Author of the publication

Linking social network accounts by modeling user spatiotemporal habits.

, , , , and . ISI, page 19-24. IEEE, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Video forensics research based on authenticity and integrity., , , , and . ICIA, page 1223-1226. IEEE, (2016)Trusted Auditing of Data Operation Behaviors in Cloud based on Blockchain and TEE., , , , , , and . ISPA/BDCloud/SocialCom/SustainCom, page 447-455. IEEE, (2023)The Categories of Quantum Information Hiding Protocol., , , , , and . ICCCS (1), volume 10602 of Lecture Notes in Computer Science, page 143-152. Springer, (2017)Role Recognition of Illegal Online Gambling Participants Using Monetary Transaction Data., , , , and . ICICS, volume 11149 of Lecture Notes in Computer Science, page 584-597. Springer, (2018)Recognizing roles of online illegal gambling participants: An ensemble learning approach., , , , and . Comput. Secur., (2019)A Method of Traceless File Deletion for NTFS File System., , , , , and . CSS, volume 13547 of Lecture Notes in Computer Science, page 109-117. Springer, (2022)Linking social network accounts by modeling user spatiotemporal habits., , , , and . ISI, page 19-24. IEEE, (2017)Relay network-based cross-chain data interaction protocol with integrity audit., , , , , , and . Comput. Electr. Eng., (2024)Virtual Machine Memory Forensics Method for XenServer Platform., , , , , and . NaNA, page 302-308. IEEE, (2019)A Cross Data Center Access Control Model by Constructing GAS on Blockchain., , , , and . ICPADS, page 312-321. IEEE, (2022)