All Stories

  1. Responsible AI Day
  2. AugmenToxic: Leveraging Reinforcement Learning to Optimize LLM Instruction Fine-Tuning for Data Augmentation to Enhance Toxicity Detection
  3. Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
  4. A Simple Guide to Understanding AI in Finding Malware
  5. Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding
  6. VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution
  7. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  8. Detecting High-Engaging Breaking News Rumors in Social Media
  9. Young Chinese Consumers’ Choice between Product-Related and Sustainable Cues—The Effects of Gender Differences and Consumer Innovativeness
  10. Detecting breaking news rumors of emerging topics in social media
  11. Systematic approach to provide building occupants with feedback to reduce energy consumption
  12. A cross-national study of young female consumer behaviour, innovativeness and apparel evaluation: China and India
  13. Arabic Authorship Attribution
  14. Development of a ranking procedure for energy performance evaluation of buildings based on occupant behavior
  15. Learning Stylometric Representations for Authorship Analysis
  16. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  17. Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning
  18. Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care
  19. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  20. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  21. Development of building energy saving advisory: A data mining approach
  22. Opportunistic mining of top-n high utility patterns
  23. Differentially private multidimensional data publishing
  24. Improving interpretations of topic modeling in microblogs
  25. Kam1n0
  26. Scalable code clone search for malware analysis
  27. Privacy-preserving trajectory stream publishing
  28. Quantifying the costs and benefits of privacy-preserving health data publishing
  29. BinClone: Detecting Code Clones in Malware
  30. D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups
  31. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  32. Anonymizing trajectory data for passenger flow analysis
  33. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  34. Using data mining to analyse fashion consumers’ preferences from a cross-national perspective
  35. Preface to the Fourth IEEE Workshop on Privacy Aspects of Data Mining
  36. Correlated network data publication via differential privacy
  37. Subject-based semantic document clustering for digital forensic investigations
  38. A unified data mining solution for authorship analysis in anonymous textual communications
  39. Privacy-preserving trajectory data publishing by local suppression
  40. Product customization of tablet computers based on the information of online reviews by customers
  41. Extracting knowledge from building-related data — A data mining framework
  42. Analyzing topics and authors in chat logs for crime investigation
  43. Modeling, extraction, and transformation of semantics in computer aided engineering systems
  44. Preserving privacy and frequent sharing patterns for social network data publishing
  45. Privacy-preserving heterogeneous health data sharing
  46. Direct Discovery of High Utility Itemsets without Candidate Generation
  47. Mining Criminal Networks from Chat Log
  48. A novel methodology for knowledge discovery through mining associations between building operational data
  49. Mining criminal networks from unstructured text documents
  50. Differentially private transit data publication
  51. Frequent grams based embedding for privacy preserving record linkage
  52. Secure Distributed Framework for Achieving ε-Differential Privacy
  53. Service-Oriented Architecture for High-Dimensional Private Data Mashup
  54. Service-oriented architecture for sharing private spatial-temporal data
  55. A methodology for identifying and improving occupant behavior in residential buildings
  56. A systematic procedure to study the influence of occupant behavior on building energy consumption
  57. Differentially private data release for data mining
  58. Towards discovering criminal communities from textual data
  59. Verification of data pattern for interactive privacy preservation model
  60. Anonymity meets game theory: secure data integration with malicious participants
  61. A decision tree method for building energy demand modeling
  62. Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
  63. Mining writeprints from anonymous e-mails for forensic investigation
  64. Privacy-preserving data publishing
  65. Anonymizing data with quasi-sensitive attribute values
  66. e-mail authorship verification for forensic investigation
  67. Using RFID tags to improve pilgrimage management
  68. Service-Oriented Architecture for Privacy-Preserving Data Mashup
  69. Preserving Privacy for Location-Based Services with Continuous Queries
  70. Privacy-preserving data publishing for cluster analysis
  71. Preserving RFID data privacy
  72. Anonymizing healthcare data
  73. Anonymizing location-based RFID data
  74. Privacy protection for RFID data
  75. Privacy-preserving data mashup
  76. Walking in the crowd
  77. Publishing Sensitive Transactions for Itemset Utility
  78. An Efficient Hybrid Hierarchical Document Clustering Method
  79. A novel approach of mining write-prints for authorship attribution in e-mail forensics
  80. A framework for privacy-preserving cluster analysis
  81. Anonymity for continuous data publishing
  82. Anonymizing Classification Data for Privacy Preservation
  83. Handicapping attacker's confidence: an alternative to k-anonymization
  84. Template-Based Privacy Preservation in Classification Problems
  85. Top-Down Specialization for Information and Privacy Preservation