Author of the publication

An Information Extraction Attack against On-Line Social Networks.

, and . SocialInformatics, page 49-55. IEEE Computer Society, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Study on the Improvement of Flexibility for an Industrial Robot Based on Machine Vision., , , and . JRNAL, 1 (1): 45-48 (2014)Necessary and Sufficient Conditions to Linearize Double Recursive Programs in Logic Databases., , and . ACM Trans. Database Syst., 15 (3): 459-482 (1990)Distributing an SQL Query over a Cluster of Containers., and . CLOUD, page 457-464. IEEE, (2019)Factors Influencing the Adoption of Generative AI for Art Designing Among Chinese Generation Z: A Structural Equation Modeling Approach., and . IEEE Access, (2023)Finding Similar Historical Scenarios for Better Understanding Aircraft Taxi Time: A Deep Metric Learning Approach., , , and . IEEE Intell. Transp. Syst. Mag., 15 (1): 101-116 (2023)Efficient Recursive Query Processing using Wavefront Methods., and . ICDE, page 652-657. IEEE Computer Society, (1987)Data partition: A Practical Parallel Evaluation of Datalog Programs., , and . PDIS, page 98-105. IEEE Computer Society, (1991)Edge Anonymity in Social Network Graphs., and . CSE (4), page 1-8. IEEE Computer Society, (2009)Generalization-Based Privacy-Preserving Data Collection., and . DaWaK, volume 5182 of Lecture Notes in Computer Science, page 115-124. Springer, (2008)Linearization of Nonlinear Recursive Rules., , and . IEEE Trans. Software Eng., 15 (9): 1109-1119 (1989)