Author of the publication

Detecting in-situ identity fraud on social network services: a case study on facebook.

, , , , and . WWW (Companion Volume), page 401-402. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Low-Overhead and Stable Data Transmission between Channel-Hopping Cognitive Radios., , and . IEEE Trans. Mob. Comput., 16 (9): 2574-2587 (2017)An Asymmetric and Asynchronous Energy Conservation Protocol for Vehicular Networks., , and . IEEE Trans. Mob. Comput., 9 (1): 98-111 (2010)Learning the Consistent Behavior of Common Users for Target Node Prediction across Social Networks., , , and . ICML, volume 32 of JMLR Workshop and Conference Proceedings, page 298-306. JMLR.org, (2014)Non-Linear Cross-Domain Collaborative Filtering via Hyper-Structure Transfer., , and . ICML, volume 37 of JMLR Workshop and Conference Proceedings, page 1190-1198. JMLR.org, (2015)Adaptive k-coverage contour evaluation and deployment in wireless sensor networks., , , and . ACM Trans. Sens. Networks, 9 (4): 40:1-40:31 (2013)Optimally Adaptive Power-Saving Protocols for Ad Hoc Networks Using the Hyper Quorum System., , and . IEEE/ACM Trans. Netw., 22 (1): 1-15 (2014)On Generalizable Low False-Positive Learning Using Asymmetric Support Vector Machines., , , , and . IEEE Trans. Knowl. Data Eng., 25 (5): 1083-1096 (2013)Rendezvous for heterogeneous spectrum-agile devices., , , and . INFOCOM, page 2247-2255. IEEE, (2014)Adversarial Robustness via Runtime Masking and Cleansing., , and . ICML, volume 119 of Proceedings of Machine Learning Research, page 10399-10409. PMLR, (2020)Adversarial Pixel Masking: A Defense against Physical Attacks for Pre-trained Object Detectors., , and . ACM Multimedia, page 1856-1865. ACM, (2021)