-
1
-
-
33750345680
-
Unifying user-based and item-based collaborative filtering approaches by similarity fusion
-
Jun Wang, Arjen de Vires, and Marcel Reinders. Unifying user-based and item-based collaborative filtering approaches by similarity fusion. In SIGIR, 2006.
-
(2006)
SIGIR
-
-
Wang, J.1
De Vires, A.2
Reinders, M.3
-
3
-
-
77951291046
-
A singular value thresholding algorithm for matrix completion
-
Jian-Feng Cai, Emmanuel Candès, and Zuowei Shen. A singular value thresholding algorithm for matrix completion. SIAM Journal on Optimization, 20(4):1956-1982, 2010.
-
(2010)
SIAM Journal on Optimization
, vol.20
, Issue.4
, pp. 1956-1982
-
-
Cai, J.-F.1
Candès, E.2
Shen, Z.3
-
4
-
-
33749544444
-
Effective attack models for shilling item-based collaborative filtering systems
-
Bamshad Mobasher, Robin Burke, Runa Bhaumik, and Chad Williams. Effective attack models for shilling item-based collaborative filtering systems. In Proceedings of the 2005 WebKDD Workshop, held in conjuction with ACM SIGKDD'2005, 2005.
-
(2005)
Proceedings of the 2005 WebKDD Workshop, Held in Conjuction with ACM SIGKDD'2005
-
-
Mobasher, B.1
Burke, R.2
Bhaumik, R.3
Williams, C.4
-
6
-
-
84879826396
-
Low-rank matrix completion using alternating minimization
-
Prateek Jain, Praneeth Netrapalli, and Sujay Sanghavi. Low-rank matrix completion using alternating minimization. In STOC, 2013.
-
(2013)
STOC
-
-
Jain, P.1
Netrapalli, P.2
Sanghavi, S.3
-
7
-
-
84969900476
-
Is feature selection secure against training data poisoning
-
Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, and Fabio Roli. Is feature selection secure against training data poisoning. In ICML, 2015.
-
(2015)
ICML
-
-
Xiao, H.1
Biggio, B.2
Brown, G.3
Fumera, G.4
Eckert, C.5
Roli, F.6
-
8
-
-
84969860609
-
The security of latent dirichlet allocation
-
Shike Mei and Xiaojin Zhu. The security of latent dirichlet allocation. In AISTATS, 2015.
-
(2015)
AISTATS
-
-
Mei, S.1
Zhu, X.2
-
9
-
-
84977967981
-
Using machine teaching to identify optimal training-set attacks on machine learners
-
Shike Mei and Xiaojin Zhu. Using machine teaching to identify optimal training-set attacks on machine learners. In AAAI, 2015.
-
(2015)
AAAI
-
-
Mei, S.1
Zhu, X.2
-
11
-
-
12244295760
-
Adversarial classification
-
ACM
-
Nilesh Dalvi, Pedro Domingos, Sumit Sanghai, Deepak Verma, et al Adversarial classification. In Proceedings of the tenth ACM SIGKDD international conference on Knowledge discovery and data mining, pages 99-108. ACM, 2004.
-
(2004)
Proceedings of the Tenth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining
, pp. 99-108
-
-
Dalvi, N.1
Domingos, P.2
Sanghai, S.3
Verma, D.4
-
15
-
-
33845989821
-
Can machine learning be secure?
-
ACM
-
Marco Barreno, Blaine Nelson, Russell Sears, Anthony D Joseph, and J Doug Tygar. Can machine learning be secure? In Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 16-25. ACM, 2006.
-
(2006)
Proceedings of the 2006 ACM Symposium on Information, Computer and Communications Security
, pp. 16-25
-
-
Barreno, M.1
Nelson, B.2
Sears, R.3
Joseph, A.D.4
Doug Tygar, J.5
-
16
-
-
84867136631
-
Poisoning attacks against support vector machines
-
Battista Biggio, Blaine Nelson, and Pavel Laskov. Poisoning attacks against support vector machines. In ICML, 2012.
-
(2012)
ICML
-
-
Biggio, B.1
Nelson, B.2
Laskov, P.3
-
17
-
-
84995490350
-
Data poisoning attacks against autoregressive models
-
Scott Alfeld, Xiaojin Zhu, and Paul Barford. Data poisoning attacks against autoregressive models. In AAAI, 2016.
-
(2016)
AAAI
-
-
Alfeld, S.1
Zhu, X.2
Barford, P.3
-
19
-
-
80053441758
-
Robust matrix completion and corrupted columns
-
Yudong Chen, Huan Xu, Constantine Caramanis, and Sujay Sanghavi. Robust matrix completion and corrupted columns. In ICML, 2011.
-
(2011)
ICML
-
-
Chen, Y.1
Xu, H.2
Caramanis, C.3
Sanghavi, S.4
-
20
-
-
84879946361
-
Low-rank matrix recovery from errors and erasures
-
Yudong Chen, Ali Jalali, Sujay Sanghavi, and Constantine Caramanis. Low-rank matrix recovery from errors and erasures. IEEE Transactions on Information Theory, 59(7):4324-4337, 2013.
-
(2013)
IEEE Transactions on Information Theory
, vol.59
, Issue.7
, pp. 4324-4337
-
-
Chen, Y.1
Jalali, A.2
Sanghavi, S.3
Caramanis, C.4
-
21
-
-
84874032153
-
Robust matrix completion via joint schatten p-norm and lp-norm minimization
-
Feiping Nie, Hua Wang, Xiao Cai, Heng Huang, and Chris Ding. Robust matrix completion via joint schatten p-norm and lp-norm minimization. In ICDM, 2012.
-
(2012)
ICDM
-
-
Nie, F.1
Wang, H.2
Cai, X.3
Huang, H.4
Ding, C.5
-
22
-
-
84867136661
-
Stability of matrix factorization for collaborative filtering
-
Yu-Xiang Wang and Huan Xu. Stability of matrix factorization for collaborative filtering. In ICML, 2012.
-
(2012)
ICML
-
-
Wang, Y.-X.1
Xu, H.2
|