Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling online social network users' profile attribute disclosure behavior from a game theoretic perspective., , , and . Comput. Commun., (2014)Summarizing consumer reviews., , and . J. Intell. Inf. Syst., 59 (1): 193-212 (2022)Mapping of Subtidal and Intertidal Seagrass Meadows via Application of the Feature Pyramid Network to Unmanned Aerial Vehicle Orthophotos., and . Remote. Sens., 13 (23): 4880 (2021)Modeling Follow-Unfollow Mechanism in Social Networks with Evolutionary Game., , , and . ICA, page 37-40. IEEE, (2021)Continuous Authentication Using Creative Writing., , , , , and . ISNCC, page 1-6. IEEE, (2020)Deep learning for multi-label classification of coral conditions in the Indo-Pacific via underwater photogrammetry., , , , , , and . CoRR, (2024)An Enhanced Architecture for Serial Fusion based Multi-biometric Verification System., , and . ISNCC, page 1-6. IEEE, (2018)A Game Theoretic Analysis of the Twitter Follow-Unfollow Mechanism., , , and . GameSec, volume 11199 of Lecture Notes in Computer Science, page 265-276. Springer, (2018)Modeling privacy settings of an online social network from a game-theoretical perspective., , , and . CollaborateCom, page 213-220. ICST / IEEE, (2013)A Game Theoretic Approach for Modeling Privacy Settings of an Online Social Network., , , and . EAI Endorsed Trans. Collab. Comput., 1 (1): e4 (2014)