default search action
Georgios Pitsilis
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [i8]Georgios K. Pitsilis:
Improved two-stage hate speech classification for twitter based on Deep Neural Networks. CoRR abs/2206.04162 (2022)
2010 – 2019
- 2019
- [i7]Georgios K. Pitsilis, Heri Ramampiaro, Helge Langseth:
Securing Tag-based recommender systems against profile injection attacks: A comparative study. (Extended Report). CoRR abs/1901.08422 (2019) - 2018
- [j6]Georgios K. Pitsilis, Heri Ramampiaro, Helge Langseth:
Effective hate-speech detection in Twitter data using recurrent neural networks. Appl. Intell. 48(12): 4730-4742 (2018) - [j5]Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang:
Abstracting massive data for lightweight intrusion detection in computer networks. Inf. Sci. 433-434: 417-430 (2018) - [i6]Georgios K. Pitsilis, Heri Ramampiaro, Helge Langseth:
Detecting Offensive Language in Tweets Using Deep Learning. CoRR abs/1801.04433 (2018) - [i5]Georgios Pitsilis, Heri Ramampiaro, Helge Langseth:
Securing Tag-based recommender systems against profile injection attacks: A comparative study. CoRR abs/1808.10550 (2018) - 2016
- [i4]Georgios K. Pitsilis, Mohamed El-Hadedy:
Posting with credibility in Micro-blogging systems using Digital Signatures and Watermarks: A case study on Twitter. CoRR abs/1612.09480 (2016) - 2015
- [j4]Georgios Pitsilis, Wei Wang:
Harnessing the power of social bookmarking for improving tag-based recommendations. Comput. Hum. Behav. 50: 239-251 (2015) - 2014
- [i3]Georgios Pitsilis, Wei Wang:
Harnessing the power of Social Bookmarking for improving tag-based Recommendations. CoRR abs/1410.5072 (2014) - 2013
- [j3]Xiangliang Zhang, Tak Man Desmond Lee, Georgios Pitsilis:
Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering. J. Comput. Sci. Technol. 28(4): 616-624 (2013) - [i2]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. CoRR abs/1309.7640 (2013) - 2012
- [i1]Georgios Pitsilis, Svein J. Knapskog:
Social Trust as a solution to address sparsity-inherent problems of Recommender systems. CoRR abs/1208.1004 (2012) - 2011
- [j2]Pern Hui Chia, Georgios Pitsilis:
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com. Inf. Media Technol. 6(3): 871-883 (2011) - [j1]Pern Hui Chia, Georgios Pitsilis:
Exploring the Use of Explicit Trust Links for Filtering Recommenders: A Study on Epinions.com. J. Inf. Process. 19: 332-344 (2011) - [c11]Mohamed El-Hadedy, Georgios Pitsilis, Svein J. Knapskog:
An Efficient Authorship Protection Scheme for Shared Multimedia Content. ICIG 2011: 914-919 - [c10]Georgios Pitsilis, Xiangliang Zhang, Wei Wang:
Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information. IFIPTM 2011: 82-97 - 2010
- [c9]Wei Wang, Xiangliang Zhang, Georgios Pitsilis:
Abstracting Audit Data for Lightweight Intrusion Detection. ICISS 2010: 201-215 - [c8]Georgios Pitsilis, Pern Hui Chia:
Does Trust Matter for User Preferences? A Study on Epinions Ratings. IFIPTM 2010: 232-247
2000 – 2009
- 2009
- [c7]Georgios Pitsilis:
Trust-Enhanced Recommender Systems for Efficient On-Line Collaboration. IFIPTM 2009: 30-46 - 2008
- [c6]Georgios Pitsilis, Lindsay F. Marshall:
Modeling Trust for Recommender Systems using Similarity Metrics. IFIPTM 2008: 103-118 - 2007
- [b1]Georgios K. Pitsilis:
Choosing reputable resources in unstructured peer-to-peer networks using trust overlays. University of Newcastle Upon Tyne, UK, 2007 - 2006
- [c5]Georgios Pitsilis, Lindsay F. Marshall:
A Trust-enabled P2P Recommender System. WETICE 2006: 59-64 - [c4]Georgios Pitsilis, Panayiotis Periorellis:
Exploiting the TTL Rule in Unstructured Peer-to-Peer Networks. WETICE 2006: 79-86 - 2005
- [c3]Georgios Pitsilis, Lindsay F. Marshall:
Trust as a Key to Improving Recommendation Systems. iTrust 2005: 210-223 - 2004
- [c2]Georgios Pitsilis, Panayiotis Periorellis, Lindsay F. Marshall:
A Policy for Electing Super-Nodes in Unstructured P2P Networks. AP2PC 2004: 54-61 - 2003
- [c1]Georgios Pitsilis:
Choosing Reputable Resources in Atomistic Peer-to-Peer Environments. OTM Workshops 2003: 1031-1035
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-02 01:01 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint