Author of the publication

Invited Paper: A Model of Paradoxical Privacy Behavior in Online Users.

, , and . CIC, page 206-211. IEEE Computer Society, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Topological Structure is Predictive of Deep Neural Network Success in Learning., , and . CoRR, (2023)A cellular automata model can quickly approximate UDP and TCP network traffic., , and . Complex., 9 (3): 32-40 (2004)Unsupervised Machine Learning of Open Source Russian Twitter Data Reveals Global Scope and Operational Characteristics., and . CoRR, (2018)Zero knowledge hidden Markov model inference., , , and . Pattern Recognit. Lett., 30 (14): 1273-1280 (2009)Modeling Longitudinal Behavior Dynamics Among Extremist Users in Twitter Data., , , and . IEEE BigData, page 4906-4914. IEEE, (2021)Identification and characterization of cyberbullying dynamics in an online social network., , , and . ASONAM, page 280-285. ACM, (2015)Behavior in a shared resource game with cooperative, greedy, and vigilante players., and . CISS, page 1-6. IEEE, (2014)Roaming charges for customers of cellular-wireless entrant providers., , , and . INFOCOM Workshops, page 1-5. IEEE, (2015)Toward a Game Theoretic Model of Information Release in Social Media with Experimental Results., and . IEEE Symposium on Security and Privacy Workshops, page 113-116. IEEE Computer Society, (2012)Deriving an optimally deceptive policy in two-player iterated games., , and . ACC, page 3808-3813. IEEE, (2016)