CyVOD: a novel trinity multimedia social network scheme
暂无分享,去创建一个
Jian Wang | Carl K. Chang | Ranran Sun | Brij B. Gupta | Zhiyong Zhang | Changwei Zhao | Zhiyong Zhang | Changwei Zhao | Jian Wang | B. Gupta | Ranran Sun
[1] Brij B. Gupta,et al. Social media security and trustworthiness: Overview and new direction , 2016, Future Gener. Comput. Syst..
[2] Kanliang Wang,et al. A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.
[3] Zhiyong Zhang,et al. Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .
[4] Raymond Y. K. Lau,et al. Combining social network and semantic concept analysis for personalized academic researcher recommendation , 2012, Decis. Support Syst..
[5] Mahmoud Al-Ayyoub,et al. Accelerating compute intensive medical imaging segmentation algorithms using hybrid CPU-GPU implementations , 2017, Multimedia Tools and Applications.
[6] Mohammad Davarpanah Jazi,et al. PESCA: a peer-to-peer social network architecture with privacy-enabled social communication and data availability , 2015, IET Inf. Secur..
[7] Jose M. Such,et al. Open Challenges in Relationship-Based Privacy Mechanisms for Social Network Services , 2015, Int. J. Hum. Comput. Interact..
[8] Huan Liu,et al. Trust Evolution: Modeling and Its Applications , 2015, IEEE Transactions on Knowledge and Data Engineering.
[9] David Sánchez,et al. Enforcing transparent access to private content in social networks by means of automatic sanitization , 2015, Expert Syst. Appl..
[10] Guojun Wang,et al. κ-FuzzyTrust , 2015 .
[11] Guojun Wang,et al. κ-FuzzyTrust: Efficient trust computation for large-scale mobile social networks using a fuzzy implicit social graph , 2015, Inf. Sci..
[12] In-Jeong Chung,et al. Contents Recommendation Method Using Social Network Analysis , 2013, Wireless Personal Communications.
[13] Pasquale De Meo,et al. Trust Networks: Topology, Dynamics, and Measurements , 2015, IEEE Internet Computing.
[14] Yaser Jararweh,et al. Automated wireless video surveillance: an evaluation framework , 2017, Journal of Real-Time Image Processing.
[15] Jian Wang,et al. A novel authorization delegation scheme for multimedia social networks by using proxy re-encryption , 2015, Multimedia Tools and Applications.
[16] Feiping Nie,et al. Social trust prediction using heterogeneous networks , 2013, TKDD.
[17] Cécile Paris,et al. Behavior‐Based Propagation of Trust in Social Networks with Restricted and Anonymous Participation , 2015, Comput. Intell..
[18] Sai Ho Kwok,et al. Digital Rights Management for Mobile Multimedia , 2003 .
[19] Sajal K. Das,et al. Multimodal Wearable Sensing for Fine-Grained Activity Recognition in Healthcare , 2015, IEEE Internet Computing.
[20] James B. D. Joshi,et al. CPBAC: Property-based access control model for secure cooperation in online social networks , 2014, Comput. Secur..
[21] Dharma P. Agrawal,et al. Handbook of Research on Modern Cryptographic Solutions for Computer and Cyber Security , 2016 .
[22] Gail-Joon Ahn,et al. Multiparty Access Control for Online Social Networks: Model and Mechanisms , 2013, IEEE Transactions on Knowledge and Data Engineering.
[23] Kanliang Wang,et al. A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks , 2015, Comput. J..
[24] Domenico Rosaci,et al. Trust and Compactness in Social Network Groups , 2015, IEEE Transactions on Cybernetics.
[25] Seok Jong Yu,et al. The dynamic competitive recommendation algorithm in social network services , 2012, Inf. Sci..
[26] Zhen Wang,et al. A novel approach to rights sharing-enabling digital rights management for mobile multimedia , 2015, Multimedia Tools and Applications.
[27] B. B. Gupta,et al. Secure and imperceptible digital image steganographic algorithm based on diamond encoding in DWT domain , 2017, Multimedia Tools and Applications.