Search Results

You are looking at 1 - 8 of 8 items for :

  • Databases and Data Mining x
Clear All
Open access

Gábor György Gulyás, Gergely Acs and Claude Castelluccia

: Persistent tracking mechanisms in the wild. In ACM CCS, pages 674-689, 2014. [4] J. P. Achara, G. Acs, and C. Castelluccia. On the unicity of smartphone applications. In Proceedings of WPES, pages 27-36. ACM, 2015. [5] Article 29 Data Protection Working Party. Opinion 05/2014 on anonymization techniques, April 2014. [6] K. Boda, A. M. Földes, G. G. Gulyás, and S. Imre. User tracking on the web via cross-browser fingerprinting. In P. Laud, editor, Information Security Technology for Applications, volume 7161 of LNCS, pages 31

Open access

Lixue Zou, Li Wang, Yingqi Wu, Caroline Ma, Sunny Yu and Xiwen Liu, Caroline Ma ( and Sunny Yu ( collected the data. Xiwen Liu ( conceived and designed the analysis. References Chemical Abstracts Service. Retrieved from . Chemical Abstracts Service. Retrieved from Eck, N.J.V., & Waltman, L. (2009). How to normalize cooccurrence data? An analysis of some well-known similarity measures. Journal of the American society for information science and technology, 60(8), 1635–1651. 10.1002/asi.21075 Eck N.J.V. Waltman L. 2009 How to normalize

Open access

Miha Kovačič, Božidar Šarler and Uroš Župerl

.1080/10426914.2010.525576. [4] Kovačič M. Modeling of Total Decarburization of Spring Steel with Genetic Programming. Mater Manuf Process 2014;30:434-43. doi: 10.1080/10426914.2014.961477. [5] Kovačič M., Rožej U., Brezočnik M., Genetic Algorithm Rolling Mill Layout Optimization. Mater Manuf Process 2013;28:783-7. doi: 10.1080/10426914.2012.718475. [6] Zuperl U., Cus F., System for off-line feedrate optimization and neural force control in end milling. Int J Adapt Control Signal Process 2012;26:105-23. doi: 10.1002/acs.1277. [7] Zuperl U

Open access

Niklas Buescher, Spyros Boukoros, Stefan Bauregger and Stefan Katzenbeisser

, A. Brito, and H. Almeida, “A technique to provide differential privacy for appliance usage in smart metering,” Information Sciences , vol. 370, pp. 355–367, 2016. [22] M. Backes and S. Meiser, “Differentially private smart metering with battery recharging,” in Data Privacy Management and Autonomous Spontaneous Security , pp. 194–212, Springer, 2014. [23] Z. Zhang, Z. Qin, L. Zhu, J. Weng, and K. Ren, “Costfriendly differential privacy for smart meters: exploiting the dual roles of the noise,” IEEE Transactions on Smart Grid , 2016. [24] G. Ács

Open access

Apostolos Pyrgelis, Carmela Troncoso and Emiliano De Cristofaro

References [1] Waze. , 2016. [2] G. Acs and C. Castelluccia. A case study: privacy preserving release of spatio-temporal density in paris. In KDD , 2014. [3] M. E. Andrés, N. E. Bordenabe, K. Chatzikokolakis, and C. Palamidessi. Geo-indistinguishability: Differential privacy for location-based systems. In CCS , 2013. [4] S. Bocconi, A. Bozzon, A. Psyllidis, C. Titos Bolivar, and G.-J. Houben. Social glass: A platform for urban analytics and decision-making through heterogeneous social data. In WWW , 2015. [5

Open access

Thee Chanyaswad, Changchang Liu and Prateek Mittal

References [1] Martin Abadi, Andy Chu, Ian Goodfellow, H. Brendan McMahan, Ilya Mironov, Kunal Talwar, and Li Zhang. Deep learning with differential privacy. In CCS , pages 308–318. ACM, 2016. [2] Gergely Acs, Claude Castelluccia, and Rui Chen. Differentially private histogram publishing through lossy compression. In ICDM , pages 1–10. IEEE, 2012. [3] Gergely Acs, Luca Melis, Claude Castelluccia, and Emil-iano De Cristofaro. Differentially private mixture of generative neural networks. arXiv preprint arXiv:1709.04514 , 2017. [4] Michael

Open access

Alexandra-Mihaela Olteanu, Mathias Humbert, Kévin Huguenin and Jean-Pierre Hubaux

. Pervasive and Mobile Computing (PMC) , Nov. 2015. [12] A. Chaabane, G. Acs, and M. Kaafar. You are what you like# information leakage through users’ interests. In NDSS , 2012. [13] J. Chen, J. W. Ping, Y. C. Xu, and B. C. Tan. Information privacy concern about peer disclosure in online social networks. IEEE Transactions on Engineering Management , 62(3):311–324, 2015. [14] H. Cho and A. Filippova. Networked privacy management in Facebook: A mixed-methods and multinational study. In Proc. of CSCW . ACM, 2016. [15] D. Crandall, L. Backstrom, D

Open access

Kassem Fawaz, Kyu-Han Kim and Kang G. Shin

trajectories,” in Proceedings of the The Ninth International Conference on Mobile Data Management, ser. MDM ’08. Washington, DC, USA: IEEE Computer Society, 2008, pp. 65-72. [Online]. Available: [23] R. Chen, G. Acs, and C. Castelluccia, “Differentially private sequential data publication via variable-length n-grams,” in Proceedings of the 2012 ACM Conference on Computer and Communications Security, ser. CCS ’12. New York, NY, USA: ACM, 2012, pp. 638-649. [Online]. Available: