Author of the publication

Anomaly Detection in Microblogging via Co-Clustering.

, , , , , and . J. Comput. Sci. Technol., 30 (5): 1097-1108 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

UrbanEdge: deep learning empowered edge computing for urban IoT time series prediction., , , , , and . ACM TUR-C, page 12:1-12:6. ACM, (2019)Detecting Evil-Twin Attack with the Crowd Sensing of Landmark in Physical Layer., , , , , , , and . ICA3PP (4), volume 11337 of Lecture Notes in Computer Science, page 234-248. Springer, (2018)LMDD: Light-Weight Magnetic-Based Door Detection with Your Smartphone., , , , and . ICPP, page 919-928. IEEE Computer Society, (2015)Channel State Information-Based Detection of Sybil Attacks in Wireless Networks., , , , , , and . J. Internet Serv. Inf. Secur., 8 (1): 2-17 (2018)Detecting Bots in Follower Markets., , , , , , , and . BIC-TA, volume 472 of Communications in Computer and Information Science, page 525-530. Springer, (2014)iPil: improving passive indoor localisation via link-based CSI features., , , and . IJAHUC, 23 (1/2): 36-45 (2016)CloudI: Cloud Security based on Cloud Introspection., , , and . ICMLC, page 341-346. ACM, (2018)An adaptive wireless passive human detection via fine-grained physical layer information., , , , , , and . Ad Hoc Networks, (2016)Towards System Implementation and Data Analysis for Crowdsensing Based Outdoor RSS Maps., , , , , , and . IEEE Access, (2018)A Survey on Security of Cloud Environment: Threats, Solutions, and Innovation., , , and . DSC, page 910-916. IEEE, (2018)