Segui
Arik Friedman
Arik Friedman
Data Scientist, Atlassian
Email verificata su atlassian.com
Titolo
Citata da
Citata da
Anno
Data mining with differential privacy
A Friedman, A Schuster
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
5452010
Providing k-anonymity in data mining
A Friedman, R Wolff, A Schuster
The VLDB Journal—The International Journal on Very Large Data Bases 17 (4 …, 2008
1722008
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
1412014
Applying Differential Privacy to Matrix Factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
1142015
Censorship in the Wild: Analyzing Internet Filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
982014
Privacy aspects of recommender systems
A Friedman, BP Knijnenburg, K Vanhecke, L Martens, S Berkovsky
Recommender Systems Handbook, 649-688, 2015
932015
A differential privacy framework for matrix factorization recommender systems
A Friedman, S Berkovsky, MA Kaafar
User Modeling and User-Adapted Interaction 26 (5), 425-458, 2016
812016
Is more always merrier?: a deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
742012
Privacy-Preserving Distributed Stream Monitoring
A Friedman, I Sharfman, D Keren, A Schuster
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014
512014
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
422013
Characterizing key stakeholders in an online black-hat marketplace
S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ...
Electronic Crime Research (eCrime), 2017 APWG Symposium on, 17-27, 2017
302017
Privacy in Crowdsourced Platforms
T Kandappu, A Friedman, V Sivaraman, R Boreli
Privacy in a Digital, Networked World, 57-84, 2015
302015
Measuring, Characterizing, and Detecting Facebook Like Farms
M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ...
ACM Transactions on Privacy and Security (TOPS) 20 (4), 13, 2017
252017
On the effectiveness of obfuscation techniques in online social networks
T Chen, R Boreli, MA Kaafar, A Friedman
International Symposium on Privacy Enhancing Technologies Symposium, 42-62, 2014
252014
Secure evaluation protocol for personalized medicine
M Djatmiko, A Friedman, R Boreli, F Lawrence, B Thorne, S Hardy
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 159-162, 2014
192014
k-Anonymous decision tree induction
A Friedman, A Schuster, R Wolff
European Conference on Principles of Data Mining and Knowledge Discovery …, 2006
182006
Federated flow-based approach for privacy preserving connectivity tracking
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
172013
Generating shares of secret data
G Smith, R Boreli, A Friedman, M Djatmiko
US Patent 10,360,392, 2019
162019
Collaborative network outage troubleshooting with secure multiparty computation
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
IEEE Communications Magazine 51 (11), 78-84, 2013
142013
Loki: A Privacy-Conscious Platform for Crowdsourced Surveys
T Kandappu, V Sivaraman, A Friedman, R Boreli
6th International Conference on Communication Systems& Networks (COMSNETS), 2014
132014
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20