Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Efficient Top-K Query Algorithms Using Density Index., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 38-45. Springer, (2011)On the Security of Trustee-based Social Authentications., and . CoRR, (2014)Reciprocal versus parasocial relationships in online social networks., and . Soc. Netw. Anal. Min., 4 (1): 184 (2014)SybilSCAR: Sybil detection in online social networks via local rule based propagation., , and . INFOCOM, page 1-9. IEEE, (2017)Practical Blind Membership Inference Attack via Differential Comparisons., , , , , and . NDSS, The Internet Society, (2021)Unveiling Fake Accounts at the Time of Registration: An Unsupervised Approach., , , , , , , , and . KDD, page 3240-3250. ACM, (2021)AFLGuard: Byzantine-robust Asynchronous Federated Learning., , , and . ACSAC, page 632-646. ACM, (2022)Addressing Heterogeneity in Federated Learning via Distributional Transformation., , , , , and . ECCV (38), volume 13698 of Lecture Notes in Computer Science, page 179-195. Springer, (2022)Personalized Mobile App Recommendation: Reconciling App Functionality and User Privacy Preference., , , , , and . WSDM, page 315-324. ACM, (2015)Stealing Hyperparameters in Machine Learning., and . IEEE Symposium on Security and Privacy, page 36-52. IEEE Computer Society, (2018)