Searched for: contributor%3A%22Isufi%2C+E.+%28mentor%29%22
(1 - 4 of 4)
document
de Bruijn, Vasco (author)
In cyber security, side-channel attacks (SCA) are of interest because they target the vulnerabilities in implementation rather than inherent vulnerabilities in the algorithm. Profiled SCA is especially interesting as it assumes that the adversary has unlimited access to a clone device that can generate sufficient traces to create a profile of...
master thesis 2021
document
Pocchiari, M. (author)
Recommender Systems assist the user by suggesting items to be consumed based on the user's history. The topic of diversity in recommendation gained momentum in recent years as additional criterion besides recommendation accuracy, to improve user satisfaction. Accuracy and diversity in recommender systems coexist in a delicate trade-off due to...
master thesis 2020
document
Sipko, Tomas (author)
The world is generating more and more network data in many different areas (e.g., sensor networks, social networks and even text). A unique characteristic of these data is the coupling between data values and underlying irregular structure on which these values are defined. Thus, researchers developed Graph Neural Networks (GNNs) to use deep...
master thesis 2020
document
Yang, Maosheng (author)
This thesis consists of two parts in both data science and signal processing over graphs. In the first part of this thesis, we aim to solve the problem of graph construction in big data scenario, which is critical for practical tasks, like collaborative filtering in recommender systems, spectral embedding or clustering in learning algorithms. We...
master thesis 2020
Searched for: contributor%3A%22Isufi%2C+E.+%28mentor%29%22
(1 - 4 of 4)