default search action
Kambiz Ghazinour
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c37]Sangeeta Kumawat, Gideon Sodipo, Deepak Palei, Safa Shubbar, Kambiz Ghazinour:
An Evaluation of Machine Learning Models for Analyzing Disaster-Related Tweets. ICICT 2024: 105-110 - [c36]Mehdi Ghayoumi, Kambiz Ghazinour:
Advancing MAISON: Integrating Deep Learning and Social Dynamics in Cyberbullying Detection and Prevention. ICICT 2024: 453-461 - 2023
- [j3]Weilong Ren, Kambiz Ghazinour, Xiang Lian:
$kt$-Safety: Graph Release via $k$-Anonymity and $t$-Closeness. IEEE Trans. Knowl. Data Eng. 35(9): 9102-9113 (2023) - [c35]Jeremy McHatton, Kambiz Ghazinour:
Mitigating Social Media Privacy Concerns - A Comprehensive Study. IWSPA@CODASPY 2023: 27-32 - 2022
- [c34]Bhaskar Thadisetty, Kambiz Ghazinour, Preoyati Khan:
A Prediction Model to help students in a Massive Open Online Course (MOOC). ICCP 2022: 167-172 - [c33]Zhengyong Ren, Yuxin Yang, Kambiz Ghazinour, Sara Bayramzadeh, Qiang Guan:
Demo: A Multi-Perspective Video Streaming System with Privacy Preservation in Trauma Room. SEC 2022: 310-312 - [c32]Zhengyong Ren, Kambiz Ghazinour, Qiang Guan, Sara Bayramzadeh, Yuxin Yang:
A Privacy Preserving Video Surveillance System for Trauma Rooms. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 1716-1721 - [i8]Weilong Ren, Kambiz Ghazinour, Xiang Lian:
kt-Safety: Graph Release via k-Anonymity and t-Closeness (Technical Report). CoRR abs/2210.17479 (2022) - 2021
- [j2]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Effective and efficient top-k query processing over incomplete data streams. Inf. Sci. 544: 343-371 (2021) - [c31]Srikanth Tadisetty, Kambiz Ghazinour:
Anonymous Prediction of Mental Illness in Social Media. CCWC 2021: 954-960 - [c30]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Online Topic-Aware Entity Resolution Over Incomplete Data Streams. SIGMOD Conference 2021: 1478-1490 - [e1]Ken Barker, Kambiz Ghazinour:
Data and Applications Security and Privacy XXXV - 35th Annual IFIP WG 11.3 Conference, DBSec 2021, Calgary, Canada, July 19-20, 2021, Proceedings. Lecture Notes in Computer Science 12840, Springer 2021, ISBN 978-3-030-81241-6 [contents] - [i7]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Online Topic-Aware Entity Resolution Over Incomplete Data Streams (Technical Report). CoRR abs/2103.08720 (2021) - 2020
- [c29]Kambiz Ghazinour, Sean Scarnecchia, Jake Rabideau, Blake Pecore:
A Novel Approach to Social Media Privacy Education Through Simulated Role Reversal. EUSPN/ICTH 2020: 112-119 - [c28]Paweena Manotipya, Kambiz Ghazinour:
Children's Online Privacy from Parents' Perspective. EUSPN/ICTH 2020: 178-185 - [i6]Roba Darwish, Kambiz Ghazinour:
Photos and Tags: A Method to Evaluate Privacy Behavior. CoRR abs/2006.11804 (2020)
2010 – 2019
- 2019
- [j1]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Skyline queries over incomplete data streams. VLDB J. 28(6): 961-985 (2019) - [c27]Tahani Albalawi, Kambiz Ghazinour, Austin Melton:
Quantifying the Effect of Cognitive Bias on Security Decision-Making for Authentication Methods. BICS 2019: 139-154 - [c26]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Efficient Join Processing Over Incomplete Data Streams. CIKM 2019: 209-218 - [c25]Muhammad Mohzary, Srikanth Tadisetty, Kambiz Ghazinour:
A Privacy Protection Layer for Wearable Devices. FPS 2019: 363-370 - [c24]Emil Shirima, Kambiz Ghazinour:
Towards Privacy-Aware Smart Surveillance. FPS 2019: 398-406 - [c23]Kambiz Ghazinour, Ken Messner, Sean Scarnecchia, David Selinger:
Digital-PASS: A Simulation-based Approach to Privacy Education. WPES@CCS 2019: 162-174 - [i5]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Efficient Join Processing Over Incomplete Data Streams (Technical Report). CoRR abs/1908.08654 (2019) - [i4]Weilong Ren, Xiang Lian, Kambiz Ghazinour:
Skyline Queries Over Incomplete Data Streams (Technical Report). CoRR abs/1909.11224 (2019) - 2018
- [i3]Tahani Albalawi, Kambiz Ghazinour, Austin Melton:
Security Mental Model: Cognitive map approach. CoRR abs/1807.06729 (2018) - 2017
- [c22]Omar Alaql, Kambiz Ghazinour, Cheng-Chang Lu:
No-reference image quality metric based on features evaluation. CCWC 2017: 1-7 - [c21]Kambiz Ghazinour, Emil Shirima, Vijayasimha Reddy Parne, Abhilash BhoomReddy:
A Model to Protect Sharing Sensitive Information in Smart Watches. EUSPN/ICTH 2017: 105-112 - [c20]Kambiz Ghazinour, John Ponchak:
Hidden Privacy Risks in Sharing Pictures on Social Media. EUSPN/ICTH 2017: 267-272 - [c19]Jayakrishnan Ajayakumar, Kambiz Ghazinour:
I am at home: Spatial Privacy Concerns with Social Media Check-ins. EUSPN/ICTH 2017: 551-558 - 2016
- [c18]Kambiz Ghazinour, Tahani Albalawi:
A Usability Study on the Privacy Policy Visualization Model. DASC/PiCom/DataCom/CyberSciTech 2016: 578-585 - [c17]Kambiz Ghazinour, Wesley Delp, Jimmy Gross, Ali Taheri Moghadam, Timothy Strawbridge, Jake Tobin:
A Privacy-aware Platform for Sharing Personal Information on Wearable Devices. EUSPN/ICTH 2016: 205-210 - [c16]Omar Alaql, Kambiz Ghazinour, Cheng Chang:
Classification of Image Distortions Based on Features Evaluation. ISM 2016: 345-346 - [i2]Kambiz Ghazinour, Stan Matwin, Marina Sokolova:
YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks. CoRR abs/1602.01937 (2016) - 2015
- [c15]Kambiz Ghazinour, Mehdi Ghayoumi:
An autonomous model to enforce security policies based on user's behavior. ICIS 2015: 95-99 - [c14]Mehdi Ghayoumi, Kambiz Ghazinour:
An adaptive fuzzy multimodal biometric system for identification and verification. ICIS 2015: 137-141 - [c13]Kambiz Ghazinour, Mehdi Ghayoumi:
A Dynamic Trust Model Enforcing Security Policies. IPAC 2015: 28:1-28:5 - [i1]Kambiz Ghazinour, Mehdi Ghayoumi:
Dynamic Modeling for Representing Access Control Policies Effect. CoRR abs/1505.08154 (2015) - 2014
- [c12]Kambiz Ghazinour, Amir Hossein Razavi, Ken Barker:
A Model for Privacy Compromisation Value. EUSPN/ICTH 2014: 143-152 - 2013
- [c11]Kambiz Ghazinour, Marina Sokolova, Stan Matwin:
Detecting Health-Related Privacy Leaks in Social Networks Using Text Mining Tools. Canadian AI 2013: 25-39 - [c10]Amir Hossein Razavi, Kambiz Ghazinour:
Personal Health Information detection in unstructured web documents. CBMS 2013: 155-160 - [c9]Kambiz Ghazinour, Stan Matwin, Marina Sokolova:
Monitoring and recommending privacy settings in social networks. EDBT/ICDT Workshops 2013: 164-168 - [c8]Kambiz Ghazinour, Ken Barker:
A privacy preserving model bridging data provider and collector preferences. EDBT/ICDT Workshops 2013: 174-178 - 2011
- [c7]Kambiz Ghazinour, Ken Barker:
Capturing P3P semantics using an enforceable lattice-based structure. PAIS 2011: 4 - 2010
- [c6]Leanne Wu, Maryam Majedi, Kambiz Ghazinour, Ken Barker:
Analysis of social networking privacy policies. EDBT/ICDT Workshops 2010 - [p1]Kambiz Ghazinour, Sampson Pun, Maryam Majedi, Amir H. Chinaei, Ken Barker:
Extending SQL to Support Privacy Policies. From Sociology to Computing in Social Networks 2010: 377-393
2000 – 2009
- 2009
- [c5]Maryam Majedi, Kambiz Ghazinour, Amir H. Chinaei, Ken Barker:
SQL Privacy Model for Social Networks. ASONAM 2009: 369-370 - [c4]Ken Barker, Mina Askari, Mishtu Banerjee, Kambiz Ghazinour, Brenan Mackas, Maryam Majedi, Sampson Pun, Adepele Williams:
A Data Privacy Taxonomy. BNCOD 2009: 42-54 - [c3]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Model for Privacy Policy Visualization. COMPSAC (2) 2009: 335-340 - [c2]Kambiz Ghazinour, Maryam Majedi, Ken Barker:
A Lattice-Based Privacy Aware Access Control Model. CSE (3) 2009: 154-159 - 2008
- [c1]Kambiz Ghazinour, Ruth E. Shaw, Eric E. Aubanel, Lawrence E. Garey:
A linear solver for benchmarking partitioners. IPDPS 2008: 1-8
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-27 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint