From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Instagram Data Donation: A Case Study on Collecting Ecologically Valid Social Media Data for the Purpose of Adolescent Online Risk Detection., , , , , , , и . CHI Extended Abstracts, стр. 39:1-39:9. ACM, (2022)Disinformation Warfare: Understanding State-Sponsored Trolls on Twitter and Their Influence on the Web., , , , , и . WWW (Companion Volume), стр. 218-226. ACM, (2019)Detecting Aggressors and Bullies on Twitter., , , , , и . WWW (Companion Volume), стр. 767-768. ACM, (2017)What's in a Name?: Understanding Profile Name Reuse on Twitter., , , , , , и . WWW, стр. 1161-1170. ACM, (2017)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , и . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)Automatically Dismantling Online Dating Fraud., , , , , и . CoRR, (2019)Eight Years of Rider Measurement in the Android Malware Ecosystem., и . IEEE Trans. Dependable Secur. Comput., 19 (1): 107-118 (2022)Understanding Worldwide Private Information Collection on Android., , и . NDSS, The Internet Society, (2021)To Err.Is Human: Characterizing the Threat of Unintended URLs in Social Media., , , , и . NDSS, The Internet Society, (2021)MaMaDroid: Detecting Android Malware by Building Markov Chains of Behavioral Models., , , , , и . NDSS, The Internet Society, (2017)