Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Modeling of bot usage diffusion across social networks in MMORPGs., , and . WASA, page 13-18. ACM, (2012)Andro-profiler: anti-malware system based on behavior profiling of mobile malware., , , and . WWW (Companion Volume), page 737-738. ACM, (2014)Andro-profiler: Detecting and Classifying Android Malware based on Behavioral Profiles., , , , and . CoRR, (2016)A Comparative Analysis of Deep Learning and Machine Learning on Detecting Movement Directions Using PIR Sensors., and . IEEE Internet of Things Journal, 7 (4): 2855-2868 (2020)Understanding the uncertainty of disaster tweets and its effect on retweeting: The perspectives of uncertainty reduction theory and information entropy., , , and . J. Assoc. Inf. Sci. Technol., 71 (10): 1145-1161 (2020)Profane or Not: Improving Korean Profane Detection using Deep Learning., , and . KSII Trans. Internet Inf. Syst., 16 (1): 305-318 (2022)SwahBERT: Language Model of Swahili., , , and . NAACL-HLT, page 303-313. Association for Computational Linguistics, (2022)An event-driven SIR model for topic diffusion in web forums., and . ISI, page 108-113. IEEE, (2012)Detecting and Preventing Online Game Bots in MMORPGs., and . Encyclopedia of Computer Graphics and Games, Springer, Living reference work, snapshot April 2019.(2019)No Silk Road for Online Gamers!: Using Social Network Analysis to Unveil Black Markets in Online Games., , , and . WWW, page 1825-1834. ACM, (2018)