Research Article

Deep Forest-Based E-Commerce Recommendation Attack Detection Model

Figure 18

Flowchart of the blacklist and whitelist rule.