Dynamically adjusting case reporting policy to maximize privacy and public health utility in the face of a pandemic | 0 | 0.34 | 2022 |
Blockchain networks: Data structures of Bitcoin, Monero, Zcash, Ethereum, Ripple, and Iota | 1 | 0.35 | 2022 |
Data Science on Blockchains | 1 | 0.35 | 2021 |
BitcoinHeist: Topological Data Analysis for Ransomware Prediction on the Bitcoin Blockchain | 1 | 0.35 | 2020 |
Secure IoT Data Analytics in Cloud via Intel SGX | 0 | 0.34 | 2020 |
SGX-IR - Secure Information Retrieval with Trusted Processors. | 0 | 0.34 | 2020 |
A Framework for Privacy-Preserving Genomic Data Analysis Using Trusted Execution Environments | 0 | 0.34 | 2020 |
MultiModal Deception Detection: Accuracy, Applicability and Generalizability | 0 | 0.34 | 2020 |
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records | 2 | 0.37 | 2019 |
Integrating Cyber Security And Data Science For Social Media: A Position Paper | 0 | 0.34 | 2018 |
Graph Based Proactive Secure Decomposition Algorithm for Context Dependent Attribute Based Inference Control Problem. | 0 | 0.34 | 2018 |
Enforceable Data Sharing Agreements Using Smart Contracts. | 0 | 0.34 | 2018 |
Blockchain Data Analytics | 1 | 0.35 | 2018 |
CHIRON: Deployment-quality Detection of Java Cryptographic Vulnerabilities. | 0 | 0.34 | 2018 |
It's all in the timing: calibrating temporal penalties for biomedical data sharing. | 2 | 0.44 | 2018 |
Breaking Transferability of Adversarial Samples with Randomness. | 0 | 0.34 | 2018 |
Adversarial Clustering: A Grid Based Clustering Algorithm Against Active Adversaries. | 0 | 0.34 | 2018 |
An Open Source Tool for Game Theoretic Health Data De-Identification. | 0 | 0.34 | 2017 |
Blockchain: A Graph Primer. | 3 | 0.42 | 2017 |
Security Vs. Privacy: How Integrity Attacks Can Be Masked By The Noise Of Differential Privacy | 1 | 0.36 | 2017 |
Leveraging Unique CPS Properties to Design Better Privacy-Enhancing Algorithms. | 0 | 0.34 | 2017 |
Security and Privacy in Cyber-Physical Systems: A Survey of Surveys. | 29 | 0.97 | 2017 |
CheapSMC: A Framework to Minimize Secure Multiparty Computation Cost in the Cloud. | 1 | 0.35 | 2016 |
A Framework for Secure Data Collection and Management for Internet of Things | 1 | 0.36 | 2016 |
A Data Driven Approach for the Science of Cyber Security: Challenges and Directions | 0 | 0.34 | 2016 |
A Practical Framework for Executing Complex Queries over Encrypted Multimedia Data. | 0 | 0.34 | 2016 |
Adversarial Data Mining: Big Data Meets Cyber Security. | 1 | 0.40 | 2016 |
Multi-Keyword search over encrypted data with scoring and search pattern obfuscation | 8 | 0.57 | 2016 |
AccountableMR: Toward accountable MapReduce systems | 2 | 0.36 | 2015 |
A Dynamic Approach to Detect Anomalous Queries on Relational Databases | 1 | 0.40 | 2015 |
Privacy-aware dynamic feature selection | 3 | 0.38 | 2015 |
GuardMR: Fine-grained Security Policy Enforcement for MapReduce Systems | 14 | 0.70 | 2015 |
BigGate: Access Control Framework for Outsourced Key-Value Stores | 0 | 0.34 | 2015 |
Distributed Search over Encrypted Big Data | 8 | 0.48 | 2015 |
A Distributed Framework for Scalable Search over Encrypted Documents. | 1 | 0.38 | 2014 |
Adversarial Learning with Bayesian Hierarchical Mixtures of Experts. | 5 | 0.46 | 2014 |
RDF-X: a language for sanitizing RDF graphs | 0 | 0.34 | 2014 |
A trust-score-based access control in assured information sharing systems: An application of financial credit risk score models. | 0 | 0.34 | 2014 |
Inference attack against encrypted range queries on outsourced databases | 19 | 0.69 | 2014 |
Special issue on secure and privacy-aware data management | 1 | 0.36 | 2014 |
Towards fine grained RDF access control | 2 | 0.42 | 2014 |
Preventing cryptographic key leakage in cloud virtual machines | 9 | 0.44 | 2014 |
Shingled Graph Disassembly: Finding The Undecideable Path | 3 | 0.38 | 2014 |
Redaction based RDF access control language | 0 | 0.34 | 2014 |
Measuring expertise and bias in cyber security using cognitive and neuroscience approaches | 1 | 0.35 | 2013 |
Preventing Private Information Inference Attacks on Social Networks | 46 | 1.48 | 2013 |
Toward a Real-Time Cloud Auditing Paradigm | 0 | 0.34 | 2013 |
Incentive-Compatible Privacy-Preserving Distributed Data Mining | 0 | 0.34 | 2013 |
Efficient Privacy-Aware Record Integration. | 14 | 0.66 | 2013 |
A practical approach to achieve private medical record linkage in light of public resources. | 14 | 0.89 | 2013 |