关注
Arik Friedman
Arik Friedman
Data Scientist, Atlassian
在 atlassian.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
Data mining with differential privacy
A Friedman, A Schuster
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
6352010
Providing k-anonymity in data mining
A Friedman, R Wolff, A Schuster
The VLDB Journal—The International Journal on Very Large Data Bases 17 (4 …, 2008
1852008
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
1712014
Applying Differential Privacy to Matrix Factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
1542015
Privacy aspects of recommender systems
A Friedman, BP Knijnenburg, K Vanhecke, L Martens, S Berkovsky
Recommender Systems Handbook, 649-688, 2015
1482015
Censorship in the Wild: Analyzing Internet Filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
1242014
A differential privacy framework for matrix factorization recommender systems
A Friedman, S Berkovsky, MA Kaafar
User Modeling and User-Adapted Interaction 26 (5), 425-458, 2016
1122016
Is more always merrier?: a deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
782012
Privacy-Preserving Distributed Stream Monitoring
A Friedman, I Sharfman, D Keren, A Schuster
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014
582014
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
532013
Generating shares of secret data
G Smith, R Boreli, A Friedman, M Djatmiko
US Patent 10,360,392, 2019
462019
Characterizing key stakeholders in an online black-hat marketplace
S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ...
Electronic Crime Research (eCrime), 2017 APWG Symposium on, 17-27, 2017
452017
Privacy in Crowdsourced Platforms
T Kandappu, A Friedman, V Sivaraman, R Boreli
Privacy in a Digital, Networked World, 57-84, 2015
372015
On the effectiveness of obfuscation techniques in online social networks
T Chen, R Boreli, MA Kaafar, A Friedman
International Symposium on Privacy Enhancing Technologies Symposium, 42-62, 2014
352014
Measuring, Characterizing, and Detecting Facebook Like Farms
M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ...
ACM Transactions on Privacy and Security (TOPS) 20 (4), 13, 2017
322017
Secure evaluation protocol for personalized medicine
M Djatmiko, A Friedman, R Boreli, F Lawrence, B Thorne, S Hardy
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 159-162, 2014
222014
k-Anonymous decision tree induction
A Friedman, A Schuster, R Wolff
European Conference on Principles of Data Mining and Knowledge Discovery …, 2006
212006
Federated flow-based approach for privacy preserving connectivity tracking
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
192013
Matrix Factorization without User Data Retention
D Vallet, A Friedman, S Berkovsky
The 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining …, 2014
182014
Loki: A Privacy-Conscious Platform for Crowdsourced Surveys
T Kandappu, V Sivaraman, A Friedman, R Boreli
6th International Conference on Communication Systems& Networks (COMSNETS), 2014
172014
系统目前无法执行此操作,请稍后再试。
文章 1–20