Author of the publication

Longitudinal Privacy Management in Social Media: The Need for Better Controls.

, , , , and . IEEE Internet Comput., 21 (3): 48-55 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Reverse Engineering Socialbot Infiltration Strategies in Twitter., , , and . CoRR, (2014)ECIR 2017 Workshop on Exploitation of Social Media for Emergency Relief and Preparedness (SMERP 2017)., , , , , and . SIGIR Forum, 51 (1): 36-41 (2017)Low-Cost and Lightweight 3D-Printed Split-Ring Resonator for Chemical Sensing Applications., , and . Sensors, 18 (9): 3049 (2018)Analysis and Early Detection of Rumors in a Post Disaster Scenario., , , , and . Information Systems Frontiers, 20 (5): 961-979 (2018)Retrieving Information from Multiple Sources., , , , and . WWW (Companion Volume), page 43-44. ACM, (2018)Cognos: crowdsourcing search for topic experts in microblogs., , , , and . SIGIR, page 575-590. ACM, (2012)Study on ultra-thin dual frequency metamaterial absorber with retrieval of electromagnetic parameters., , , and . NCC, page 1-6. IEEE, (2014)Sentiment Detection in Online Content: A WordNet Based Approach., , , and . SEMCCO, volume 8947 of Lecture Notes in Computer Science, page 409-420. Springer, (2014)Run-time delays in Indian Railways: is traffic the cause?, , , and . ACM DEV (3), page 20:1-20:2. ACM, (2013)Reverse Engineering Socialbot Infiltration Strategies in Twitter., , , and . ASONAM, page 25-32. ACM, (2015)