Arik Friedman

According to our database1, Arik Friedman authored at least 29 papers between 2006 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Bridging the Gap Between Business, Design and Product Metrics.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

2017
Measuring, Characterizing, and Detecting Facebook Like Farms.
ACM Trans. Priv. Secur., 2017

Measuring, Characterizing, and Detecting Facebook Like Farms.
CoRR, 2017

Characterizing key stakeholders in an online black-hat marketplace.
Proceedings of the 2017 APWG Symposium on Electronic Crime Research, 2017

2016
A differential privacy framework for matrix factorization recommender systems.
User Model. User-Adapt. Interact., 2016

2015
Privacy Aspects of Recommender Systems.
Proceedings of the Recommender Systems Handbook, 2015

Rademacher Observations, Private Data, and Boosting.
CoRR, 2015

Spying on Spammers: Tracking Like Farm Accounts on Facebook.
CoRR, 2015

Characterizing Seller-Driven Black-Hat Marketplaces.
CoRR, 2015

Applying Differential Privacy to Matrix Factorization.
Proceedings of the 9th ACM Conference on Recommender Systems, 2015

Rademacher Observations, Private Data, and Boosting.
Proceedings of the 32nd International Conference on Machine Learning, 2015

2014
Paying for Likes? Understanding Facebook Like Fraud Using Honeypots.
CoRR, 2014

Censorship in the Wild: Analyzing Web Filtering in Syria.
CoRR, 2014

Secure Evaluation Protocol for Personalized Medicine.
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 2014

On the Effectiveness of Obfuscation Techniques in Online Social Networks.
Proceedings of the Privacy Enhancing Technologies - 14th International Symposium, 2014

Matrix Factorization without User Data Retention.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Privacy-Preserving Distributed Stream Monitoring.
Proceedings of the 21st Annual Network and Distributed System Security Symposium, 2014

PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation.
Proceedings of the IEEE 22nd International Symposium on Modelling, 2014

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.
Proceedings of the 2014 Internet Measurement Conference, 2014

Censorship in the Wild: Analyzing Internet Filtering in Syria.
Proceedings of the 2014 Internet Measurement Conference, 2014

Loki: A privacy-conscious platform for crowdsourced surveys.
Proceedings of the Sixth International Conference on Communication Systems and Networks, 2014

2013
Collaborative network outage troubleshooting with secure multiparty computation.
IEEE Communications Magazine, 2013

Differential privacy in intelligent transportation systems.
Proceedings of the Sixth ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2013

Exposing and mitigating privacy loss in crowdsourced survey platforms.
Proceedings of the 2013 workshop on Student workhop, 2013

Federated flow-based approach for privacy preserving connectivity tracking.
Proceedings of the Conference on emerging Networking Experiments and Technologies, 2013

2012
Is more always merrier?: a deep dive into online social footprints.
Proceedings of the 2012 ACM workshop on Workshop on Online Social Networks, 2012

2010
Data mining with differential privacy.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

2008
Providing k-anonymity in data mining.
VLDB J., 2008

2006
k-Anonymous Decision Tree Induction.
Proceedings of the Knowledge Discovery in Databases: PKDD 2006, 2006


  Loading...