Author of the publication

Efficient Top-K Query Algorithms Using Density Index.

, , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 38-45. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges., and . CoRR, (2019)Towards Forgery-Resistant Touch-based Biometric Authentication on Mobile Devices., , , and . CoRR, (2015)You are Who You Know and How You Behave: Attribute Inference Attacks via Users' Social Friends and Behaviors., and . CoRR, (2016)A Dynamic Taint Analysis Tool for Android App Forensics., , , , and . IEEE Symposium on Security and Privacy Workshops, page 160-169. IEEE Computer Society, (2018)What You Submit Is Who You Are: A Multimodal Approach for Deanonymizing Scientific Publications., , , , and . IEEE Trans. Information Forensics and Security, 10 (1): 200-212 (2015)StolenEncoder: Stealing Pre-trained Encoders., , , and . CoRR, (2022)Efficient Top-K Query Algorithms Using Density Index., , , and . ICAIC (1), volume 224 of Communications in Computer and Information Science, page 38-45. Springer, (2011)Seed-Based De-Anonymizability Quantification of Social Networks., , , , and . IEEE Trans. Information Forensics and Security, 11 (7): 1398-1411 (2016)On Your Social Network De-anonymizablity: Quantification and Large Scale Evaluation with Seed Knowledge., , , , and . NDSS, The Internet Society, (2015)Reciprocal versus parasocial relationships in online social networks., and . Social Netw. Analys. Mining, 4 (1): 184 (2014)