Author of the publication

A Game Theory-Based Model for the Dissemination of Privacy Information in Online Social Networks.

, , and . Future Internet, 15 (3): 92 (March 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Novel Method for Detecting Image Forgery Based on Convolutional Neural Network., , and . TrustCom/BigDataSE, page 1702-1705. IEEE, (2018)Text Classification of Network Pyramid Scheme based on Topic Model., , and . NLPIR, page 15-19. ACM, (2019)An adaptive semi-supervised deep learning-based framework for the detection of Android malware., , , , , , , and . J. Intell. Fuzzy Syst., 45 (3): 5141-5157 (2023)An Evolutionary Game Theory-Based Cooperation Framework for Countering Privacy Inference Attacks., , , , , and . IEEE Trans. Comput. Soc. Syst., 11 (3): 4367-4384 (June 2024)An effective deep learning scheme for android malware detection leveraging performance metrics and computational resources., , , , , , , and . Intell. Decis. Technol., 18 (1): 33-55 (2024)Collaborative Filtering Recommendation Based on Multi-Domain Semantic Fusion., , , and . COMPSAC, page 255-261. IEEE, (2020)Pyramid Text Recognition Based on A New Text Representation Model., , and . ICNSC, page 195-199. IEEE, (2019)Bitcoin transaction pattern recognition based on semi-supervised learning., , , and . J. Comput. Sci., (2023)HADTF: a hybrid autoencoder-decision tree framework for improved RPL-based attack detection in IoT networks based on enhanced feature selection approach., , , , and . J. Supercomput., 80 (18): 26333-26362 (December 2024)Differentially Private Denoise Diffusion Probability Models., , , , and . IEEE Access, (2023)