Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Effective privacy preserving data publishing by vectorization., , , and . Inf. Sci., (2020)A Network-Flow Based Influence Propagation Model for Social Networks., , , and . CGC, page 601-608. IEEE Computer Society, (2012)Optimal management of distance-based location registration using embedded Markov chain., , , and . IJDSN, (2020)Maximum Reliable Tree for Social Network Search., , , and . DASC, page 1243-1249. IEEE Computer Society, (2011)Path Skyline for Moving Objects., , and . APWeb, volume 7235 of Lecture Notes in Computer Science, page 610-617. Springer, (2012)Spammer detection for real-time big data graphs., , and . EDB, page 51-60. ACM, (2016)Find spammers by using graph structure., , , and . BigComp, page 278-279. IEEE, (2017)Spammer Detection for Real-Time Big Data Graphs., , , and . UIC/ATC/ScalCom/CBDCom/IoP/SmartWorld, page 1227. IEEE Computer Society, (2016)STDP: Secure Privacy-Preserving Trajectory Data Publishing., , and . iThings/GreenCom/CPSCom/SmartData, page 892-899. IEEE, (2018)