Computing & Information Technology

Authenticating a User on a Mobile Device

Detecting Fake News on Social Media by Message Diffusion Pathways

CrossFire: Cross Media Joint Friend and Item Recommendations

Sequential Event Prediction with Noise-Contrastive Estimation for Marked Temporal Point Process

Method for Verifying Social Media Data Received from Third-Party Providers

Privacy-Preserving Social Media Data Outsourcing

Hybrid Automata Mining from Input/Output Traces of Cyber-Physical Systems

Co-Simulation of Physical Model and Self-Adaptive Predictive Controller Using Hybrid Automata

Predict Enterprise Cyber Incidents by Social Network Analysis on Dark Web Forums

RIM: Robust Intersection Management for Connected Autonomous Vehicles