共 37 条
- [31] Ebrahimian M., Kashef R., Detecting shilling attacks using hybrid deep learning models, Symmetry, 12, 11, pp. 1805-1821, (2020)
- [32] Zhou Q., Duan L., Semi-supervised recommendation attack detection based on co-forest, Computers & Security, 109, (2021)
- [33] Zhang S., Yin H., Chen T., GCN-based user representation learning for unifying robust recommendation and fraudster detection, pp. 689-698
- [34] Li Y., Fan J., Wang Y., Tan K.L., Influence maximization on social graphs: a survey, IEEE Transactions on Knowledge & Data Engineering, 30, 10, pp. 1852-1872, (2018)
- [35] Liu X., Wu S., Liu C., Zhang Y., Social network node influence maximization method combined with degree discount and local node optimization, Social Network Analysis and Mining, 11, 1, (2021)
- [36] Xu C., Zhang J., Long C., Uncovering collusive spammers in Chinese review websites, pp. 979-988
- [37] Qi L., Yang Y., Zhou X., Rafique W., Ma J., Fast anomaly identification based on multiaspect data streams for intelligent intrusion detection toward secure industry 4.0, IEEE Transactions on Industrial Informatics, 18, 9, pp. 6503-6511, (2022)