Personensuche
X
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
4
Those Aren't Your Memories, They're Somebody Else's: Seedin..:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
5
On mission Twitter Profiles: A Study of Selective Toxic Beh..:
, In:
?
2023 IEEE International Conference on Knowledge Graph (ICKG) ,
6
Distance Maximization and Defences on Deep Hashing Based Im..:
, In:
?
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security ,
7
Privacy-Preserving Record Linkage for Cardinality Counting:
, In:
?
2023 IEEE International Conference on Big Data (BigData) ,
8
Exploring the Distinctive Tweeting Patterns of Toxic Twitte..:
, In:
?
E-Business and Telecommunications; Communications in Computer and Information Science ,
9
Trace Recovery: Attacking and Defending the User Privacy in..:
, In:
?
Applied Cryptography and Network Security; Lecture Notes in Computer Science ,
10
An Empirical Analysis of Security and Privacy Risks in Andr..:
, In:
?
Network and System Security; Lecture Notes in Computer Science ,
12