Security and Communication Networks / 2019 / Article / Alg 3

Research Article

Detecting Shilling Attacks with Automatic Features from Multiple Views

Algorithm 3

Detection.

Input: DRtrain, DRtest, SDAEopts, Lcrate, UcrateSetmd, Setfs, Setas
Output: Ylabels
1for  i=Lcrate to Ucrate do
2Featraini=FeaExtra(Setmd, Setfs, Setas, DRtrain,i)
3Feateseti=FeaExtra(Setmd, Setfs, Setas, DRtest,i)
4Ylabel(i)=fSVM(Feataini,DRtrain,DRtest)
5end for
6Ylabels=voteLabel(Ylabel)
7Return  Ylabels

We are committed to sharing findings related to COVID-19 as quickly and safely as possible. Any author submitting a COVID-19 paper should notify us at help@hindawi.com to ensure their research is fast-tracked and made available on a preprint server as soon as possible. We will be providing unlimited waivers of publication charges for accepted articles related to COVID-19. Sign up here as a reviewer to help fast-track new submissions.