted into the system to influence the …