Semantics-Enhanced Privacy Recommendation for Social Networking Sites
暂无分享,去创建一个
Hui Wang | Juan Li | Qingrui Li | Ashok Ginjala | Wendy Hui Wang | Juan Li | Qingrui Li | Ashok Ginjala
[1] Kristen LeFevre,et al. Privacy wizards for social networking sites , 2010, WWW '10.
[2] George Danezis. Inferring privacy policies for social networking services , 2009, AISec '09.
[3] Sebastian Ryszard Kruk,et al. D-FOAF: Distributed Identity Management with Access Rights Delegation , 2006, ASWC.
[4] Gábor Csárdi,et al. The igraph software package for complex network research , 2006 .
[5] Juan Li,et al. MobiSN: Semantics-Based Mobile Ad Hoc Social Network Framework , 2009, GLOBECOM 2009 - 2009 IEEE Global Telecommunications Conference.
[6] Barbara Carminati,et al. Enforcing access control in Web-based social networks , 2009, TSEC.
[7] Frank Stajano,et al. Privacy stories: confidence in privacy behaviors through end user programming , 2009, SOUPS.
[8] Muthucumaru Maheswaran,et al. A trust based approach for protecting user data in social networks , 2007, CASCON.
[9] John Riedl,et al. GroupLens: an open architecture for collaborative filtering of netnews , 1994, CSCW '94.
[10] Upmanu Lall,et al. A Nearest Neighbor Bootstrap For Resampling Hydrologic Time Series , 1996 .
[11] Rob Johnson,et al. More Content - Less Control: Access Control in the Web 2.0 , 2006 .
[12] Ian H. Witten,et al. WEKA: a machine learning workbench , 1994, Proceedings of ANZIIS '94 - Australian New Zealnd Intelligent Information Systems Conference.
[13] Alessandro Acquisti,et al. Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.
[14] Zeng Fan-Zi,et al. A survey of classification learning algorithm , 2004, Proceedings 7th International Conference on Signal Processing, 2004. Proceedings. ICSP '04. 2004..
[15] Amirreza Masoumzadeh,et al. OSNAC: An Ontology-based Access Control Model for Social Networking Systems , 2010, 2010 IEEE Second International Conference on Social Computing.
[16] Thomas G. Dietterich. What is machine learning? , 2020, Archives of Disease in Childhood.
[17] Patrick P. Tsang,et al. Social Circles: Tackling Privacy in Social Networks , 2008 .
[18] Randy Goebel,et al. Detecting Communities in Social Networks Using Max-Min Modularity , 2009, SDM.
[19] E. Michael Maximilien,et al. Privacy-asa-Service : Models , Algorithms , and Results on the Facebook Platform , 2009 .
[20] Peter E. Hart,et al. Nearest neighbor pattern classification , 1967, IEEE Trans. Inf. Theory.
[21] M E J Newman,et al. Modularity and community structure in networks. , 2006, Proceedings of the National Academy of Sciences of the United States of America.
[22] M E J Newman,et al. Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.
[23] David A. Landgrebe,et al. A survey of decision tree classifier methodology , 1991, IEEE Trans. Syst. Man Cybern..
[24] John Riedl,et al. Analysis of recommendation algorithms for e-commerce , 2000, EC '00.
[25] Thomas R. Gruber,et al. A translation approach to portable ontology specifications , 1993, Knowl. Acquis..
[26] Jonathan L. Herlocker,et al. A collaborative filtering algorithm and evaluation metric that accurately model the user experience , 2004, SIGIR '04.
[27] Alec Wolman,et al. A Social Networking-Based Access Control Scheme for Personal Content , 2007 .
[28] Bhavani M. Thuraisingham,et al. A semantic web based framework for social network access control , 2009, SACMAT '09.
[29] Michael McGill,et al. Introduction to Modern Information Retrieval , 1983 .
[30] Jaime Delgado,et al. Using XACML for access control in Social Networks , 2009 .
[31] George Karypis,et al. Evaluation of Item-Based Top-N Recommendation Algorithms , 2001, CIKM '01.
[32] George Karypis,et al. Item-based top-N recommendation algorithms , 2004, TOIS.
[33] Pat Morin,et al. Output-Sensitive Algorithms for Computing Nearest-Neighbour Decision Boundaries , 2003, WADS.
[34] Cullen Schaffer,et al. Selecting a classification method by cross-validation , 1993, Machine Learning.
[35] Jing Peng,et al. LDA/SVM driven nearest neighbor classification , 2003, IEEE Trans. Neural Networks.
[36] Jesús Cerquides,et al. Comparison of Redundancy and Relevance Measures for Feature Selection in Tissue Classification of CT Images , 2010, ICDM.