Author of the publication

Need for Symmetry: Addressing Privacy Risks in Online Social Networks.

, , , , , , and . AINA, page 534-541. IEEE Computer Society, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adaptive Decoupling Switching Control of the Forced-Circulation Evaporation System Using Neural Networks., , , , and . IEEE Trans. Contr. Sys. Techn., 21 (3): 964-974 (2013)A traceable privacy-preserving authentication protocol for VANETs based on proxy re-signature., , , , , , and . FSKD, page 2217-2221. IEEE, (2011)Inter Node B Node Synchronization in SFN for MBMS Transmission., , and . VTC Spring, page 2996-3000. IEEE, (2007)A Large-scale Attribute Dataset for Zero-shot Learning., , , , , and . CoRR, (2018)A Traceable Certificateless Threshold Proxy Signature Scheme from Bilinear Pairings., , , , , , and . APWeb, volume 6612 of Lecture Notes in Computer Science, page 376-381. Springer, (2011)Support Vector Machine Multiuser Detector for TD-SCDMA Communication System in Multipath Channels., , and . ISNN (1), volume 3173 of Lecture Notes in Computer Science, page 605-610. Springer, (2004)Reduced-complexity superbaud timing recovery for PAM-based multi-h CPM receivers., , , , and . WCNC, page 3900-3904. IEEE, (2013)DSpam: Defending Against Spam in Tagging Systems via Users' Reliability., , , , , , and . ICPADS, page 139-146. IEEE Computer Society, (2010)A New Method to Generate Attack Graphs., , , , and . SSIRI, page 401-406. IEEE Computer Society, (2009)Compressed Multicast Retransmission in LTE-A eMBMS., , and . VTC Spring, page 1-5. IEEE, (2010)