Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Testing the Message Flow of Android Auto Apps., , , , and . SANER, page 559-563. IEEE, (2019)Public Opinion Propagation Model on Social Networks., , and . CSO, page 325-328. IEEE Computer Society, (2014)An Event-Triggering Approach to Recursive Filtering for Complex Networks With State Saturations and Random Coupling Strengths., , , and . IEEE Trans. Neural Networks Learn. Syst., 31 (10): 4279-4289 (2020)Boosting Multi-Modal E-commerce Attribute Value Extraction via Unified Learning Scheme and Dynamic Range Minimization., , , , , , and . CoRR, (2022)Link-Breakage Recovery Strategies for Tactical MANET Based on OLSR., , , , , and . IFTC (1), volume 2066 of Communications in Computer and Information Science, page 375-389. Springer, (2023)Detecting and characterizing social spam campaigns., , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)Towards Online Spam Filtering in Social Networks., , , , and . NDSS, The Internet Society, (2012)Twig Pattern Matching Running on XML Streams., , and . APWeb Workshops, volume 7234 of Lecture Notes in Computer Science, page 35-42. Springer, (2012)Twig Pattern Matching with Positional Predicates in XML Queries., , and . IEEE WISA, page 113-118. IEEE Computer Society, (2013)Spam ain't as diverse as it seems: throttling OSN spam with templates underneath., , , , , , and . ACSAC, page 76-85. ACM, (2014)