Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages
暂无分享,去创建一个
[1] Jeffrey Nichols,et al. Social media participation and performance at work: a longitudinal study , 2014, CHI.
[2] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[3] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[4] Alice E. Marwick,et al. Social Privacy in Networked Publics: Teens’ Attitudes, Practices, and Strategies , 2011 .
[5] S. Hart,et al. Development of NASA-TLX (Task Load Index): Results of Empirical and Theoretical Research , 1988 .
[6] Jeffrey T. Hancock,et al. Language Use in Computer-Mediated Communication: The Role of Coordination Devices , 2001 .
[7] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[8] Shuang-Hong Yang,et al. Large-scale high-precision topic modeling on twitter , 2014, KDD.
[9] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[10] John B. Lowe,et al. The Berkeley FrameNet Project , 1998, ACL.
[11] Pamela J. Hinds,et al. Out of Sight, Out of Sync: Understanding Conflict in Distributed Teams , 2003, Organ. Sci..
[12] Robert E. Kraut,et al. The impact of delayed visual feedback on collaborative performance , 2006, CHI.
[13] H. H. Clark,et al. Speaking while monitoring addressees for understanding , 2004 .
[14] E. Ziegel,et al. Bootstrapping: A Nonparametric Approach to Statistical Inference , 1993 .
[15] Herbert H. Clark,et al. Grounding in communication , 1991, Perspectives on socially shared cognition.
[16] Janice Y. Tsai,et al. Soups 2006 , 2006, IEEE Security & Privacy Magazine.
[17] Sri Subramaniam. Frontiers in E-commerce personalization , 2014, KDD.
[18] Naren Ramakrishnan,et al. Modeling mass protest adoption in social network communities using geometric brownian motion , 2014, KDD.
[19] P. Biernacki,et al. Snowball Sampling: Problems and Techniques of Chain Referral Sampling , 1981 .
[20] David D. Clark,et al. Rethinking the design of the Internet , 2001, ACM Trans. Internet Techn..
[21] J. Doug Tygar,et al. Why Johnny Can't Encrypt: A Usability Evaluation of PGP 5.0 , 1999, USENIX Security Symposium.
[22] 付伶俐. 打磨Using Language,倡导新理念 , 2014 .
[23] Hanna M. Wallach,et al. Topic modeling: beyond bag-of-words , 2006, ICML.
[24] Jinyun Yan,et al. LASTA: large scale topic assignment on multiple social networks , 2014, KDD.
[25] Jon M. Kleinberg,et al. Romantic partnerships and the dispersion of social ties: a network analysis of relationship status on facebook , 2013, CSCW.
[26] Susan E. Brennan,et al. The Grounding Problem in Conversations With and Through Computers , 2000 .
[27] Cindy K. Chung,et al. The Psychological Functions of Function Words , 2007 .
[28] George A. Miller,et al. WordNet: A Lexical Database for English , 1995, HLT.
[29] J. Pennebaker,et al. The Secret Life of Pronouns , 2003, Psychological science.
[30] Dan Boneh,et al. TWENTY YEARS OF ATTACKS ON THE RSA CRYPTOSYSTEM , 1999 .
[31] D. Saunders. The brave new world , 1999 .
[32] Yiming Yang,et al. Introducing the Enron Corpus , 2004, CEAS.
[33] Jeffrey Nichols,et al. Understanding individuals' personal values from social media word use , 2014, CSCW.