共 30 条
[1]
Provenance for Collaboration: Detecting Suspicious Behaviors and Assessing Trust in Information
[J].
PROCEEDINGS OF THE 7TH INTERNATIONAL CONFERENCE ON COLLABORATIVE COMPUTING: NETWORKING, APPLICATIONS AND WORKSHARING (COLLABORATECOM),
2011,
:342-351
[2]
Beutel A., 2013, P 22 INT C WORLD WID, P119, DOI DOI 10.1145/2488388.2488400
[3]
Chen C, 2015, IEEE IMAGE PROC, P168, DOI 10.1109/ICIP.2015.7350781
[7]
Enache A, 2014, P 2014 IEEE INT C AU, P1
[8]
Eshraqi N, 2015, SECOND INTERNATIONAL CONGRESS ON TECHNOLOGY, COMMUNICATION AND KNOWLEDGE (ICTCK 2015), P347, DOI 10.1109/ICTCK.2015.7582694
[9]
Guo B., 2015, STAT METHODS MED RES, V26, P1323
[10]
Social Spammer Detection with Sentiment Information
[J].
2014 IEEE INTERNATIONAL CONFERENCE ON DATA MINING (ICDM),
2014,
:180-189