Kambiz Ghazinour

Orcid: 0000-0002-6816-2968

According to our database1, Kambiz Ghazinour authored at least 47 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
$kt$-Safety: Graph Release via $k$-Anonymity and $t$-Closeness.
IEEE Trans. Knowl. Data Eng., September, 2023

Mitigating Social Media Privacy Concerns - A Comprehensive Study.
Proceedings of the 9th ACM International Workshop on Security and Privacy Analytics, 2023

2022
kt-Safety: Graph Release via k-Anonymity and t-Closeness (Technical Report).
CoRR, 2022

A Privacy Preserving Video Surveillance System for Trauma Rooms.
Proceedings of the IEEE Smartworld, 2022

Demo: A Multi-Perspective Video Streaming System with Privacy Preservation in Trauma Room.
Proceedings of the 7th IEEE/ACM Symposium on Edge Computing, 2022

A Prediction Model to help students in a Massive Open Online Course (MOOC).
Proceedings of the 18th IEEE International Conference on Intelligent Computer Communication and Processing, 2022

2021
Effective and efficient top-<i>k</i> query processing over incomplete data streams.
Inf. Sci., 2021

Online Topic-Aware Entity Resolution Over Incomplete Data Streams (Technical Report).
CoRR, 2021

Online Topic-Aware Entity Resolution Over Incomplete Data Streams.
Proceedings of the SIGMOD '21: International Conference on Management of Data, 2021

Anonymous Prediction of Mental Illness in Social Media.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Photos and Tags: A Method to Evaluate Privacy Behavior.
CoRR, 2020

Children's Online Privacy from Parents' Perspective.
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020

A Novel Approach to Social Media Privacy Education Through Simulated Role Reversal.
Proceedings of the 11th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2020) / The 10th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2020) / Affiliated Workshops, 2020

2019
Skyline queries over incomplete data streams.
VLDB J., 2019

Skyline Queries Over Incomplete Data Streams (Technical Report).
CoRR, 2019

Efficient Join Processing Over Incomplete Data Streams (Technical Report).
CoRR, 2019

Digital-PASS: A Simulation-based Approach to Privacy Education.
Proceedings of the 18th ACM Workshop on Privacy in the Electronic Society, 2019

Towards Privacy-Aware Smart Surveillance.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

A Privacy Protection Layer for Wearable Devices.
Proceedings of the Foundations and Practice of Security - 12th International Symposium, 2019

Efficient Join Processing Over Incomplete Data Streams.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

Quantifying the Effect of Cognitive Bias on Security Decision-Making for Authentication Methods.
Proceedings of the Advances in Brain Inspired Cognitive Systems, 2019

2018
Security Mental Model: Cognitive map approach.
CoRR, 2018

2017
A Model to Protect Sharing Sensitive Information in Smart Watches.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

Hidden Privacy Risks in Sharing Pictures on Social Media.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

I am at home: Spatial Privacy Concerns with Social Media Check-ins.
Proceedings of the 8th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2017) / The 7th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2017) / Affiliated Workshops, 2017

No-reference image quality metric based on features evaluation.
Proceedings of the IEEE 7th Annual Computing and Communication Workshop and Conference, 2017

2016
YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks.
CoRR, 2016

Classification of Image Distortions Based on Features Evaluation.
Proceedings of the IEEE International Symposium on Multimedia, 2016

A Privacy-aware Platform for Sharing Personal Information on Wearable Devices.
Proceedings of the 7th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN 2016)/The 6th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH-2016)/Affiliated Workshops, 2016

A Usability Study on the Privacy Policy Visualization Model.
Proceedings of the 2016 IEEE 14th Intl Conf on Dependable, 2016

2015
Dynamic Modeling for Representing Access Control Policies Effect.
CoRR, 2015

A Dynamic Trust Model Enforcing Security Policies.
Proceedings of the IPAC '15: International Conference on Intelligent Information Processing, 2015

An autonomous model to enforce security policies based on user's behavior.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

An adaptive fuzzy multimodal biometric system for identification and verification.
Proceedings of the 14th IEEE/ACIS International Conference on Computer and Information Science, 2015

2014
A Model for Privacy Compromisation Value.
Proceedings of the 5th International Conference on Emerging Ubiquitous Systems and Pervasive Networks (EUSPN-2014)/ The 4th International Conference on Current and Future Trends of Information and Communication Technologies in Healthcare (ICTH 2014)/ Affiliated Workshops, 2014

2013
Monitoring and recommending privacy settings in social networks.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

A privacy preserving model bridging data provider and collector preferences.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Personal Health Information detection in unstructured web documents.
Proceedings of the 26th IEEE International Symposium on Computer-Based Medical Systems, 2013

Detecting Health-Related Privacy Leaks in Social Networks Using Text Mining Tools.
Proceedings of the Advances in Artificial Intelligence, 2013

2011
Capturing P3P semantics using an enforceable lattice-based structure.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

2010
Extending SQL to Support Privacy Policies.
Proceedings of the From Sociology to Computing in Social Networks - Theory, 2010

Analysis of social networking privacy policies.
Proceedings of the 2010 EDBT/ICDT Workshops, Lausanne, Switzerland, March 22-26, 2010, 2010

2009
A Lattice-Based Privacy Aware Access Control Model.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

A Model for Privacy Policy Visualization.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

A Data Privacy Taxonomy.
Proceedings of the Dataspace: The Final Frontier, 2009

SQL Privacy Model for Social Networks.
Proceedings of the 2009 International Conference on Advances in Social Network Analysis and Mining, 2009

2008
A linear solver for benchmarking partitioners.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008


  Loading...