Author of the publication

Longitudinal Privacy Management in Social Media: The Need for Better Controls.

, , , , and . IEEE Internet Comput., 21 (3): 48-55 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Search bias quantification: investigating political bias in social media and web search., , , , , , and . Inf. Retr. Journal, 22 (1-2): 188-227 (2019)ECIR 2017 Workshop on Exploitation of Social Media for Emergency Relief and Preparedness (SMERP 2017)., , , , , and . SIGIR Forum, 51 (1): 36-41 (2017)Low-Cost and Lightweight 3D-Printed Split-Ring Resonator for Chemical Sensing Applications., , and . Sensors, 18 (9): 3049 (2018)Analysis and Early Detection of Rumors in a Post Disaster Scenario., , , , and . Information Systems Frontiers, 20 (5): 961-979 (2018)Extracting and Summarizing Situational Information from the Twitter Social Media during Disasters., , , and . TWEB, 12 (3): 17:1-17:35 (2018)Secrecy Capacity in CRN With Malicious Energy Harvester Using Game Theoretic Techniques., , , and . IEEE Trans. Cogn. Comm. & Networking, 3 (3): 343-360 (2017)Emergence of Chimera in Multiplex Network., and . I. J. Bifurcation and Chaos, 26 (7): 1-10 (2016)Reverse Engineering Socialbot Infiltration Strategies in Twitter., , , and . CoRR, (2014)Reverse Engineering Socialbot Infiltration Strategies in Twitter., , , and . ASONAM, page 25-32. ACM, (2015)Run-time delays in Indian Railways: is traffic the cause?, , , and . ACM DEV (3), page 20:1-20:2. ACM, (2013)