A data privacy taxonomy K Barker, M Askari, M Banerjee, K Ghazinour, B Mackas, M Majedi, S Pun, ... Dataspace: The Final Frontier: 26th British National Conference on Databases …, 2009 | 161 | 2009 |
Monitoring and recommending privacy settings in social networks K Ghazinour, S Matwin, M Sokolova Proceedings of the Joint EDBT/ICDT 2013 Workshops, 164-168, 2013 | 60 | 2013 |
YOURPRIVACYPROTECTOR, A recommender system for privacy settings in social networks K Ghazinour, S Matwin, M Sokolova arXiv preprint arXiv:1602.01937, 2016 | 58 | 2016 |
A study on digital forensic tools K Ghazinour, DM Vakharia, KC Kannaji, R Satyakumar 2017 IEEE international conference on power, control, signals and …, 2017 | 56 | 2017 |
A model for privacy policy visualization K Ghazinour, M Majedi, K Barker 2009 33rd Annual IEEE International Computer Software and Applications …, 2009 | 50 | 2009 |
Analysis of social networking privacy policies L Wu, M Majedi, K Ghazinour, K Barker Proceedings of the 2010 EDBT/ICDT Workshops, 1-5, 2010 | 35 | 2010 |
Hidden privacy risks in sharing pictures on social media K Ghazinour, J Ponchak Procedia computer science 113, 267-272, 2017 | 30 | 2017 |
A lattice-based privacy aware access control model K Ghazinour, M Majedi, K Barker 2009 International Conference on Computational Science and Engineering 3 …, 2009 | 28 | 2009 |
A usability study on the privacy policy visualization model K Ghazinour, T Albalawi 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th …, 2016 | 26 | 2016 |
From sociology to computing in social networks: Theory, foundations and applications N Memon, R Alhajj Springer Science & Business Media, 2010 | 25 | 2010 |
Skyline queries over incomplete data streams W Ren, X Lian, K Ghazinour The VLDB Journal 28 (6), 961-985, 2019 | 20 | 2019 |
Capturing P3P semantics using an enforceable lattice-based structure K Ghazinour, K Barker Proceedings of the 4th International Workshop on Privacy and Anonymity in …, 2011 | 18 | 2011 |
I am at home: spatial privacy concerns with social media check-ins J Ajayakumar, K Ghazinour Procedia computer science 113, 551-558, 2017 | 16 | 2017 |
-Safety: Graph Release via -Anonymity and -Closeness W Ren, K Ghazinour, X Lian IEEE Transactions on Knowledge and Data Engineering 35 (9), 9102-9113, 2022 | 15 | 2022 |
Effective and efficient top-k query processing over incomplete data streams W Ren, X Lian, K Ghazinour Information Sciences 544, 343-371, 2021 | 15 | 2021 |
A model to protect sharing sensitive information in smart watches K Ghazinour, E Shirima, VR Parne, A BhoomReddy Procedia computer science 113, 105-112, 2017 | 15 | 2017 |
An autonomous model to enforce security policies based on user's behavior K Ghazinour, M Ghayoumi 2015 IEEE/ACIS 14th International Conference on Computer and Information …, 2015 | 15 | 2015 |
Detecting health-related privacy leaks in social networks using text mining tools K Ghazinour, M Sokolova, S Matwin Advances in Artificial Intelligence: 26th Canadian Conference on Artificial …, 2013 | 15 | 2013 |
Children’s online privacy from parents’ perspective P Manotipya, K Ghazinour Procedia Computer Science 177, 178-185, 2020 | 14 | 2020 |
Classification of image distortions for image quality assessment O Alaql, K Ghazinour, CC Lu 2016 International Conference on Computational Science and Computational …, 2016 | 12 | 2016 |