Author of the publication

Location sharing privacy preference: analysis and personalized recommendation.

, , and . IUI, page 189-198. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Traitor Tracing without A Priori Bound on the Coalition Size., and . ISC, volume 5735 of Lecture Notes in Computer Science, page 234-241. Springer, (2009)Exploring online social activities for adaptive search personalization., and . CIKM, page 999-1008. ACM, (2010)Protecting Your Children from Inappropriate Content in Mobile Apps: An Automatic Maturity Rating Framework., , , , and . CIKM, page 1111-1120. ACM, (2015)An Information-Theoretic Approach to Individual Sequential Data Sanitization., , and . WSDM, page 337-346. ACM, (2016)A Deep Reinforcement Learning Based Multi-Step Coarse to Fine Question Answering (MSCQA) System., and . AAAI, page 7224-7232. AAAI Press, (2019)Traitor Tracing for Subscription-Based Systems., , and . SECRYPT, page 223-228. INSTICC Press, (2006)Privacy-CNH: A Framework to Detect Photo Privacy with Convolutional Neural Network using Hierarchical Features., , , and . AAAI, page 1317-1323. AAAI Press, (2016)Privacy-Preserving Personalized Recommendation: An Instance-Based Approach via Differential Privacy., and . ICDM, page 540-549. IEEE Computer Society, (2014)Hybrid Traitor Tracing., and . ICME, page 1329-1332. IEEE Computer Society, (2006)Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization., , , , , and . ACM Trans. Priv. Secur., 20 (4): 16:1-16:33 (2017)