All Stories

  1. Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding
  2. VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution
  3. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  4. Detecting High-Engaging Breaking News Rumors in Social Media
  5. Young Chinese Consumers’ Choice between Product-Related and Sustainable Cues—The Effects of Gender Differences and Consumer Innovativeness
  6. Detecting breaking news rumors of emerging topics in social media
  7. Systematic approach to provide building occupants with feedback to reduce energy consumption
  8. A cross-national study of young female consumer behaviour, innovativeness and apparel evaluation: China and India
  9. Arabic Authorship Attribution
  10. Development of a ranking procedure for energy performance evaluation of buildings based on occupant behavior
  11. Learning Stylometric Representations for Authorship Analysis
  12. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  13. Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning
  14. Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care
  15. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  16. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  17. Development of building energy saving advisory: A data mining approach
  18. Opportunistic mining of top-n high utility patterns
  19. Differentially private multidimensional data publishing
  20. Improving interpretations of topic modeling in microblogs
  21. Kam1n0
  22. Scalable code clone search for malware analysis
  23. Privacy-preserving trajectory stream publishing
  24. Quantifying the costs and benefits of privacy-preserving health data publishing
  25. BinClone: Detecting Code Clones in Malware
  26. D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups
  27. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  28. Anonymizing trajectory data for passenger flow analysis
  29. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  30. Using data mining to analyse fashion consumers’ preferences from a cross-national perspective
  31. Preface to the Fourth IEEE Workshop on Privacy Aspects of Data Mining
  32. Correlated network data publication via differential privacy
  33. Subject-based semantic document clustering for digital forensic investigations
  34. A unified data mining solution for authorship analysis in anonymous textual communications
  35. Privacy-preserving trajectory data publishing by local suppression
  36. Product customization of tablet computers based on the information of online reviews by customers
  37. Extracting knowledge from building-related data — A data mining framework
  38. Analyzing topics and authors in chat logs for crime investigation
  39. Modeling, extraction, and transformation of semantics in computer aided engineering systems
  40. Preserving privacy and frequent sharing patterns for social network data publishing
  41. Privacy-preserving heterogeneous health data sharing
  42. Direct Discovery of High Utility Itemsets without Candidate Generation
  43. Mining Criminal Networks from Chat Log
  44. A novel methodology for knowledge discovery through mining associations between building operational data
  45. Mining criminal networks from unstructured text documents
  46. Differentially private transit data publication
  47. Frequent grams based embedding for privacy preserving record linkage
  48. Secure Distributed Framework for Achieving ε-Differential Privacy
  49. Service-Oriented Architecture for High-Dimensional Private Data Mashup
  50. Service-oriented architecture for sharing private spatial-temporal data
  51. A methodology for identifying and improving occupant behavior in residential buildings
  52. A systematic procedure to study the influence of occupant behavior on building energy consumption
  53. Differentially private data release for data mining
  54. Towards discovering criminal communities from textual data
  55. Verification of data pattern for interactive privacy preservation model
  56. Anonymity meets game theory: secure data integration with malicious participants
  57. A decision tree method for building energy demand modeling
  58. Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
  59. Mining writeprints from anonymous e-mails for forensic investigation
  60. Privacy-preserving data publishing
  61. Anonymizing data with quasi-sensitive attribute values
  62. e-mail authorship verification for forensic investigation
  63. Using RFID tags to improve pilgrimage management
  64. Service-Oriented Architecture for Privacy-Preserving Data Mashup
  65. Preserving Privacy for Location-Based Services with Continuous Queries
  66. Privacy-preserving data publishing for cluster analysis
  67. Preserving RFID data privacy
  68. Anonymizing healthcare data
  69. Anonymizing location-based RFID data
  70. Privacy protection for RFID data
  71. Privacy-preserving data mashup
  72. Walking in the crowd
  73. Publishing Sensitive Transactions for Itemset Utility
  74. An Efficient Hybrid Hierarchical Document Clustering Method
  75. A novel approach of mining write-prints for authorship attribution in e-mail forensics
  76. A framework for privacy-preserving cluster analysis
  77. Anonymity for continuous data publishing
  78. Anonymizing Classification Data for Privacy Preservation
  79. Handicapping attacker's confidence: an alternative to k-anonymization
  80. Template-Based Privacy Preservation in Classification Problems
  81. Top-Down Specialization for Information and Privacy Preservation