Author of the publication

On Protecting Private Information in Social Networks: AProposal.

, and . ICDE, page 1603-1606. IEEE Computer Society, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Are your citations clean?, , , , and . Commun. ACM, 50 (12): 33--38 (December 2007)Conjunctive Point Predicate-based Semantic Caching for Wrappers in Web Databases., and . Workshop on Web Information and Data Management, page 45-48. ACM, (1998)Open Innovation in the High-Tech Firms: Evidence from the Biotechnology Industry., and . ICIS, page 53. Association for Information Systems, (2007)Utility-based association rule mining: A marketing solution for cross-selling., , and . Expert Syst. Appl., 40 (7): 2715-2725 (2013)FakeNewsNet: A Data Repository with News Content, Social Context and Dynamic Information for Studying Fake News on Social Media., , , , and . CoRR, (2018)Schema Conversion Methods between XML and Relational Models., , and . Knowledge Transformation for the Semantic Web, volume 95 of Frontiers in Artificial Intelligence and Applications, IOS Press, (2003)Probabilistic Assessment of PV Hosting Capacity Under Coordinated Voltage Regulation in Unbalanced Active Distribution Networks., , , and . IEEE Access, (2022)ChamberBreaker: Mitigating the Echo Chamber Effect and Supporting Information Hygiene through a Gamified Inoculation System., , , , and . Proc. ACM Hum. Comput. Interact., 5 (CSCW2): 472:1-472:26 (2021)Guest Editorial on Social Computing, Behavioral-Cultural Modeling and Prediction., , , and . IEEE Trans. Comput. Soc. Syst., 3 (2): 43-45 (2016)Graph Theoretic Topological Analysis of Web Service Networks., , , , and . World Wide Web, 12 (3): 321-343 (2009)