Author of the publication

Large Online Social Footprints - An Emerging Threat.

, , , and . CSE (3), page 271-276. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A general formulation of 2nd-order Polynomial Smooth Support Vector Machines., , and . ICNC, page 2212-2216. IEEE, (2010)Variable selection by RIVAL., , and . MED, page 913-917. IEEE, (2014)Study of ASIC self-destruction technology based on MEMS initiator., , , , and . NEMS, page 851-854. IEEE, (2013)Target Tracking Control Based on Dual Model Fusion., , , and . ROBIO, page 2749-2754. IEEE, (2019)Statistical Karyotype Analysis Using CNN and Geometric Optimization., , , , and . IEEE Access, (2019)Understanding Perceived Complexity in Human Supervisory Control., and . Cogn. Technol. Work., 2 (2): 75-88 (2000)In Silicon Study of 3D Elbow Kinematics., and . HCI (17), volume 6777 of Lecture Notes in Computer Science, page 139-142. Springer, (2011)Spatial modeling of bone microarchitecture., , , , and . Three-Dimensional Image Processing (3DIP) and Applications, volume 8290 of SPIE Proceedings, page 82900P. SPIE, (2012)A Practical Approach of Curved Ray Prestack Kirchhoff Time Migration on GPGPU., , , and . APPT, volume 5737 of Lecture Notes in Computer Science, page 165-176. Springer, (2009)An Ensemble Model for Mobile Device based Arrhythmia Detection., , , and . BCB, page 266. ACM, (2013)