72 A Hybrid Approach for Detecting Automated Spammers in Twitter SECURE COMPUTING JAVA/2018
73 A Provably-Secure Cross-Domain Handshake Scheme with Symptoms-Matching for Mobile Healthcare Social Network SECURE COMPUTING JAVA/2018
74 Anonymization of Sensitive Quasi-Identifiers for l-Diversity and t- Closeness SECURE COMPUTING JAVA/2018
75 Collective Data-Sanitization for Preventing Sensitive Information Inference Attacks in Social Networks SECURE COMPUTING JAVA/2018
76 Exploiting Social Network to Enhance Human-to-Human Infection Analysis Without Privacy Leakage SECURE COMPUTING JAVA/2018

 

 

68 FastGeo: Efficient Geometric Range Queries on Encrypted Spatial

Data

SECURE COMPUTING JAVA/2017
69 My Privacy My Decision: Control of Photo Sharing on Online

Social Networks

SECURE COMPUTING JAVA/2017
70 Privacy-Preserving Selective Aggregation of Online User Behavior

Data

SECURE COMPUTING JAVA/2017
71 ProGuard: Detecting Malicious Accounts in Social-Network-Based

Online Promotions

SECURE COMPUTING JAVA/2017
72 Search Rank Fraud and Malware Detection in Google Play SECURE COMPUTING JAVA/2017
73 Towards Detecting Compromised Accounts on Social Networks SECURE COMPUTING JAVA/2017

 

63 Contributory Broadcast Encryption with Efficient Encryption and Short Ciphertexts SECURE COMPUTING JAVA/2016
64 Data Lineage in Malicious  Environments SECURE COMPUTING JAVA/2016

 

65 Detecting  Malicious Facebook Applications SECURE COMPUTING JAVA/2016
66 FRoDO: Fraud Resilient Device for Off-Line   Micro-Payments SECURE COMPUTING JAVA/2016
67 Inference Attack on Browsing History of Twitter Users using Public Click Analytics and Twitter  Metadata SECURE COMPUTING JAVA/2016
68 Resolving Multi-party Privacy Conflicts in Social  Media SECURE COMPUTING JAVA/2016