Author of the publication

Co-Detection of crowdturfing microblogs and spammers in online social networks.

, , , , , , and . World Wide Web, 23 (1): 573-607 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A clustering analysis and agent-based trust model in a grid environment supporting virtual organisations., and . IJWGS, 5 (1): 3-16 (2009)LoRaDrone: Enabling Low-Power LoRa Data Transmission via a Mobile Approach., , , , , , and . MSN, page 239-246. IEEE, (2022)Do Not Give a Dog Bread Every Time He Wags His Tail: Stealing Passwords through Content Queries (CONQUER) Attacks., , , , , , and . NDSS, The Internet Society, (2023)A novel Website Fingerprinting attack against multi-tab browsing behavior., , and . CSCWD, page 234-239. IEEE, (2015)A novel active website fingerprinting attack against Tor anonymous system., , , , and . CSCWD, page 112-117. IEEE, (2014)Semi-online Task Allocation Algorithm among Cooperative Agents., , and . CSCWD, page 488-493. IEEE, (2006)Data Anonymization Based on Natural Equivalent Class., , , , and . CSCWD, page 22-27. IEEE, (2019)QAECN: Dynamically Tuning ECN Threshold with Micro-burst in Multi-queue Data Centers., , , , , and . CSCWD, page 398-403. IEEE, (2019)A Personalized Hybrid Recommendation System Oriented to E-Commerce Mass Data in the Cloud., , , , and . SMC, page 1020-1025. IEEE, (2013)Quantifying Group Influence on Individuals in Online Social Networks., , , , and . ISCC, page 1-6. IEEE, (2019)