Author of the publication

Threatening Privacy across Social Graphs: A Structural Features Approach.

, , , , and . ICDM Workshops, page 554-561. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Using Data Mining to Combat Infrastructure Inefficiencies: The Case of Predicting Nonpayment for Ethiopian Telecom., , , and . AAAI Spring Symposium: Artificial Intelligence for Development, AAAI, (2010)Addressing Selection Bias in Event Studies with General-Purpose Social Media Panels., , and . ACM J. Data Inf. Qual., 10 (1): 4:1-4:24 (2018)Identifying potential adverse effects using the web: A new approach to medical hypothesis generation., , , , , , , and . J. Biomed. Informatics, 44 (6): 989-996 (2011)Social TV: real-time social media response to TV advertising., , and . AdKDD@KDD, page 4:1-4:9. ACM, (2012)Using Search Queries to Understand Health Information Needs in Africa., , , , and . CoRR, (2018)Mining Road Traffic Accident Data to Improve Safety: Role of Road-Related Factors on Accident Severity in Ethiopia., and . AAAI Spring Symposium: Artificial Intelligence for Development, AAAI, (2010)Learning and Inference in Massive Social Networks., , and . MLG, (2007)A system for de-identifying medical message board text., , , , , , and . BMC Bioinform., 12 (S-3): S2 (2011)Expert Stock Picker: The Wisdom of (Experts in) Crowds., and . Int. J. Electron. Commer., 15 (3): 73-102 (2011)TV's Dirty Little Secret: The Negative Effect of Popular TV on Online Auction Sales., , and . MIS Q., 40 (3): 623-644 (2016)