Abstract: Trust management has been widely employed to determine a user’s trustworthiness based on evaluations from other entities, and trustless users are those with low trustworthiness due to ...
Abstract: Recent research has demonstrated that recommendation systems exhibit vulnerability under data poisoning attacks. The primary process of data poisoning attacks involves generating malicious ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results