Author of the publication

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing.

, , , , , and . IEEE Trans. Inf. Forensics Secur., 13 (5): 1317-1332 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs., , , , , and . IEEE Trans. Mob. Comput., 16 (5): 1357-1370 (2017)MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization., , and . SSDBM, page 35:1-35:6. ACM, (2017)High-Assurance Integrity Techniques for Databases., , , and . BNCOD, volume 5071 of Lecture Notes in Computer Science, page 244-256. Springer, (2008)Location Privacy Policy Management System., , and . ICICS, volume 7618 of Lecture Notes in Computer Science, page 427-434. Springer, (2012)Faster FAST: multicore acceleration of streaming financial data., , , , , , and . Comput. Sci. Res. Dev., 23 (3-4): 249-257 (2009)Dynamics of fitness sharing evolutionary algorithms for coevolution of multiple species., , and . Appl. Soft Comput., 10 (3): 832-848 (2010)A fast steady-state ε-dominance multi-objective evolutionary algorithm., , and . Comput. Optim. Appl., 48 (1): 109-138 (2011)Effective social-context based message delivery using ChitChat in sparse delay tolerant networks., , and . Distributed Parallel Databases, 38 (2): 401-438 (2020)IFIM: a database of integrated fitness information for microbial genes., , , , , and . Database J. Biol. Databases Curation, (2014)A Security Enhanced AODV Routing Protocol., , , and . MSN, volume 3794 of Lecture Notes in Computer Science, page 298-307. Springer, (2005)