Defensive Technology Use by Political Activists During the Sudanese Revolution.
Alaa DaffallaLucy SimkoTadayoshi KohnoAlexandru G. BardasPublished in: IEEE Symposium on Security and Privacy (2021)
Keyphrases
- st century
- cost effective
- social media
- machine learning
- data processing
- technological advances
- key technologies
- rapid development
- computer systems
- e government
- computer vision
- data management
- data structure
- clustering algorithm
- human computer interaction
- multimedia
- personal computer
- image processing
- information retrieval
- neural network