Author of the publication

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.

, , , , , and . WISE (2), volume 10570 of Lecture Notes in Computer Science, page 528-539. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending Adversarial Attacks via Semantic Feature Manipulation., , , , , and . CoRR, (2020)Information Security Policies for Governmental Organisations, The Minimum Criteria., and . ISSA, page 455-466. ISSA, Pretoria, South Africa, (2009)Common problems faced during the establishment of a CSIRT., and . ISSA, ISSA, Pretoria, South Africa, (2010)ACSIMA: A Cyber Security Index for Mobile Health Apps., , , and . ASE Workshops, page 145-152. IEEE, (2021)PART-GAN: Privacy-Preserving Time-Series Sharing., , , , and . ICANN (1), volume 12396 of Lecture Notes in Computer Science, page 578-593. Springer, (2020)OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning., , , , , and . IJCNN, page 1-8. IEEE, (2020)Demystifying the Evolution of Android Malware Variants., , , , , and . IEEE Trans. Dependable Secur. Comput., 21 (4): 3324-3341 (July 2024)"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices., , , , , and . Interact. Comput., 33 (5): 481-498 (2021)Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?, , , , , and . CoRR, (2024)Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media., , , , , and . IEEE Access, (2019)