Author of the publication

Co-Detection of crowdturfing microblogs and spammers in online social networks.

, , , , , , and . World Wide Web, 23 (1): 573-607 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Security Real-time Privacy Amplification Scheme in QKD System., , , and . J. Univers. Comput. Sci., 19 (16): 2420-2436 (2013)An Attribute Based Private Data Sharing Scheme for People-Centric Sensing Networks., , , and . CD-ARES Workshops, volume 8128 of Lecture Notes in Computer Science, page 393-407. Springer, (2013)First Request First Service Entanglement Routing Scheme for Quantum Networks., , , , , , and . Entropy, 24 (10): 1404 (2022)A Pipeline Optimization Model for QKD Post-processing System., , , and . ICT-EurAsia, volume 8407 of Lecture Notes in Computer Science, page 472-481. Springer, (2014)A Real-Time Privacy Amplification Scheme in Quantum Key Distribution., , , , , , and . ICT-EurAsia, volume 7804 of Lecture Notes in Computer Science, page 453-458. Springer, (2013)A similarity-based two-view multiple instance learning method for classification., , and . Knowl. Based Syst., (2020)Movement-based incentive for cellular traffic offloading through D2D communications., , , and . BMSB, page 1-5. IEEE, (2016)The excitation control system design based on Fuzzy PID., , , , and . ICVES, page 253-257. IEEE, (2013)A hybrid PSO-DV based intelligent method for fault diagnosis of gear-box., and . CIRA, page 451-456. IEEE, (2009)On crowd-retweeting spamming campaign in social networks., , , , , and . ICC, page 1-6. IEEE, (2016)