Author of the publication

Identifying individual vulnerability based on public data.

, , and . PST, page 119-126. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Visualizing node attribute uncertainty in graphs., , and . Visualization and Data Analysis, volume 7868 of SPIE Proceedings, page 78680H. SPIE, (2011)Generating Association Rules from Semi-Structured Documents Using an Extended Concept Hierarchy., , and . CIKM, page 193-200. ACM, (1997)EWNI: Efficient Anonymization of Vulnerable Individuals in Social Networks., , and . PAKDD (2), volume 7302 of Lecture Notes in Computer Science, page 359-370. Springer, (2012)Information Exposure From Relational Background Knowledge on Social Media., , and . DSAA, page 282-291. IEEE, (2020)Query Operators for Comparing Uncertain Graphs., , and . Trans. Large Scale Data Knowl. Centered Syst., (2015)Modeling Social Preferences Based on Social Interactions., and . Encyclopedia of Social Network Analysis and Mining, (2014)A Robust System Architecture for Mining Semi-Structured Data., , , , and . KDD, page 329-333. AAAI Press, (1998)Modeling Social Preferences Based on Social Interactions., and . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Combining vs. Transferring Knowledge: Investigating Strategies for Improving Demographic Inference in Low Resource Settings., and . WSDM, page 868-876. ACM, (2023)Understanding evolving group structures in time-varying networks., , , , and . ASONAM, page 142-148. ACM, (2013)