1 code implementation • 21 Aug 2023 • Chengzhi Huang, Hui Li
In shilling attack, an adversarial party injects a number of well-designed fake user profiles into the system to mislead RS so that the attack goal can be achieved.
1 code implementation • 31 Mar 2021 • Aviral Joshi, Chengzhi Huang, Har Simrat Singh
This work focuses on comparing different solutions for machine translation on low resource language pairs, namely, with zero-shot transfer learning and unsupervised machine translation.