From post

You are who you know: inferring user profiles in online social networks

, , , и . Proceedings of the third ACM international conference on Web search and data mining, стр. 251--260. New York, NY, USA, ACM, (2010)
DOI: 10.1145/1718487.1718519

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

I Spy with My Little Eye: Analysis and Detection of Spying Browser Extensions., , , , , и . EuroS&P, стр. 47-61. IEEE, (2018)A First Look at Toxicity Injection Attacks on Open-domain Chatbots., , , , , и . ACSAC, стр. 521-534. ACM, (2023)NoiseScope: Detecting Deepfake Images in a Blind Setting., , , , и . ACSAC, стр. 913-927. ACM, (2020)An Analysis of Recent Advances in Deepfake Image Detection in an Evolving Threat Landscape., , , , , , и . SP, стр. 91-109. IEEE, (2024)You are who you know: inferring user profiles in online social networks, , , и . Proceedings of the third ACM international conference on Web search and data mining, стр. 251--260. New York, NY, USA, ACM, (2010)Poster: Comprehensive Comparisons of Embedding Approaches for Cryptographic API Completion., , , , , и . ICSE-Companion, стр. 360-361. ACM/IEEE, (2022)Throwing Darts in the Dark? Detecting Bots with Limited Data using Neural Data Augmentation., , , , , , и . SP, стр. 1190-1206. IEEE, (2020)Deepfake Text Detection: Limitations and Opportunities., , , , , , , и . SP, стр. 1613-1630. IEEE, (2023)What Happens After You Leak Your Password: Understanding Credential Sharing on Phishing Sites., , , , , и . AsiaCCS, стр. 181-192. ACM, (2019)Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks., , , , , , и . IEEE Symposium on Security and Privacy, стр. 707-723. IEEE, (2019)