{"title":"Temporal Defenses for Robust Recommendations","authors":"N. Lathia, S. Hailes, L. Capra","doi":"10.1007/978-3-642-19896-0_6","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_6","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"209 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132200987","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Preserving Privacy in Data Mining via Importance Weighting","authors":"C. Elkan","doi":"10.1007/978-3-642-19896-0_2","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_2","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134117747","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"ASAP: Automatic Semantics-Aware Analysis of Network Payloads","authors":"Tammo Krueger, Nicole Krämer, Konrad Rieck","doi":"10.1007/978-3-642-19896-0_5","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_5","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134591373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ching-Hao Mao, H. Pao, C. Faloutsos, Hahn-Ming Lee
{"title":"SBAD: Sequence Based Attack Detection via Sequence Comparison","authors":"Ching-Hao Mao, H. Pao, C. Faloutsos, Hahn-Ming Lee","doi":"10.1007/978-3-642-19896-0_7","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_7","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"43 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122975487","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
B. Nelson, Benjamin I. P. Rubinstein, Ling Huang, A. Joseph, J. D. Tygar
{"title":"Classifier Evasion: Models and Open Problems","authors":"B. Nelson, Benjamin I. P. Rubinstein, Ling Huang, A. Joseph, J. D. Tygar","doi":"10.1007/978-3-642-19896-0_8","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_8","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"26 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126287239","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Secure Top-k Subgroup Discovery","authors":"H. Grosskreutz, B. Lemmen, S. Rüping","doi":"10.1007/978-3-642-19896-0_4","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_4","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122829453","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quadratic Error Minimization in a Distributed Environment with Privacy Preserving","authors":"G. Gavin, Julien Velcin","doi":"10.1007/978-3-642-19896-0_3","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_3","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132311218","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Edit Constraints on Microaggregation and Additive Noise","authors":"Isaac Cano, V. Torra","doi":"10.1007/978-3-642-19896-0_1","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_1","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116493975","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, E. Ferrari
{"title":"Content-Based Filtering in On-Line Social Networks","authors":"M. Vanetti, E. Binaghi, B. Carminati, M. Carullo, E. Ferrari","doi":"10.1007/978-3-642-19896-0_11","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0_11","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2010-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131045326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Christos Dimitrakakis, A. Gkoulalas-Divanis, Aikaterini Mitrokotsa, Vassilios S. Verykios, Y. Saygin
{"title":"Privacy and Security Issues in Data Mining and Machine Learning - International ECML/PKDD Workshop, PSDML 2010, Barcelona, Spain, September 24, 2010. Revised Selected Papers","authors":"Christos Dimitrakakis, A. Gkoulalas-Divanis, Aikaterini Mitrokotsa, Vassilios S. Verykios, Y. Saygin","doi":"10.1007/978-3-642-19896-0","DOIUrl":"https://doi.org/10.1007/978-3-642-19896-0","url":null,"abstract":"","PeriodicalId":406641,"journal":{"name":"Privacy and Security Issues in Data Mining and Machine Learning","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130786399","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}