Author of the publication

Helping Users Tackle Algorithmic Threats on Social Media: A Multimedia Research Agenda.

, , , and . ACM Multimedia, page 4425-4434. ACM, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Human Perception of Visual Realism for Photo and Computer-Generated Face Images., , , , , and . ACM Trans. Appl. Percept., 11 (2): 7:1-7:21 (2014)A Comprehensive Picture of Factors Affecting User Willingness to Use Mobile Health Applications., , and . ACM Trans. Comput. Heal., 5 (1): 2:1-2:31 (January 2024)Automatic Thresholding of Micro-CT Trabecular Bone Images., , , , and . BMEI (2), page 23-27. IEEE Computer Society, (2008)978-0-7695-3118-2.Trust-Based Fuzzy Access Control Model Research., , , and . WISM, volume 5854 of Lecture Notes in Computer Science, page 393-399. Springer, (2009)Compute to Tell the Tale: Goal-Driven Narrative Generation., , , , , , , , , and . ACM Multimedia, page 6875-6882. ACM, (2022)Human Attributes Prediction under Privacy-preserving Conditions., , and . ACM Multimedia, page 4698-4706. ACM, (2021)An m-Business Model Based on Session Initiation Protocol., , , , and . ISECS, page 250-253. IEEE Computer Society, (2008)An Optimized Scheme for Mobile Learning on IP-Based Network Using SIP., , , and . ICWL, volume 5145 of Lecture Notes in Computer Science, page 541-551. Springer, (2008)Combating Misinformation in the Era of Generative AI Models., , and . ACM Multimedia, page 9291-9298. ACM, (2023)Real or Fake?: human judgments about photographs and computer-generated images of faces., , , , and . SIGGRAPH Asia Technical Briefs, page 17:1-17:4. ACM, (2012)