Author of the publication

Using Stereotypes to Identify Risky Transactions in Internet Auctions.

, , , , and . SocialCom/PASSAT, page 513-520. IEEE Computer Society, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multifaceted Simultaneous Load Balancing in DHT-Based P2P Systems: A New Game with Old Balls and Bins., , and . Self-star Properties in Complex Information Systems, volume 3460 of Lecture Notes in Computer Science, page 373-391. Springer, (2005)StereoTrust: a group based personalized trust model., , , and . CIKM, page 7-16. ACM, (2009)On unlinkability and denial of service attacks resilience of whistleblower platforms., , and . Future Gener. Comput. Syst., (2021)Self-Repairing Codes for Distributed Storage - A Projective Geometric Construction, and . CoRR, (2011)A generic trust framework for large-scale open systems using machine learning, , and . CoRR, (2011)On Visualizing Heterogeneous Semantic Networks from Multiple Data Sources., , , , and . ICADL, volume 5362 of Lecture Notes in Computer Science, page 266-275. Springer, (2008)Perspectives of Global and Hong Kong's Media on China's Belt and Road Initiative., and . CoRR, (2023)eCIL-MU: Embedding based Class Incremental Learning and Machine Unlearning., , , , and . CoRR, (2024)The Zen of Multidisciplinary Team Recommendation, , and . CoRR, (2013)Structured overlay for heterogeneous environments: Design and evaluation of oscar., , and . ACM Trans. Auton. Adapt. Syst., 5 (1): 2:1-2:25 (2010)