Author of the publication

Foreword to the special issue on security, privacy, and social networks.

, , , and . Concurr. Comput. Pract. Exp., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Twitter spam detection based on deep learning., , , and . ACSW, page 3:1-3:8. ACM, (2017)Cartesian contour: a concise representation for a collection of frequent sets., , and . KDD, page 417-426. ACM, (2009)Speech Enhancement via Generative Adversarial LSTM Networks., and . IWAENC, page 46-50. IEEE, (2018)A Chinese question answering system based on web search., , , , and . ICMLC, page 816-820. IEEE, (2014)Predicting prognostic markers for glioma using gene co-expression network analysis., , and . BCB, page 546-551. ACM, (2010)Additive Spanners for Circle Graphs and Polygonal Graphs., , , and . WG, volume 5344 of Lecture Notes in Computer Science, page 110-121. (2008)An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 215-228. Springer, (2016)Design and implementation of a robotic shark with a novel embedded vision system., , and . ROBIO, page 841-846. IEEE, (2016)A Stochastic Time-Domain Model for Burst Data Aggregation in IEEE 802.15.4 Wireless Sensor Networks., , , and . IEEE Trans. Computers, 64 (3): 627-639 (2015)A Proposal of An Article Network Analysis Approach to Reduce Systematic Review Workload., , , , and . Nursing Informatics, volume 201 of Studies in Health Technology and Informatics, IOS Press, (2012)