Author of the publication

User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions.

, , , , and . ICASSP, page 3477-3480. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Two Phrases PPM for IP Traceback., , , and . PDCAT, page 386-389. IEEE Computer Society, (2005)LIP: A Lifetime and Popularity Based Ranking Approach to Filter out Fake Files in P2P File Sharing Systems., and . IPTPS, (2007)User behavior modeling in peer-to-peer file sharing networks: Dissecting download and removal actions., , , , and . ICASSP, page 3477-3480. IEEE, (2009)Enhancing personalized ranking quality through multidimensional modeling of inter-item competition., , , , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)Modeling Attack Behaviors in Rating Systems., , , and . ICDCS Workshops, page 241-248. IEEE Computer Society, (2008)A simple, universal and scalable approach to migrate applications to hybrid network using ALG., , , , and . GCC Workshops, page 125-128. IEEE Computer Society, (2006)RepTrap: a novel attack on feedback-based reputation systems., , , and . SecureComm, page 8. ACM, (2008)Voting Systems with Trust Mechanisms in Cyberspace: Vulnerabilities and Defenses., , , , and . IEEE Trans. Knowl. Data Eng., 22 (12): 1766-1780 (2010)Enhancing personalized ranking quality through multidimensional modeling of inter-item competition., , , , and . CollaborateCom, page 1-10. ICST / IEEE, (2010)