Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Communication-efficient private distance calculation based on oblivious transfer extensions., , , and . Comput. Secur., (2019)ADORE: Aspect Dependent Online REview Labeling for Review Generation., , , and . SIGIR, page 1021-1030. ACM, (2020)Social Factors in Closed-Network Content Consumption., , , and . CIKM, page 595-604. ACM, (2020)TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures., , and . ICWSM, page 302-312. AAAI Press, (2019)A Large-Scale Study of ISIS Social Media Strategy: Community Size, Collective Influence, and Behavioral Impact., , , and . ICWSM, page 58-67. AAAI Press, (2019)Behavioral Analysis of Review Fraud: Linking Malicious Crowdsourcing to Amazon and Beyond., , and . ICWSM, page 560-563. AAAI Press, (2017)Toward an Insider Threat Detection Framework Using Honey Permissions., and . J. Internet Serv. Inf. Secur., 5 (3): 19-36 (2015)Organizational Artifacts of Code Development., , and . CoRR, (2021)Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures., , and . CIKM, page 981-990. ACM, (2019)Privacy issues in intrusion detection systems: A taxonomy, survey and future directions., , and . Comput. Sci. Rev., (2017)