Cited By
View all- Khan AJhanjhi NAlı GRay SWassan S(2024)Case Studies and Applications of Generative AI in Real-World Cybersecurity ScenariosAI Techniques for Securing Medical and Business Practices10.4018/979-8-3693-8939-3.ch003(61-100)Online publication date: 13-Sep-2024
- Nguyen TQuoc Viet hung NNguyen THuynh TNguyen TWeidlich MYin H(2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
- Lu QGao M(2024)A Research on Shilling Attacks Based on Variational graph auto-encoders for Improving the Robustness of Recommendation SystemsProceedings of the 2024 International Conference on Generative Artificial Intelligence and Information Security10.1145/3665348.3665370(120-126)Online publication date: 10-May-2024
- Show More Cited By