Robustness analysis research has shown that conventional memory-based recommender systems are very susceptible to malicious profile-injection attacks. A number of attack models h...
Increasing applications are demanding effective and efficient support to perform retrieval in large collections of digital images. The work presented here is an early stage resear...
Giovanna Castellano, Gianluca Sforza, Maria Alessa...
The agent paradigm includes the notion that agents interact with services. This paper identifies the need for controlled access to such services, from the perspective of agent sys...
Benno J. Overeinder, P. D. Verkaik, Frances M. T. ...
Recent research has identified significant vulnerabilities in recommender systems. Shilling attacks, in which attackers introduce biased ratings in order to influence future recom...
Sheng Zhang, Amit Chakrabarti, James Ford, Fillia ...
In the recent years distributed architectures and P2P technology have been adopted to better support effective collaboration among networked organizations. According to the P2P pa...
Devis Bianchini, Valeria De Antonellis, Michele Me...