Author of the publication

How people share digital images in social networks: a questionnaire-based study of privacy decisions and access control.

, , , , , , and . Multimedia Tools Appl., 77 (14): 18163-18185 (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Fault Localization Framework to Alleviate the Impact of Execution Similarity., , , and . International Journal of Software Engineering and Knowledge Engineering, 23 (7): 963-998 (2013)An OpenCL micro-benchmark suite for GPUs and CPUs., , , and . The Journal of Supercomputing, 69 (2): 693-713 (2014)Image authentication based on perceptual hash using Gabor filters., , , , and . Soft Comput., 15 (3): 493-504 (2011)Analysis on the "Robust Yet Fragile" Nature of Internet: Load, Capacity and the Cascading Failure Avalanche Effect., , , , and . ICYCS, page 2149-2153. IEEE Computer Society, (2008)The CT Image Reconstruction Algorithm Based on the Least Absolute Criterion by Alternating Direction Iterative., , , , and . CIS, page 124-128. IEEE Computer Society, (2014)Research on Evaluation of Trust Model., , and . CIS (1), page 345-349. IEEE Computer Society, (2008)Using Game Theory to Reveal Vulnerability for Complex Networks., , and . CIT, page 978-984. IEEE Computer Society, (2010)A multi-objective optimization model based on immune algorithm in wireless mesh networks., , , , , , and . Int. J. Communication Systems, 29 (1): 155-169 (2016)Insecurity of an identity-based public auditing protocol for the outsourced data in cloud storage., , , and . Inf. Sci., (2017)Distributed Greedy Coding-aware Deterministic Routing for multi-flow in wireless networks., , , , , and . Computer Networks, (2016)