From post

Faking Sandy: characterizing and identifying fake images on Twitter during Hurricane Sandy.

, , , и . WWW (Companion Volume), стр. 729-736. International World Wide Web Conferences Steering Committee / ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Marlin: Mitigating Code Reuse Attacks Using Code Randomization., , , и . IEEE Trans. Dependable Secur. Comput., 12 (3): 326-337 (2015)Characterizing Pedophile Conversations on the Internet using Online Grooming, , и . CoRR, (2012)A secure architecture design based on application isolation, code minimization and randomization., , и . CNS, стр. 423-429. IEEE, (2013)The khmer software package: enabling efficient nucleotide sequence analysis., , , , , , , , , и 51 other автор(ы). F1000Research, (2015)Marlin: making it harder to fish for gadgets., , , и . CCS, стр. 1016-1018. ACM, (2012)Misinformation in Social Networks: Analyzing Twitter During Crisis Events., и . Encyclopedia of Social Network Analysis and Mining. 2nd Ed., Springer, (2018)Machine learning for modeling the progression of Alzheimer disease dementia using clinical data: a systematic literature review., , , , , и . CoRR, (2021)A formal proximity model for RBAC systems., , и . CollaborateCom, стр. 1-10. ICST / IEEE, (2012)Semantic approach to automating management of big data privacy policies., , , , , и . IEEE BigData, стр. 482-491. IEEE Computer Society, (2016)Beyond Wrangling and Modeling: Data Science and Machine Learning Competencies and Curricula for The Rest of Us., , , и . AMIA, AMIA, (2022)