Mayana Pereira

According to our database1, Mayana Pereira authored at least 14 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CaPS: Collaborative and Private Synthetic Data Generation from Distributed Sources.
CoRR, 2024

2023
Assessment of Differentially Private Synthetic Data for Utility and Fairness in End-to-End Machine Learning Pipelines for Tabular Data.
CoRR, 2023

Navigating the Web of Misinformation: A Framework for Misinformation Domain Detection Using Browser Traffic.
CoRR, 2023

2022
Secure Multiparty Computation for Synthetic Data Generation from Distributed Data.
CoRR, 2022

2021
An Analysis of the Deployment of Models Trained on Private Tabular Synthetic Data: Unexpected Surprises.
CoRR, 2021

U.S. Broadband Coverage Data Set: A Differentially Private Data Release.
CoRR, 2021

2020
Metadata-Based Detection of Child Sexual Abuse Material.
CoRR, 2020

2019
Identifying Security Bug Reports Based Solely on Report Titles and Noisy Data.
Proceedings of the IEEE International Conference on Smart Computing, 2019

2018
Algorithmically Generated Domain Detection and Malware Family Classification.
Proceedings of the Security in Computing and Communications - 6th International Symposium, 2018

Dictionary Extraction and Detection of Algorithmically Generated Domain Names in Passive DNS Traffic.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

2016
Predicting Future Frequent Users of Emergency Departments in California State.
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016

Risk Stratification for Hospital Readmission of Heart Failure Patients: A Machine Learning Approach.
Proceedings of the 7th ACM International Conference on Bioinformatics, 2016

2015
Public-Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH and HDH Assumptions.
Comput. J., 2015

2010
Public Key Encryption Schemes with Bounded CCA Security and Optimal Ciphertext Length Based on the CDH Assumption.
Proceedings of the Information Security - 13th International Conference, 2010


  Loading...