Author of the publication

Predicting Influential Users in Online Social Network Groups.

, , , , and . ACM Trans. Knowl. Discov. Data, 15 (3): 35:1-35:50 (2021)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Maximizing data survival in Unattended Wireless Sensor Networks against a focused mobile adversary., , , , and . IACR Cryptology ePrint Archive, (2008)Efficient and secure keys management for wireless mobile communications., , and . POMC, page 66-73. ACM, (2002)A Linear-Time Multivariate Micro-aggregation for Privacy Protection in Uniform Very Large Data Sets., and . MDAI, volume 5285 of Lecture Notes in Computer Science, page 203-214. Springer, (2008)Next Generation Information Warfare: Challenges and Research Directions.. ICISSP, page 7-8. SciTePress, (2019)Social Fingerprinting - or the Truth About You., , , , and . ERCIM News, (2016)A cost-driven approach to role engineering., , and . SAC, page 2129-2136. ACM, (2008)Mobile Application Security for Video Streaming Authentication and Data Integrity Combining Digital Signature and Watermarking Techniques., , , , and . VTC Spring, page 634-638. IEEE, (2007)The smallville effect: social ties make mobile networks more secure against node capture attack., , , , and . MOBIWAC, page 99-106. ACM, (2010)Random key-assignment for secure Wireless Sensor Networks., , and . SASN, page 62-71. ACM, (2003)Requirements and Open Issues in Distributed Detection of Node Identity Replicas in WSN., , , and . SMC, page 1468-1473. IEEE, (2006)