Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepCity: A Feature Learning Framework for Mining Location Check-Ins., and . ICWSM, page 652-655. AAAI Press, (2017)A Strand Space Approach to Provable Anonymity., and . FTSCS, volume 419 of Communications in Computer and Information Science, page 71-87. Springer, (2013)The Persuasive Impact of Emoticons in Online Word-of-Mouth Communication., , , and . PACIS, page 122. (2016)Game-Based Verification of Multi-Party Contract Signing Protocols., , , and . Formal Aspects in Security and Trust, volume 5983 of Lecture Notes in Computer Science, page 186-200. Springer, (2009)Privacy and verifiability in voting systems: Methods, developments and trends., , and . Comput. Sci. Rev., (2013)Membership Inference of Diffusion Models., and . CoRR, (2023)Formal modelling and analysis of receipt-free auction protocols in applied pi., , and . Comput. Secur., (2017)Design and formal verification of a CEM protocol with transparent TTP., , and . Frontiers Comput. Sci., 7 (2): 279-297 (2013)Formalizing provable anonymity in Isabelle/HOL., and . Formal Aspects Comput., 27 (2): 255-282 (2015)Higher-Order Graph Convolutional Embedding for Temporal Networks., , and . WISE (1), volume 12342 of Lecture Notes in Computer Science, page 3-15. Springer, (2020)