Computing Reviews
Today's Issue Hot Topics Search Browse Recommended My Account Log In
Browse by topic Browse by titles Authors Reviewers Browse by issue Browse Help
Search
  Li, Feng Add to Alert Profile  
 
Options:
Date Reviewed  
  1 - 3 of 3 reviews    
  A two-stage deanonymization attack against anonymized social networks
Peng W., Li F., Zou X., Wu J. IEEE Transactions on Computers 63(2): 290-303, 2014.  Type: Article

We live in an era of social networks where privacy control is a massive concern. Users leave digital traces, which may breach privacy even after anonymization. Social networking service providers collect user-provided data, and the use...
...
Nov 4 2014  
  Interference cancellation using space-time processing and precoding design
Li F., Springer Publishing Company, Incorporated, New York, NY, 2012. 108 pp.  Type: Book (978-3-642307-11-9)

Cellular communication networks are interference limited rather than noise limited. Interference differs from noise in that it is caused by other devices, such as other mobile devices using the same network. Whereas noise can be overco...
...
Feb 1 2013  
  Who is talking? An ontology-based opinion leader identification framework for word-of-mouth marketing in online social blogs
Li F., Du T. Decision Support Systems 51(1): 190-197, 2011.  Type: Article

This paper proposes BARR, a framework for blog analysis. The framework considers blog content, author properties, reader properties, and the relationship between the author and the readers. Use of this framework can help identify hot t...
...
Sep 2 2011  

   
Send Your Comments
Contact Us
Reproduction in whole or in part without permission is prohibited.   Copyright 1999-2024 ThinkLoud®
Terms of Use
| Privacy Policy