Author of the publication

Shutter: Preventing Information Leakage Based on Domain Gateway for Social Networks.

, , , , , and . UIC/ATC/ScalCom, page 42-49. IEEE Computer Society, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Nonparametric Approach to Uncovering Connected Anomalies by Tree Shaped Priors., , , , , , and . IEEE Trans. Knowl. Data Eng., 31 (10): 1849-1862 (2019)Crease detection from fingerprint images and its applications in elderly people., , , and . Pattern Recognit., 42 (5): 896-906 (2009)FedRare: Federated Learning with Intra- and Inter-Client Contrast for Effective Rare Disease Classification., , , , and . CoRR, (2022)IISD: Integrated Interaction Subgraph Detection for event mining., , , , and . Knowl. Based Syst., (2022)Composite Decision Makers in the Graph Model for Conflict Resolution: Hesitant Fuzzy Preference Modeling., , , and . IEEE Trans. Syst. Man Cybern. Syst., 51 (12): 7889-7902 (2021)Model-based non-Gaussian interest topic distribution for user retweeting in social networks., , and . Neurocomputing, (2018)FedA3I: Annotation Quality-Aware Aggregation for Federated Medical Image Segmentation against Heterogeneous Annotation Noise., , , and . AAAI, page 15943-15951. AAAI Press, (2024)Uncovering Specific-Shape Graph Anomalies in Attributed Graphs., , , , , and . AAAI, page 5433-5440. AAAI Press, (2019)Experimental Research of Galfenol Composite Cantilever., , , , and . HCC, volume 12634 of Lecture Notes in Computer Science, page 258-268. Springer, (2020)Model based algorithm for singular point detection from fingerprint images., and . ICIP, page 885-888. IEEE, (2004)