Author of the publication

Link Prediction in Social Networks Using Computationally Efficient Topological Features.

, , , , , and . SocialCom/PASSAT, page 73-80. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fake News Data Collection and Classification: Iterative Query Selection for Opaque Search Engines with Pseudo Relevance Feedback., , and . CoRR, (2020)Is the Online Discussion Manipulated? Quantifying the Online Discussion Authenticity within Online Social Media., , and . CoRR, (2017)Deployment of DNIDS in Social Networks., , and . ISI, page 59-65. IEEE, (2007)Simulating Threats Propagation within the NSP Infrastructure., , , and . ISI, page 380. IEEE, (2007)Predictive web automation assistant for people with vision impairments., , , and . WWW, page 1031-1040. International World Wide Web Conferences Steering Committee / ACM, (2013)The Curious Case of the Curious Case: Detecting Touchscreen Events Using a Smartphone Protective Case., , , and . EuroS&P Workshops, page 99-103. IEEE, (2017)Application Marketplace Malware Detection by User Feedback Analysis., , , , and . ICISSP (Revised Selected Papers), volume 867 of Communications in Computer and Information Science, page 1-19. Springer, (2017)Spot the Hotspot: Wi-Fi Hotspot Classification from Internet Traffic., , , and . SBP-BRiMS, volume 9708 of Lecture Notes in Computer Science, page 239-249. Springer, (2016)Extended Framework for Target Oriented Network Intelligence Collection., , , and . SOCS, page 131-138. AAAI Press, (2014)Solving the Snake in the Box Problem with Heuristic Search: First Results., , , , , and . SOCS, page 96-104. AAAI Press, (2015)