Cited By
View all- Cinaglia P(2024)PyMulSim: a method for computing node similarities between multilayer networks via graph isomorphism networksBMC Bioinformatics10.1186/s12859-024-05830-625:1Online publication date: 13-Jun-2024
- Nguyen TQuoc Viet hung NNguyen THuynh TNguyen TWeidlich MYin H(2024)Manipulating Recommender Systems: A Survey of Poisoning Attacks and CountermeasuresACM Computing Surveys10.1145/367732857:1(1-39)Online publication date: 7-Oct-2024
- Weintraub BKim JTao RNita-Rotaru COkhravi HTian DUjcich BLuo BLiao XXu JKirda ELie D(2024)Exploiting Temporal Vulnerabilities for Unauthorized Access in Intent-based NetworkingProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670301(3630-3644)Online publication date: 2-Dec-2024
- Show More Cited By