From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

If you are not paying for it, you are the product: how much do advertisers pay to reach you?, , , и . Internet Measurement Conference, стр. 142-156. ACM, (2017)The Minimum Wiener Connector., , , , и . CoRR, (2015)Stock trade volume prediction with Yahoo Finance user browsing behavior., , , и . ICDE, стр. 1168-1173. IEEE Computer Society, (2014)A longitudinal study of the top 1% toxic Twitter profiles., , , , , и . WebSci, стр. 292-303. ACM, (2023)YouTubing at Home: Media Sharing Behavior Change as Proxy for Mobility Around COVID-19 Lockdowns., и . WebSci, стр. 272-281. ACM, (2021)Detecting Cyberbullying and Cyberaggression in Social Media., , , , , , и . ACM Trans. Web, 13 (3): 17:1-17:51 (2019)A survey on privacy for B5G/6G: New privacy challenges, and research directions., , , , и . J. Ind. Inf. Integr., (2022)Disturbed YouTube for Kids: Characterizing and Detecting Inappropriate Videos Targeting Young Children., , , , , , , и . ICWSM, стр. 522-533. AAAI Press, (2020)Detecting Aggressors and Bullies on Twitter., , , , , и . WWW (Companion Volume), стр. 767-768. ACM, (2017)Inferring peer centrality in socially-informed peer-to-peer systems., и . Peer-to-Peer Computing, стр. 318-327. IEEE, (2011)