From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Communication-efficient private distance calculation based on oblivious transfer extensions., , , и . Comput. Secur., (2019)ADORE: Aspect Dependent Online REview Labeling for Review Generation., , , и . SIGIR, стр. 1021-1030. ACM, (2020)Social Factors in Closed-Network Content Consumption., , , и . CIKM, стр. 595-604. ACM, (2020)TOmCAT: Target-Oriented Crowd Review Attacks and Countermeasures., , и . ICWSM, стр. 302-312. AAAI Press, (2019)A Large-Scale Study of ISIS Social Media Strategy: Community Size, Collective Influence, and Behavioral Impact., , , и . ICWSM, стр. 58-67. AAAI Press, (2019)Toward an Insider Threat Detection Framework Using Honey Permissions., и . J. Internet Serv. Inf. Secur., 5 (3): 19-36 (2015)Behavioral Analysis of Review Fraud: Linking Malicious Crowdsourcing to Amazon and Beyond., , и . ICWSM, стр. 560-563. AAAI Press, (2017)Organizational Artifacts of Code Development., , и . CoRR, (2021)Wide-Ranging Review Manipulation Attacks: Model, Empirical Study, and Countermeasures., , и . CIKM, стр. 981-990. ACM, (2019)Combating Crowdsourced Review Manipulators: A Neighborhood-Based Approach., , и . WSDM, стр. 306-314. ACM, (2018)