Author of the publication

UCreDiSSiT: User Credibility Measurement incorporating Domain interest, Semantics in Social interactions, and Temporal factor.

, , , , and . PST, page 1-11. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multiagent Systems Development Kits: An Evaluation, , and . CNSR 2003 Communication Networks & Services Research, (2003)QKeyShield: A Practical Receiver-Device-Independent Entanglement-Swapping-Based Quantum Key Distribution., , and . IEEE Access, (2022)Are You a Cyborg, Bot or Human? - A Survey on Detecting Fake News Spreaders., , , , , and . IEEE Access, (2022)Multimodal Fake News Analysis Based on Image-Text Similarity., , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 959-972 (February 2024)Social Alignment Contagion in Online Social Networks., , , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (1): 399-417 (February 2024)Transferability of Machine Learning Algorithm for IoT Device Profiling and Identification., , , , , , and . IEEE Internet Things J., 11 (2): 2322-2335 (January 2024)Secure and Efficient Probabilistic Skyline Computation for Worker Selection in MCS., , , , and . IEEE Internet Things J., 7 (12): 11524-11535 (2020)The analysis and management of non-canonical requirement specifications through a belief integration game., and . Knowl. Inf. Syst., 22 (1): 27-64 (2010)A Rule-based Temporal Alert Correlation System., and . Int. J. Netw. Secur., 5 (1): 66-72 (2007)Toward Credible Evaluation of Anomaly-Based Intrusion-Detection Methods., , and . IEEE Trans. Syst. Man Cybern. Part C, 40 (5): 516-524 (2010)