Detecting and Quantifying Malicious Activity with Simulation-based Inference
Gambardella, Andrew, State, Bogdan, Khan, Naeemullah, Tsourides, Leo, Torr, Philip H. S., Baydin, Atılım Güneş
Probabilistic programming provides numerous advantages Ideally speaking, a good recommendations system should be over other techniques, including but not able to identify and remove malicious users before they can limited to providing a disentangled representation disrupt the ranking system by a significant margin. However, of how malicious users acted under a structured to eliminate the risk of false positives a resilient ranking model, as well as allowing for the quantification system can use as much data as possible. So we have to of damage caused by malicious users. We show adjust the tradeoff between false positives and the damage a experiments in malicious user identification using set of malicious users can cause to a ranking system.
Oct-7-2021
- Country:
- North America
- Canada (0.14)
- United States (0.14)
- North America
- Genre:
- Research Report (0.64)
- Industry:
- Government (0.93)
- Information Technology > Security & Privacy (0.93)
- Media (1.00)
- Technology: