2018 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications/ 12th IEEE International 2018
DOI: 10.1109/trustcom/bigdatase.2018.00047
|View full text |Cite
|
Sign up to set email alerts
|

Abnormal Item Detection Based on Time Window Merging for Recommender Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Commonly used is logistic regression, support vector machines, decision trees, and so on. Tara [ 5 ] and Qi et al [ 7 ] used logistic regression to detect malicious users in Twitter and phishers in CNN and found that the name language pattern feature is the most significant feature that distinguishes malicious users from normal users. Jiang et al [ 12 ] used logistic regression to detect false reviews in Amazon.…”
Section: Supervised Algorithmmentioning
confidence: 99%
See 1 more Smart Citation
“…Commonly used is logistic regression, support vector machines, decision trees, and so on. Tara [ 5 ] and Qi et al [ 7 ] used logistic regression to detect malicious users in Twitter and phishers in CNN and found that the name language pattern feature is the most significant feature that distinguishes malicious users from normal users. Jiang et al [ 12 ] used logistic regression to detect false reviews in Amazon.…”
Section: Supervised Algorithmmentioning
confidence: 99%
“…About 5% of users are fake users. Some experts believe that this proportion is possible up to 10% [ 7 ].…”
Section: Introductionmentioning
confidence: 99%