期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
An open dataset of data lineage graphs for data governance research
1
作者 Yunpeng Chen Ying Zhao +3 位作者 Xuanjing Li Jiang Zhang Jiang Long Fangfang Zhou 《Visual Informatics》 EI 2024年第1期1-5,共5页
Data have become valuable assets for enterprises.Data governance aims to manage and reuse data assets,facilitating enterprise management and enabling product innovations.A data lineage graph(DLG)is an abstracted colle... Data have become valuable assets for enterprises.Data governance aims to manage and reuse data assets,facilitating enterprise management and enabling product innovations.A data lineage graph(DLG)is an abstracted collection of data assets and their data lineages in data governance.Analyzing DLGs can provide rich data insights for data governance.However,the progress of data governance technologies is hindered by the shortage of available open datasets for DLGs.This paper introduces an open dataset of DLGs,including the DLG model,the dataset construction process,and applied areas.This real-world dataset is sourced from Huawei Cloud Computing Technology Company Limited,which contains 18 DLGs with three types of data assets and two types of relations.To the best of our knowledge,this dataset is the first open dataset of DLGs for data governance.This dataset can also support the development of other application areas,such as graph analytics and visualization. 展开更多
关键词 data asset data governance data lineage GRAPH Open dataset
原文传递
Preventing Recommendation Attack in Trust-Based Recommender Systems 被引量:1
2
作者 张富国 《Journal of Computer Science & Technology》 SCIE EI CSCD 2011年第5期823-828,共6页
Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional col... Despite its success,similarity-based collaborative filtering suffers from some limitations,such as scalability,sparsity and recommendation attack.Prior work has shown incorporating trust mechanism into traditional collaborative filtering recommender systems can improve these limitations.We argue that trust-based recommender systems are facing novel recommendation attack which is different from the profile injection attacks in traditional recommender system.To the best of our knowledge,there has not any prior study on recommendation attack in a trust-based recommender system.We analyze the attack problem,and find that "victim" nodes play a significant role in the attack.Furthermore,we propose a data provenance method to trace malicious users and identify the "victim" nodes as distrust users of recommender system.Feasibility study of the defend method is done with the dataset crawled from Epinions website. 展开更多
关键词 data lineage "victim" node ATTACK trust propagation
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部