Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Fairness in recommendation: Foundations, methods, and applications
As one of the most pervasive applications of machine learning, recommender systems are
playing an important role on assisting human decision-making. The satisfaction of users and …
playing an important role on assisting human decision-making. The satisfaction of users and …
Task-agnostic detector for insertion-based backdoor attacks
Textual backdoor attacks pose significant security threats. Current detection approaches,
typically relying on intermediate feature representation or reconstructing potential triggers …
typically relying on intermediate feature representation or reconstructing potential triggers …
Fairness and diversity in recommender systems: a survey
Recommender systems (RS) are effective tools for mitigating information overload and have
seen extensive applications across various domains. However, the single focus on utility …
seen extensive applications across various domains. However, the single focus on utility …
Please tell me more: Privacy impact of explainability through the lens of membership inference attack
Explainability is increasingly recognized as an enabling technology for the broader adoption
of machine learning (ML), particularly for safety-critical applications. This has given rise to …
of machine learning (ML), particularly for safety-critical applications. This has given rise to …
Deconfounded causal collaborative filtering
Recommender systems may be confounded by various types of confounding factors (also
called confounders) that may lead to inaccurate recommendations and sacrificed …
called confounders) that may lead to inaccurate recommendations and sacrificed …
Causal collaborative filtering
Many of the traditional recommendation algorithms are designed based on the fundamental
idea of mining or learning correlative patterns from data to estimate the user-item correlative …
idea of mining or learning correlative patterns from data to estimate the user-item correlative …
Model extraction attacks revisited
Model extraction (ME) attacks represent one major threat to Machine-Learning-as-a-Service
(MLaaS) platforms by" stealing" the functionality of confidential machine-learning models …
(MLaaS) platforms by" stealing" the functionality of confidential machine-learning models …
Bottrinet: A unified and efficient embedding for social bots detection via metric learning
The rapid and accurate identification of bot accounts in online social networks is an ongoing
challenge. In this paper, we propose BotTriNet, a unified embedding framework that …
challenge. In this paper, we propose BotTriNet, a unified embedding framework that …
Diversifying Sequential Recommendation with Retrospective and Prospective Transformers
Previous studies on sequential recommendation (SR) have predominantly concentrated on
optimizing recommendation accuracy. However, there remains a significant gap in …
optimizing recommendation accuracy. However, there remains a significant gap in …
[HTML][HTML] A survey on recommendation methods based on social relationships
R Chen, K Pang, M Huang, H Liang, S Zhang, L Zhang… - Electronics, 2023 - mdpi.com
With the rapid development of online social networks recently, more and more online users
have participated in social network activities and rich social relationships are formed …
have participated in social network activities and rich social relationships are formed …