Author of the publication

ChurnVis: visualizing mobile telecommunications churn on a social network with attributes.

, , and . ASONAM, page 894-901. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

New results on robustness of secure steganography., , , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 6072 of SPIE Proceedings, page 60720U. SPIE, (2006)Performance evaluation of blind steganalysis classifiers., , and . Security, Steganography, and Watermarking of Multimedia Contents, volume 5306 of Proceedings of SPIE, page 58-69. SPIE, (2004)A framework for soft hashing and its application to robust image hashing., , , and . ICIP, page 397-400. IEEE, (2004)A Soft Affiliation Graph Model for Scalable Overlapping Community Detection., , and . ECML/PKDD (1), volume 11906 of Lecture Notes in Computer Science, page 507-523. Springer, (2019)Using Model-based Overlapping Seed Expansion to detect highly overlapping community structure, and . CoRR, (2010)Markov Modelling of Fingerprinting Systems for Collision Analysis., , and . EURASIP J. Information Security, (2008)Application of side-informed embedding and polynomial detection to audio watermarking., , , and . ICME, page 605-608. IEEE Computer Society, (2003)Posterior Regularisation on Bayesian Hierarchical Mixture Clustering., , , and . CoRR, (2021)Diffusion in Networks with Overlapping Community Structure., and . ICDM Workshops, page 969-978. IEEE Computer Society, (2011)Evaluation of Hierarchical Clustering via Markov Decision Processes for Efficient Navigation and Search., , , , and . CLEF, volume 10456 of Lecture Notes in Computer Science, page 125-131. Springer, (2017)