Privacy and security in online social networks: A survey

I Kayes, A Iamnitchi - Online Social Networks and Media, 2017 - Elsevier
Online social networks (OSN) are a permanent presence in today's personal and
professional lives of a huge segment of the population, with direct consequences to offline …

Towards data-centric graph machine learning: Review and outlook

X Zheng, Y Liu, Z Bao, M Fang, X Hu, AWC Liew… - arXiv preprint arXiv …, 2023 - arxiv.org
Data-centric AI, with its primary focus on the collection, management, and utilization of data
to drive AI models and applications, has attracted increasing attention in recent years. In this …

Hiding individuals and communities in a social network

M Waniek, TP Michalak, MJ Wooldridge… - Nature Human …, 2018 - nature.com
The Internet and social media have fuelled enormous interest in social network analysis.
New tools continue to be developed and used to analyse our personal connections, with …

The Use of social media and its impacts on consumer behaviour: the context of holiday travel.

JN Fotis - 2015 - eprints.bournemouth.ac.uk
Social media enjoy a phenomenal success in terms of adoption and usage levels. They
cause paradigm shifts on how people connect and communicate with each other, on how …

Machine Learning for Computer and Cyber Security

BB Gupta, M Sheng - ed: CRC Press. Preface, 2019 - api.taylorfrancis.com
Names: Gupta, Brij, 1982-editor.| Sheng, Quan Z. editor. Title: Machine learning for computer
and cyber security: principles, algorithms, and practices/editors Brij B. Gupta, National …

Secure social networks in 5G systems with mobile edge computing, caching, and device-to-device communications

Y He, FR Yu, N Zhao, H Yin - IEEE Wireless Communications, 2018 - ieeexplore.ieee.org
Mobile social networks (MSNs) have continuously been expanding and trying to be
innovative. Recent advances of mobile edge computing (MEC), caching, and device-to …

Hierarchical fixed priority pre-emptive scheduling

RI Davis, A Burns - 26th IEEE International Real-Time Systems …, 2005 - ieeexplore.ieee.org
This paper focuses on the hierarchical scheduling of systems where a number of separate
applications reside on a single processor. It addresses the particular case where fixed …

Words are important: A textual content based identity resolution scheme across multiple online social networks

DK Srivastava, B Roychoudhury - Knowledge-Based Systems, 2020 - Elsevier
Identity resolution of a person using various online social networks can enable an interested
party to have a better and holistic understanding of former's behavior and personality. Major …

Privacy protection and intrusion avoidance for cloudlet-based medical data sharing

M Chen, Y Qian, J Chen, K Hwang… - IEEE transactions on …, 2016 - ieeexplore.ieee.org
With the popularity of wearable devices, along with the development of clouds and cloudlet
technology, there has been increasing need to provide better medical care. The processing …

Image steganography using uncorrelated color space and its application for security of visual contents in online social networks

K Muhammad, M Sajjad, I Mehmood, S Rho… - Future Generation …, 2018 - Elsevier
Image steganography is a growing research field, where sensitive contents are embedded
in images, keeping their visual quality intact. Researchers have used correlated color space …