Author of the publication

Private attribute inference from Facebook's public text metadata: a case study of Korean users.

, , , and . Ind. Manag. Data Syst., 117 (8): 1687-1706 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Eavesdropping of Magnetic Secure Transmission Signals and Its Security Implications for a Mobile Payment Protocol., and . IEEE Access, (2018)A New Proxy Signature Scheme Providing Self-delegation., , , and . ICISC, volume 4296 of Lecture Notes in Computer Science, page 328-342. Springer, (2006)Secure Ordered Bucketization.. IEEE Trans. Dependable Secur. Comput., 11 (3): 292-303 (2014)A new smart smudge attack using CNN., , , , and . Int. J. Inf. Sec., 21 (1): 25-36 (2022)An efficient delegation protocol with delegation traceability in the X.509 proxy certificate environment for computational grids., , , and . Inf. Sci., 178 (14): 2968-2982 (2008)Over 100x Faster Bootstrapping in Fully Homomorphic Encryption through Memory-centric Optimization with GPUs., , , , and . IACR Cryptol. ePrint Arch., (2021)Fully Homomorphic Privacy-Preserving Naive Bayes Machine Learning and Classification., , , , and . WAHC@CCS, page 91-102. ACM, (2023)A new data hiding scheme for binary image authentication with small image distortion., , and . Inf. Sci., 179 (22): 3866-3884 (2009)Energy-Efficient Hosting Rich Content from Mobile Platforms with Relative Proximity Sensing., , and . Sensors, 17 (8): 1828 (2017)Efficient Approach for Mitigating Mobile Phishing Attacks., , , and . IEICE Trans. Commun., 101-B (9): 1982-1996 (2018)