Avoiding monotony: improving the diversity of recommendation lists M Zhang, N Hurley Proceedings of the 2008 ACM conference on Recommender systems, 123-130, 2008 | 636 | 2008 |
Collaborative recommendation: A robustness analysis M O'Mahony, N Hurley, N Kushmerick, G Silvestre ACM Transactions on Internet Technology (TOIT) 4 (4), 344-377, 2004 | 524 | 2004 |
Novelty and diversity in recommender systems P Castells, N Hurley, S Vargas Recommender systems handbook, 603-646, 2021 | 456 | 2021 |
Detecting highly overlapping community structure by greedy clique expansion C Lee, F Reid, A McDaid, N Hurley arXiv preprint arXiv:1002.1827, 2010 | 437 | 2010 |
Novelty and diversity in top-n recommendation--analysis and evaluation N Hurley, M Zhang ACM Transactions on Internet Technology (TOIT) 10 (4), 1-30, 2011 | 399 | 2011 |
Normalized mutual information to evaluate overlapping community finding algorithms AF McDaid, D Greene, N Hurley arXiv preprint arXiv:1110.2515, 2011 | 359 | 2011 |
Fedfast: Going beyond average for faster training of federated recommender systems K Muhammad, Q Wang, D O'Reilly-Morgan, E Tragos, B Smyth, N Hurley, ... Proceedings of the 26th ACM SIGKDD international conference on knowledge …, 2020 | 214 | 2020 |
Detecting highly overlapping communities with model-based overlapping seed expansion A McDaid, N Hurley 2010 international conference on advances in social networks analysis and …, 2010 | 178 | 2010 |
Detecting noise in recommender system databases MP O'Mahony, NJ Hurley, GCM Silvestre Proceedings of the 11th international conference on Intelligent user …, 2006 | 174 | 2006 |
Statistical attack detection N Hurley, Z Cheng, M Zhang Proceedings of the third ACM conference on Recommender systems, 149-156, 2009 | 171 | 2009 |
Robust collaborative recommendation R Burke, MP O’Mahony, NJ Hurley Recommender systems handbook, 961-995, 2015 | 167 | 2015 |
Recommender systems: Attack types and strategies MP O'Mahony, NJ Hurley, GCM Silvestre AAAI, 334-339, 2005 | 160 | 2005 |
Promoting recommendations: An attack on collaborative filtering MP O’Mahony, NJ Hurley, GCM Silvestre Database and Expert Systems Applications: 13th International Conference …, 2002 | 147 | 2002 |
Improved Bayesian inference for the stochastic block model with application to large networks AF McDaid, TB Murphy, N Friel, NJ Hurley Computational Statistics & Data Analysis 60, 12-31, 2013 | 100 | 2013 |
Novel item recommendation by user profile partitioning M Zhang, N Hurley 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and …, 2009 | 88 | 2009 |
Method of generating partial differential equations for simulation, simulation method, and method of generating simulation programs N Sagawa, D Finn, N Hurley US Patent 5,408,638, 1995 | 84 | 1995 |
Effective diverse and obfuscated attacks on model-based recommender systems Z Cheng, N Hurley Proceedings of the third ACM conference on Recommender systems, 141-148, 2009 | 66 | 2009 |
Exploring temporal ego networks using small multiples and tree-ring layouts M Farrugia, N Hurley, A Quigley Proc. ACHI 2011, 23-28, 2011 | 62 | 2011 |
Securing Java through software watermarking. D Curran, NJ Hurley, MÓ Cinnéide PPPJ 3, 145-148, 2003 | 60 | 2003 |
ThemeCrowds: Multiresolution summaries of twitter usage D Archambault, D Greene, P Cunningham, N Hurley Proceedings of the 3rd international workshop on Search and mining user …, 2011 | 57 | 2011 |