부산대학교 도서관
검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
교내접속
OFF
로그인
커뮤니티
공지 및 행사
게시판문의
자주묻는질문
전화/이메일 문의
도서관 일정
영문 바로가기
로그인
자료검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
온라인강좌
컬렉션
인기도서
신착도서
책 읽는 대학
테마도서
교수저작물 컬렉션
PNU 생산자료
도서관 소식지
연구·학습지원
연구지원
논문작성지원
연구정보가이드
이용교육
학습정보가이드
수업교재정보
자료이용안내
대출/반납
희망도서 신청
원문복사/상호대차
소장학술지 원문제공
외국학술지지원센터
협력기관
자료배달
SDI서비스
교외접속
시설이용안내
개관시간/층별
이용자별안내
열람실
그룹스터디룸
매체 제작/편집실
시설대관
PC/Wi-Fi/모바일
출력/복사/스캔
도서관소개
사명과 비전
역대 도서관장
연혁
조직 및 부서
통계
규정/운영세칙
오시는길
기증/기부
커뮤니티
공지 & 행사
게시판 문의
자주묻는 질문
전화/이메일 문의
도서관 일정
My Library
내서재
대출중인 도서
연체/제재
예약도서
원문복사(상호대차)
이용교육
정보 변경
전체메뉴 열기
로그인하세요
부산대학교 도서관
자료검색
통합검색
소장자료
학술논문
전자저널
학술DB
전자책
온라인강좌
컬렉션
인기도서
신착도서
책 읽는 대학
테마도서
교수저작물 컬렉션
PNU 생산자료
도서관 소식지
연구·학습지원
연구지원
논문작성지원
연구정보가이드
이용교육
학습정보가이드
수업교재정보
자료이용안내
대출/반납
희망도서 신청
원문복사/상호대차
소장학술지 원문제공
외국학술지지원센터
협력기관
자료배달
SDI서비스
교외접속
시설이용안내
개관시간/층별
이용자별안내
열람실
그룹스터디룸
매체 제작/편집실
시설대관
PC/Wi-Fi/모바일
출력/복사/스캔
도서관소개
사명과 비전
역대 도서관장
연혁
조직 및 부서
통계
규정/운영세칙
오시는길
기증/기부
커뮤니티
공지 & 행사
게시판 문의
자주묻는 질문
전화/이메일 문의
도서관 일정
My Library
내서재
대출중인 도서
연체/제재
예약도서
원문복사(상호대차)
이용교육
정보 변경
clear
교내접속
OFF
영문 바로가기
Home
통합검색
학술논문
학술논문
arrow_drop_down
통합검색
ISSN
논문명
저널명
저자명
다국어
세부검색
히라가나
가타가나
독일,프랑스,스페인
그리스
라틴
러시아
로마자
한글고어
단위기호
학술기호
타이어
몽골어
o
ㅋ
ㄱ
ㅅ
ㅈ
ㅌ
ㄷ
촉
ㄴ
ㅎ
ㅂ
ㅃ
ㅁ
야
ㄹ
와
ㅏ
あ
a
ぁ
か
ka
が
ga
さ
sa
ざ
za
た
ta
だ
da
な
na
は
ha
ば
ba
ぱ
pa
ま
ma
や
ya
ゃ
lya
ら
ra
わ
wa
ゎ
lwa
ん
n
l
い
i
ぃ
き
ki
ぎ
gi
し
si
じ
zi
ち
ti
ぢ
di
に
ni
ひ
hi
び
bi
ぴ
pi
み
mi
り
ri
ㅜ
う
u
ぅ
く
ku
ぐ
gu
す
su
ず
zu
つ
tu
づ
du
っ
ぬ
nu
ふ
hu
ぶ
bu
ぷ
pu
む
mu
ゆ
yu
ゅ
lyu
る
ru
ㅔ
え
e
ぇ
け
ke
げ
ge
せ
se
ぜ
ze
て
te
で
de
ね
ne
へ
he
べ
be
ぺ
pe
め
me
れ
re
ㅗ
お
o
ぉ
こ
ko
ご
go
そ
so
ぞ
zo
と
to
ど
do
の
no
ほ
ho
ぼ
bo
ぽ
po
も
mo
よ
yo
ょ
lyo
ろ
ro
を
wo
o
ㅋ
ㄱ
ㅅ
ㅈ
ㅌ
ㄷ
촉
ㄴ
ㅎ
ㅂ
ㅃ
ㅁ
야
ㄹ
와
ㅏ
ア
a
ァ
カ
ka
ガ
ga
サ
sa
ザ
za
タ
ta
ダ
da
ナ
na
ハ
ha
バ
ba
パ
pa
マ
ma
ヤ
ya
ャ
lya
ラ
ra
ワ
wa
ヮ
lwa
ン
n
l
イ
i
ィ
キ
ki
ギ
gi
シ
si
ジ
zi
チ
ti
ヂ
di
ニ
ni
ヒ
hi
ビ
bi
ピ
pi
ミ
mi
リ
ri
ㅜ
ウ
u
ゥ
ク
ku
グ
gu
ス
su
ズ
zu
ツ
tu
ヅ
du
ッ
ヌ
nu
フ
hu
ブ
bu
プ
pu
ム
mu
ユ
yu
ュ
lyu
ル
ru
ヴ
vu
ㅔ
エ
e
ェ
ケ
ke
ゲ
ge
セ
se
ゼ
ze
テ
te
デ
de
ネ
ne
ヘ
he
ベ
be
ぺ
pe
メ
me
レ
re
ㅗ
オ
o
ォ
コ
ko
ゴ
go
ソ
so
ゾ
zo
ト
to
ド
do
ノ
no
ホ
ho
ボ
bo
ポ
po
モ
mo
ヨ
yo
ョ
lyo
ロ
ro
ヲ
wo
ー
ー
독일어
ä
Ä
ö
Ö
ü
Ü
ß
프랑스어
á
à
Á
À
é
è
É
È
ç
Ç
ê
스페인어
à
á
Á
é
É
í
Í
Ó
ó
Ú
ú
Ñ
ñ
ä
Ä
Α
Β
Γ
Δ
Ε
Ζ
Η
Θ
Ι
Κ
Λ
Μ
Ν
Ξ
Ο
Π
Ρ
Σ
Τ
Υ
Φ
Χ
Ψ
Ω
α
β
γ
δ
ε
ζ
η
θ
ι
κ
λ
μ
ν
ξ
ο
π
ρ
ς
σ
τ
υ
φ
χ
ψ
ω
À
Á
Â
Ã
Ä
Å
Æ
Ç
È
É
Ê
Ë
Ì
Í
Î
Ï
Ð
Ñ
Ò
Ó
Ô
Õ
Ö
Ø
Ù
Ú
Û
Ü
Ý
Þ
ß
à
á
â
ã
ä
å
æ
ç
è
é
ê
ë
ì
í
î
ï
ð
ñ
ò
ó
ô
õ
ö
ø
ù
ú
û
ü
ý
þ
ÿ
А
Б
В
Г
Д
Е
Ё
Ж
З
И
Й
К
Л
М
Н
О
П
Р
С
Т
У
Ф
Х
Ц
Ч
Ш
Щ
Ъ
Ы
Ь
Э
Ю
Я
а
б
в
г
д
е
ё
ж
з
и
й
к
л
м
н
о
п
р
с
т
у
ф
х
ц
ч
ш
щ
ъ
ы
ь
э
ю
я
ⅰ
ⅱ
ⅲ
ⅳ
ⅴ
ⅵ
ⅶ
ⅷ
ⅸ
ⅹ
Ⅰ
Ⅱ
Ⅲ
Ⅳ
Ⅴ
Ⅵ
Ⅶ
Ⅷ
Ⅸ
Ⅹ
ㅥ
ㅦ
ㅧ
ㅨ
ㅩ
ㅪ
ㅫ
ㅬ
ㅭ
ㅮ
ㅯ
ㅰ
ㅱ
ㅲ
ㅳ
ㅴ
ㅵ
ㅶ
ㅷ
ㅸ
ㅹ
ㅺ
ㅻ
ㅼ
ㅽ
ㅾ
ㅿ
ㆀ
ㆁ
ㆂ
ㆃ
ㆄ
ㆅ
ㆆ
ㆇ
ㆈ
ㆉ
ㆊ
ㆋ
ㆌ
ㆍ
ㆎ
′
″
℃
Å
¢
£
¥
¤
℉
‰
$
%
F
₩
㎕
㎖
㎗
ℓ
㎘
㏄
㎣
㎤
㎥
㎦
㎙
㎚
㎛
㎜
㎝
㎞
㎟
㎠
㎡
㎢
㏊
㎍
㎎
㎏
㏏
㎈
㎉
㏈
㎧
㎨
㎰
㎱
㎲
㎳
㎴
㎵
㎶
㎷
㎸
㎹
㎀
㎁
㎂
㎃
㎄
㎺
㎻
㎽
㎾
㎿
㎐
㎑
㎒
㎓
㎔
Ω
㏀
㏁
㎊
㎋
㎌
㏖
㏅
㎭
㎮
㎯
㏛
㎩
㎪
㎫
㎬
㏝
㏐
㏓
㏃
㏉
㏜
㏆
±
×
÷
≠
≤
≥
∞
∴
∠
⊥
⌒
∂
∇
≡
≒
≪
≫
√
∽
∝
∵
∫
∬
∈
∋
⊆
⊇
⊂
⊃
∪
∩
∧
∨
¬
⇒
⇔
∀
∃
∮
∑
∏
+
-
<
=
>
ก
ข
ฃ
ค
ฅ
ฆ
ง
จ
ฉ
ช
ซ
ฌ
ญ
ฎ
ฏ
ฐ
ฑ
ฒ
ณ
ด
ต
ถ
ท
ธ
น
บ
ป
ผ
ฝ
พ
ฟ
ภ
ม
ย
ร
ฤ
ล
ฦ
ว
ศ
ษ
ส
ห
ฬ
อ
ฮ
ฯ
ะ
ั
า
ำ
ิ
ี
ึ
ื
ุ
ู
ฺ
฿
เ
แ
โ
ใ
ไ
ๅ
ๆ
็
่
้
๊
๋
์
ํ
๎
๏
᠀
᠁
᠂
᠃
᠄
᠅
᠆
᠇
᠈
᠉
᠊
᠐
᠑
᠒
᠓
᠔
᠕
᠖
᠗
᠘
᠙
ᠠ
ᠡ
ᠢ
ᠣ
ᠤ
ᠥ
ᠦ
ᠧ
ᠨ
ᠩ
ᠪ
ᠫ
ᠬ
ᠭ
ᠮ
ᠯ
ᠰ
ᠱ
ᠲ
ᠳ
ᠴ
ᠵ
ᠶ
ᠷ
ᠸ
ᠹ
ᠺ
ᠻ
ᠼ
ᠽ
ᠾ
ᠿ
ᡀ
ᡁ
ᡂ
ᡃ
ᡄ
ᡅ
ᡆ
ᡇ
ᡈ
ᡉ
ᡊ
ᡋ
ᡌ
ᡍ
ᡎ
ᡏ
발행년
-
(예 : 2010-2015)
'학술논문'
에서 검색결과
97
건 | 목록
1~10
전체선택
내보내기
Relevance
arrow_drop_down
Relevance
DateNewest
Date Oldest
10
arrow_drop_down
5
10
20
30
40
50
format_list_bulleted
format_list_bulleted
E-mail
EndNote
RefWorks
Challenges in Restructuring Community-based Moderation
Report
Tran, Chau
;
Take, Kejsi
;
Champion, Kaylea
;
Hill, Benjamin Mako
;
Greenstadt, Rachel
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Can deepfakes be created by novice users?
Report
Mehta, Pulak
;
Jagatap, Gauri
;
Gallagher, Kevin
;
Timmerman, Brian
;
Deb, Progga
;
Garg, Siddharth
;
Greenstadt, Rachel
;
Dolan-Gavitt, Brendan
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Conspiracy Brokers: Understanding the Monetization of YouTube Conspiracy Theories
Report
Ballard, Cameron
;
Goldstein, Ian
;
Mehta, Pulak
;
Smothers, Genesis
;
Take, Kejsi
;
Zhong, Victoria
;
Greenstadt, Rachel
;
Lauinger, Tobias
;
McCoy, Damon
WWW 2022 Proceedings of the ACM Web Conference, April 2022, Pages 2707-2718
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
Conference
Tran, Chau
;
Champion, Kaylea
;
Forte, Andrea
;
Hill, Benjamin Mako
;
Greenstadt, Rachel
2020 IEEE Symposium on Security and Privacy (SP) Security and Privacy (SP), 2020 IEEE Symposium on. :186-202 May, 2020
Full Text (IEEE)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
The Risks, Benefits, and Consequences of Prepublication Moderation: Evidence from 17 Wikipedia Language Editions
Report
Tran, Chau
;
Champion, Kaylea
;
Hill, Benjamin Mako
;
Greenstadt, Rachel
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
The Tools and Tactics Used in Intimate Partner Surveillance: An Analysis of Online Infidelity Forums
Report
Tseng, Emily
;
Bellini, Rosanna
;
McDonald, Nora
;
Danos, Matan
;
Greenstadt, Rachel
;
McCoy, Damon
;
Dell, Nicola
;
Ristenpart, Thomas
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain
Report
Alparslan, Yigit
;
Alparslan, Ken
;
Keim-Shenk, Jeremy
;
Khade, Shweta
;
Greenstadt, Rachel
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Studying the Online Deepfake Community.
Academic Journal
Timmerman, Brian
;
Mehta, Pulak
;
Deb, Progga
;
Gallagher, Kevin
;
Dolan-Gavitt, Brendan
;
Garg, Siddharth
;
Greenstadt, Rachel
Journal of Online Trust & Safety; Sep2023, Vol. 2 Issue 1, p1-28, 28p
Full Text (ProQuest Central)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
A Forensic Qualitative Analysis of Contributions to Wikipedia from Anonymity Seeking Users
Report
Champion, Kaylea
;
McDonald, Nora
;
Bankes, Stephanie
;
Zhang, Joseph
;
Greenstadt, Rachel
;
Forte, Andrea
;
Hill, Benjamin Mako
Proc. ACM Hum.-Comput. Interact. 3, CSCW, Article 53 (November 2019)
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
Are anonymity-seekers just like everybody else? An analysis of contributions to Wikipedia from Tor
Report
Tran, Chau
;
Champion, Kaylea
;
Forte, Andrea
;
Hill, Benjamin Mako
;
Greenstadt, Rachel
Open Access (Arxiv)
Find it@PNU
playlist_add_check
요약보기
open_in_browser
내보내기
E-mail
EndNote
RefWorks
1
2
3
4
…
7
8
9
10
다음
검색 결과 제한하기
arrow_forward
제한된 항목
[AR] Greenstadt, Rachel
clear
발행연도 제한
-
재검색
학술DB(Database Provider)
Complementary Index
(33)
ACM Full-Text Collection
(21)
IEEE Xplore Digital Library
(17)
arXiv
(13)
Science Citation Index Expanded
(6)
Academic Search Complete
(3)
Digital Access to Scholarship at Harvard (DASH)
(1)
MathSciNet via EBSCOhost
(1)
Supplemental Index
(1)
USPTO Patent Grants
(1)
add
remove
더보기
zoom_in
재검색
저널명(출판물, Title)
it professional
(4)
ieee systems journal
(3)
international conference on autonomous agents
(3)
international journal of distributed sensor networks
(3)
advances in digital forensics x
(2)
computers & electrical engineering
(2)
it professional, it prof.
(2)
2009 third ieee international conference on self-adaptive and self-organizing systems, self-adaptive and self-organizing systems, 2009. saso '09. third ieee international conference on
(1)
2011 ieee fifth international conference on semantic computing, semantic computing (icsc), 2011 fifth ieee international conference on
(1)
2011 ieee third international conference on privacy, security, risk and trust and 2011 ieee third international conference on social computing, privacy, security, risk and trust (passat) and 2011 ieee third inernational conference on social computing (socialcom), 2011 ieee third international conference on
(1)
2012 ieee sixth international conference on semantic computing
(1)
2012 ieee sixth international conference on semantic computing, semantic computing (icsc), 2012 ieee sixth international conference on
(1)
2012 ieee symposium on security & privacy
(1)
2012 ieee symposium on security & privacy workshops
(1)
2012 ieee symposium on security and privacy workshops, security and privacy workshops (spw), 2012 ieee symposium on
(1)
2012 ieee symposium on security and privacy, security and privacy (sp), 2012 ieee symposium on
(1)
2013 47th annual conference on information sciences & systems (ciss)
(1)
2013 47th annual conference on information sciences and systems (ciss), information sciences and systems (ciss), 2013 47th annual conference on
(1)
2013 apwg ecrime researchers summit, ecrime researchers summit (ecrs), 2013
(1)
2013 ieee 78th vehicular technology conference (vtc fall), vehicular technology conference (vtc fall), 2013 ieee 78th
(1)
2013 third workshop on socio-technical aspects in security and trust, socio-technical aspects in security and trust (stast), 2013 third workshop on
(1)
2014 ieee symposium on security and privacy, security and privacy (sp), 2014 ieee symposium on
(1)
2018 ieee/acm 40th international conference on software engineering: companion (icse-companion), software engineering: companion (icse-companion), 2018 ieee/acm 40th international conference on, icse-companion
(1)
2020 ieee symposium on security and privacy (sp), security and privacy (sp), 2020 ieee symposium on
(1)
acm transactions on information and system security
(1)
crosstalk: the journal of defense software engineering
(1)
financial cryptography and data security
(1)
milcom 2013 - 2013 ieee military communications conference, military communications conference, milcom 2013 - 2013 ieee
(1)
milcom 2015 - 2015 ieee military communications conference, military communications conference, milcom 2015 - 2015 ieee
(1)
proceedings of the 13th workshop on privacy in the electronic society
(1)
proceedings of the 14th acm conference on computer and communications security
(1)
proceedings of the 1st acm workshop on workshop on aisec
(1)
proceedings of the 2013 acm workshop on artificial intelligence and security
(1)
proceedings of the 2014 acm sigsac conference on computer and communications security
(1)
proceedings of the 2017 acm conference on computer supported cooperative work and social computing
(1)
proceedings of the 2017 acm sigsac conference on computer and communications security
(1)
proceedings of the 2019 chi conference on human factors in computing systems
(1)
proceedings of the 21st acm internet measurement conference
(1)
proceedings of the 2nd acm workshop on security and artificial intelligence
(1)
proceedings of the 40th international conference on software engineering: companion proceeedings
(1)
proceedings of the 5th acm workshop on information hiding and multimedia security
(1)
proceedings of the 5th international conference on electronic commerce
(1)
proceedings of the 6th international joint conference on autonomous agents and multiagent systems
(1)
proceedings of the 9th international conference on autonomous agents and multiagent systems: volume 1 - volume 1
(1)
proceedings of the 9th international symposium on open collaboration
(1)
proceedings of the acm on human-computer interaction
(1)
proceedings of the acm on human-computer interaction - cscw
(1)
proceedings of the eighth annual cyber security and information intelligence research workshop
(1)
proceedings of the fifth international joint conference on autonomous agents and multiagent systems
(1)
proceedings of the web conference 2020
(1)
add
remove
더보기
zoom_in
재검색
출판사(Publisher)
ieee
(30)
association for computing machinery
(13)
springer nature
(5)
acm
(3)
hindawi limited
(2)
ieee computer soc
(2)
assoc computing machinery
(1)
elsevier b.v.
(1)
ieee-inst electrical electronics engineers inc
(1)
pergamon-elsevier science ltd
(1)
sage publications inc
(1)
springer, heidelberg
(1)
stanford internet observatory, journal of online trust & safety
(1)
usaf software technology support center
(1)
add
remove
더보기
zoom_in
재검색
자료유형(Source Type)
Conference Materials
(58)
Academic Journals
(18)
Reports
(13)
Books
(5)
Magazines
(2)
Reviews
(1)
add
remove
더보기
zoom_in
재검색
주제어
privacy
(16)
computing and processing
(14)
machine learning
(14)
stylometry
(14)
communication, networking and broadcast technologies
(9)
components, circuits, devices and systems
(9)
security
(8)
accuracy
(7)
authentication
(7)
computer science - cryptography and security
(7)
feature extraction
(7)
anonymity
(6)
behavioral biometrics
(5)
decision fusion
(5)
detectors
(5)
tor
(5)
biometrics
(4)
computer science - human-computer interaction
(4)
engineering profession
(4)
information technology
(4)
wikipedia
(4)
authorship attribution
(3)
biometrics (access control)
(3)
computer science - computers and society
(3)
detection systems
(3)
electronic mail
(3)
fusion
(3)
google
(3)
html
(3)
insider threat
(3)
intrusion detection
(3)
multimodal biometric systems
(3)
pragmatics
(3)
signal processing and analysis
(3)
support vector machines
(3)
trust
(3)
twitter
(3)
wireless sensor networks
(3)
writing
(3)
access control
(2)
active authentication
(2)
artificial intelligence
(2)
biometry
(2)
blogs
(2)
business
(2)
computer access control
(2)
computer science
(2)
computer science - machine learning
(2)
computer science - social and information networks
(2)
computer security
(2)
add
remove
더보기
zoom_in
재검색
언어
english
(65)
add
remove
더보기
zoom_in
재검색
메일 발송
이메일
취소
확인
팝업 닫기
폴더 추가
팝업 닫기