1. Ai, X., Chen, H., Lin, K., Wang, Z., Yu, J.: Nowhere to hide: efficiently identifying probabilistic cloning attacks in Large-Scale RFID systems. IEEE Transactions on Information Forensics and Security 16, 714–727 (2021)
2. Altulyan, M., Yao, L., Wang, X., Huang, C., Kanhere, S.S., Sheng, Q.Z.: Recommender Systems for the Internet of Things: A Survey. arXiv:2007.06758
3. Asabere, N.Y., Xia, F., Wang, W., Rodrigues, J.J., Basso, F., Ma, J.: Improving smart conference participation through Socially-Aware recommendation. IEEE Trans. Human-Machine Syst. 44(5), 689–700 (2014)
4. Abu-El-Haija, S., Kothari, N., Lee, J., Natsev, P., Toderici, G., Varadarajan, B., Vijayanarasimhan, S: YouTube-8M:, A Large-Scale Video Classification Benchmark. arXiv:1609.08675
5. Aggarwal, C.C., Zhai, C.: A survey of text classification algorithms. Mining Text Data, pp. 163–222 (2012)