|
B. Bin, and S. Milad, “Inferring Demographic of Search Users: Social Data Meets Search Queries,” in International World Wide Web Conference Committee, pp. 13-17, Rio de Janeiro, Brazil, May 2013
|
|
J. He, W. Chu, and Z. Liu, “Inferring Privacy Information from Social Networks,” in IEEE International Conference on Intelligence & Security Informatics, pp. 154-165, vol.3975 of Lecture Notes in Computer Science, Berlin, 2006
|
|
E. H. Ibrahim, A. I. Hashad, E. Shawky, and A. Maher, “Robust Breast Cancer Diagnosis on Four Different Datasets Using Multi-classifiers Fusion,” International Journal of Engineering Research & Technology(IJERT), vol. 4,no. 3, pp. 114-118, March 2015
|
|
M. Kosinski, D. Stillwell, and T. Graepel, “Private traits and Attributes are Predictable from Digital Records of Human Behavior,” Proceedings of the National Academy of Sciences, vol. 110, no. 15, pp. 5802-5805, February 2013
|
|
J. Lindamood, R. Heatherly, M. Kantarcioglu, and B. Thuraisingham. “Inferring Private Information Using Social Network Data,” in Proceeding of International Conference on World Wide Web, pp. 1145-1146, Madrid, Spain, 2009
|
|
A. Mislove, B. Viswanath, and K. P. Gummadi, “You are Know:Inferring User Profiles in Online Social Networks,” in Proceedings of the 3rd International Conference on Web Search and Web Data Mining, WSDM, pp. 251-260, New York, USA, February 2010
|
|
J. Otterbacher, “Inferring Gender of Movie Reviewers: Exploiting Writing Style, Content and Metadata,” in Proceedings of the 19th ACM International Conference on Information and Knowledge Management, CIKM’10, pp. 369-378, Toronto, On, 2010
|
|
M. Pennacchiotti, and A. Popescu, “Democrats, Republicans and Starbucks Afficionados: User Classification in Twitter,” in Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD’11, pp. 430-438, San Diego, CA, 2011
|
|
C. Shen, Z. Cai, X. Guan, Y. Du, and R.A. Maxion, “User Authentication through Mouse Dynamics,” IEEE Transaction on Information forensics and Security, vol.8, no. 1, pp. 16-30, January 2013
|
|
H. Shu, J. Zheng, D. Xu, and N. Zhao, “Predicting Big-Five Personality for Micro-blog Based on Robust Multi-task Learning,” in The 3rd International Conference of Pioneering Computer Scientists,Engineers and Educators, pp. 486-499, Changsha, China, September 2018
|
|
M. Takruri, M. W. Rashad, and H. Attia, “Multi-classifier Decision Fusion for Enhancing Melanoma Recognition Accuracy,” in The 5th International Conference on Electronic Devices, Systems and Applications (ICEDSA), pp. Ras Al Khaimah, United Arab Emirates, November 2016
|
|
Q. Tang, H. Lin, “Research on Gender Recognition for Character in Text,” Journal of Chinese Information Processing, vol 24, no. 2, pp. 46-51, 2010
|
|
S. Volkova, Y. Bachrach, M. Armstrong, and V. Sharma, “Inferring Latent User Properties from Texts Published in Social Media,” in The 29th Aaai Conference on Artificial Intelligence (www.aaai.org), pp. 4296-4297, Austin Texas, USA, January 2015
|
|
I. Weber, V. Garimella, and E. Borra, “Political Search Trends,” in Processdings of the 35th International ACM SIGIR Conference on Research and Development in Information retrieval, SIGIR’12, pp. 1012-1012, Portland, OR, 2012
|
|
H. Wei, S. He, K. Lu, “Face Verification by Confusing Local Bayesian Classifier,” Opto-Electronic Engineering, vol. 43, no. 3, pp. 80-87, March 2016
|
|
W. Xu, and X. Zhou, “Inferring Privacy Information via Social Relations,” in Proceeding of IEEE 24th International conference on Data Engineering workshop, pp. 525-530, Cancun, Mexico, April 2008
|
|
J. Ying, Y. Chang, C. Huang, and V. Tseng, “Demographic Prediction Based on Users Mobile Behaviors,” in Mobile Data Challenge 2012 Workshop, Newcastle, UK, June 2012
|
|
E. Zheleva, and L. Getoor, “To Join or not to Join: the Illusion of Privacy in Social Networks with Mixed Public and Private User Profiles,” in Proceedings of the 19th International Conference on World Wide Web, pp. 531-540, Madrid, Spain, April 2009
|