no code implementations • 6 Oct 2021 • Andrew Gambardella, Bogdan State, Naeemullah Khan, Leo Tsourides, Philip H. S. Torr, Atılım Güneş Baydin
We propose the use of probabilistic programming techniques to tackle the malicious user identification problem in a recommendation algorithm.