Author of the publication

Source Code Authorship Attribution Using Long Short-Term Memory Based Networks.

, , , , and . ESORICS (1), volume 10492 of Lecture Notes in Computer Science, page 65-82. Springer, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The illiterate editor: metadata-driven revert detection in Wikipedia., and . OpenSym, page 11:1-11:8. ACM, (2013)Git Blame Who?: Stylistic Authorship Attribution of Small, Incomplete Source Code Fragments., , , , , , and . Proc. Priv. Enhancing Technol., 2019 (3): 389-408 (2019)Experimental analysis of privacy loss in DCOP algorithms., , , and . AAMAS, page 1424-1426. ACM, (2006)Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians., , and . CSCW, page 1800-1811. ACM, (2017)From Language to Family and Back: Native Language and Language Family Identification from English Text., , and . HLT-NAACL, page 32-39. The Association for Computational Linguistics, (2013)Privatizing Constraint Optimization.. AAAI, page 1916-1917. AAAI Press, (2006)Tor Users Contributing to Wikipedia: Just Like Everybody Else?, , , , and . CoRR, (2019)Reinterpreting the Disclosure Debate for Web Infections., , and . Managing Information Risk and the Economics of Security, Springer, (2009)Practical Attacks Against Authorship Recognition Techniques., and . IAAI, AAAI, (2009)What to Expect When You're Accessing: An Exploration of User Privacy Rights in People Search Websites., , , , , , and . Proc. Priv. Enhancing Technol., 2024 (4): 311-326 (2024)