Author of the publication

Detecting and characterizing social spam campaigns.

, , , , , and . ACM Conference on Computer and Communications Security, page 681-683. ACM, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Late Breaking Results: Analytical Placement for 3D ICs with Multiple Manufacturing Technologies., , , , , and . DAC, page 1-2. IEEE, (2023)Understanding Consumer Search Activity and Online Purchase Intensions for Improving the Product Recommendation Search., , and . ACIS-ICIS, page 1135-1140. IEEE Computer Society, (2007)Estimating Bus Cross-Sectional Flow Based on Machine Learning Algorithm Combined with Wi-Fi Probe Technology., , and . Sensors, 21 (3): 844 (2021)Tomography-based overlay network monitoring., , and . Internet Measurement Conference, page 216-231. ACM, (2003)Security Issues in Online Social Networks., , , , and . IEEE Internet Comput., 15 (4): 56-63 (2011)Identification of a Class of Nonlinear Autoregressive Models With Exogenous Inputs Based on Kernel Machines., , , and . IEEE Trans. Signal Process., 59 (5): 2146-2159 (2011)Research Paper: Auditing as Part of the Terminology Design Life Cycle., , , , , and . JAMIA, 13 (6): 676-690 (2006)A Length and Width Feature Extraction Method of Ship Target Based on IR Image., , , , , and . CSPS (2), volume 516 of Lecture Notes in Electrical Engineering, page 3-10. Springer, (2018)Spectrum Sharing between Cellular and Mobile Ad Hoc Networks: Transmission-Capacity Trade-Off., , and . IEEE J. Sel. Areas Commun., 27 (7): 1256-1267 (2009)Fabric Database and Fuzzy Logic Models for Evaluating Fabric Performance., , and . Handbook of Research on Fuzzy Information Processing in Databases, IGI Global, (2008)