From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Reinterpreting the Disclosure Debate for Web Infections., , и . Managing Information Risk and the Economics of Security, Springer, (2009)Tor Users Contributing to Wikipedia: Just Like Everybody Else?, , , , и . CoRR, (2019)Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments., , , , , , и . Proc. Priv. Enhancing Technol., 2019 (3): 389-408 (2019)The illiterate editor: metadata-driven revert detection in Wikipedia., и . OpenSym, стр. 11:1-11:8. ACM, (2013)From Language to Family and Back: Native Language and Language Family Identification from English Text., , и . HLT-NAACL, стр. 32-39. The Association for Computational Linguistics, (2013)Privatizing Constraint Optimization.. AAAI, стр. 1916-1917. AAAI Press, (2006)Experimental analysis of privacy loss in DCOP algorithms., , , и . AAMAS, стр. 1424-1426. ACM, (2006)Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians., , и . CSCW, стр. 1800-1811. ACM, (2017)Practical Attacks Against Authorship Recognition Techniques., и . IAAI, AAAI, (2009)GMM Based Semi-Supervised Learning for Channel-Based Authentication Scheme., , , и . VTC Fall, стр. 1-6. IEEE, (2013)