Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- short-paperOctober 2022
Effective Neural Team Formation via Negative Samples
CIKM '22: Proceedings of the 31st ACM International Conference on Information & Knowledge ManagementOctober 2022, Pages 3908–3912https://doi.org/10.1145/3511808.3557590Forming teams of experts who collectively hold a set of required skills and can successfully cooperate is challenging due to the vast pool of feasible candidates with diverse backgrounds, skills, and personalities. Neural models have been proposed to ...
- short-paperOctober 2022
SEERa: A Framework for Community Prediction
CIKM '22: Proceedings of the 31st ACM International Conference on Information & Knowledge ManagementOctober 2022, Pages 4762–4766https://doi.org/10.1145/3511808.3557529Online user communities exhibit distinct temporal dynamics in response to popular topics or breaking events. Despite abundant community detection libraries, there is yet to be one that provides access to the possible user communities in future time ...
- doctoral_thesisJanuary 2020
Towards a Framework for Preserving Privacy in VANET
AbstractVehicular Ad-hoc Network (VANET) is envisioned as an integral part of the Intelligent Transportation Systems as it promises various services and benefits such as road safety, traffic efficiency, navigation and infotainment services. However, the ...
- research-articleMay 2018
Privacy-Preserving Personal Health Record (P3HR): A Secure Android Application
ICSIE '18: Proceedings of the 7th International Conference on Software and Information EngineeringMay 2018, Pages 22–26https://doi.org/10.1145/3220267.3220271In contrast to the Electronic Medical Record (EMR) and Electronic Health Record (EHR) systems that are created to maintain and manage patient data by health professionals and organizations, Personal Health Record (PHR) systems are operated and managed ...
- research-articleOctober 2015
A privacy preserving protocol for tracking participants in phase I clinical trials
- Khaled El Emam,
- Hanna Farah,
- Saeed Samet,
- Aleksander Essex,
- Elizabeth Jonker,
- Murat Kantarcioglu,
- Craig C. Earle
Journal of Biomedical Informatics (JOBI), Volume 57, Issue COctober 2015, Pages 145–162https://doi.org/10.1016/j.jbi.2015.06.019Display Omitted We present a privacy-preserving protocol to detect concurrent trial participants.We present a name representation scheme resilient to frequency attacks.The accuracy of the protocol is similar to standard non-secure methods.For a database ...
- articleSeptember 2012
Privacy-preserving back-propagation and extreme learning machine algorithms
Data & Knowledge Engineering (DAKE), Volume 79-80September, 2012, Pages 40–61https://doi.org/10.1016/j.datak.2012.06.001Neural network systems are highly capable of deriving knowledge from complex data, and they are used to extract patterns and trends which are otherwise hidden in many applications. Preserving the privacy of sensitive data and individuals' information is ...
- ArticleJanuary 2010
Managing digital rights using JSON
CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conferenceJanuary 2010, Pages 1065–1074Prior art in the expression of digital rights using XML is demonstrated to require a process of interpretation or parsing, as is characteristic with language processing, and in addition to be subject to the cross-domain scripting problem. The expression ...
- doctoral_thesisJanuary 2010
Privacy-preserving data mining
Although data is very valuable in every organization, it must be processed in order to be useful. Data mining is a collection of techniques which find patterns and associations in raw data, and classify or cluster the items according to their ...
- ArticleAugust 2009
Privacy-Preserving Bayesian Network for Horizontally Partitioned Data
CSE '09: Proceedings of the 2009 International Conference on Computational Science and Engineering - Volume 03August 2009, Pages 9–16https://doi.org/10.1109/CSE.2009.94Construction of learning structures for Bayesian Networks is considered in this work when data is securely maintained by different parties, not willing to reveal their individual private data to each other. We propose a privacy-preserving protocol for ...
- ArticleJuly 2009
Secure two and multi-party association rule mining
CISDA'09: Proceedings of the Second IEEE international conference on Computational intelligence for security and defense applicationsJuly 2009, Pages 297–302Association rule mining provides useful knowledge from raw data in different applications such as health, insurance, marketing and business systems. However, many real world applications are distributed among two or more parties, each of which wants to ...
- ArticleMarch 2008
Privacy preserving ID3 using Gini Index over horizontally partitioned data
AICCSA '08: Proceedings of the 2008 IEEE/ACS International Conference on Computer Systems and ApplicationsMarch 2008, Pages 645–651https://doi.org/10.1109/AICCSA.2008.4493598The ID3 algorithm is a standard, popular, and simple method for data classification and decision tree creation. Since privacy-preserving data mining should be taken into consideration, several secure multi-party computation protocols have been presented ...