Data mining with differential privacy A Friedman, A Schuster Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010 | 635 | 2010 |
Providing k-anonymity in data mining A Friedman, R Wolff, A Schuster The VLDB Journal—The International Journal on Very Large Data Bases 17 (4 …, 2008 | 185 | 2008 |
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014 | 171 | 2014 |
Applying Differential Privacy to Matrix Factorization A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015 | 154 | 2015 |
Privacy aspects of recommender systems A Friedman, BP Knijnenburg, K Vanhecke, L Martens, S Berkovsky Recommender Systems Handbook, 649-688, 2015 | 148 | 2015 |
Censorship in the Wild: Analyzing Internet Filtering in Syria A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014 | 124 | 2014 |
A differential privacy framework for matrix factorization recommender systems A Friedman, S Berkovsky, MA Kaafar User Modeling and User-Adapted Interaction 26 (5), 425-458, 2016 | 112 | 2016 |
Is more always merrier?: a deep dive into online social footprints T Chen, MA Kaafar, A Friedman, R Boreli Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012 | 78 | 2012 |
Privacy-Preserving Distributed Stream Monitoring A Friedman, I Sharfman, D Keren, A Schuster Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014 | 58 | 2014 |
Differential privacy in intelligent transportation systems F Kargl, A Friedman, R Boreli Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013 | 53 | 2013 |
Generating shares of secret data G Smith, R Boreli, A Friedman, M Djatmiko US Patent 10,360,392, 2019 | 46 | 2019 |
Characterizing key stakeholders in an online black-hat marketplace S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ... Electronic Crime Research (eCrime), 2017 APWG Symposium on, 17-27, 2017 | 45 | 2017 |
Privacy in Crowdsourced Platforms T Kandappu, A Friedman, V Sivaraman, R Boreli Privacy in a Digital, Networked World, 57-84, 2015 | 37 | 2015 |
On the effectiveness of obfuscation techniques in online social networks T Chen, R Boreli, MA Kaafar, A Friedman International Symposium on Privacy Enhancing Technologies Symposium, 42-62, 2014 | 35 | 2014 |
Measuring, Characterizing, and Detecting Facebook Like Farms M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ... ACM Transactions on Privacy and Security (TOPS) 20 (4), 13, 2017 | 32 | 2017 |
Secure evaluation protocol for personalized medicine M Djatmiko, A Friedman, R Boreli, F Lawrence, B Thorne, S Hardy Proceedings of the 13th Workshop on Privacy in the Electronic Society, 159-162, 2014 | 22 | 2014 |
k-Anonymous decision tree induction A Friedman, A Schuster, R Wolff European Conference on Principles of Data Mining and Knowledge Discovery …, 2006 | 21 | 2006 |
Federated flow-based approach for privacy preserving connectivity tracking M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013 | 19 | 2013 |
Matrix Factorization without User Data Retention D Vallet, A Friedman, S Berkovsky The 18th Pacific-Asia Conference on Knowledge Discovery and Data Mining …, 2014 | 18 | 2014 |
Loki: A Privacy-Conscious Platform for Crowdsourced Surveys T Kandappu, V Sivaraman, A Friedman, R Boreli 6th International Conference on Communication Systems& Networks (COMSNETS), 2014 | 17 | 2014 |