Arik Friedman

According to our database1, Arik Friedman authored at least 28 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




Continuous Data-driven Software Engineering - Towards a Research Agenda: Report on the Joint 5th International Workshop on Rapid Continuous Software Engineering (RCoSE 2019) and 1st International Works.
ACM SIGSOFT Softw. Eng. Notes, 2019

Bridging the Gap Between Business, Design and Product Metrics.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

The right metric for the right stakeholder: a case study of improving product usability.
Proceedings of the 30th Australian Conference on Computer-Human Interaction, 2018

Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

A differential privacy framework for matrix factorization recommender systems.
User Model. User Adapt. Interact., 2016

Privacy Aspects of Recommender Systems.
Proceedings of the Recommender Systems Handbook, 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

Applying Differential Privacy to Matrix Factorization.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

Rademacher Observations, Private Data, and Boosting.
Proceedings of the 32nd International Conference on Machine Learning, 2015

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Secure Evaluation Protocol for Personalized Medicine.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Matrix Factorization without User Data Retention.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Privacy-Preserving Distributed Stream Monitoring.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

Loki: A privacy-conscious platform for crowdsourced surveys.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

Collaborative network outage troubleshooting with secure multiparty computation.
IEEE Commun. Mag., 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Exposing and mitigating privacy loss in crowdsourced survey platforms.
Proceedings of the 2013 workshop on Student workhop, 2013

Federated flow-based approach for privacy preserving connectivity tracking.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

Is more always merrier?: a deep dive into online social footprints.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

Data mining with differential privacy.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

Providing <i>k</i>-anonymity in data mining.
VLDB J., 2008

<i>k</i>-Anonymous Decision Tree Induction.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006