All Stories

  1. AugmenToxic: Leveraging Reinforcement Learning to Optimize LLM Instruction Fine-Tuning for Data Augmentation to Enhance Toxicity Detection
  2. Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection
  3. A Simple Guide to Understanding AI in Finding Malware
  4. Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding
  5. VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution
  6. Differentially Private Release of Heterogeneous Network for Managing Healthcare Data
  7. Detecting High-Engaging Breaking News Rumors in Social Media
  8. Young Chinese Consumers’ Choice between Product-Related and Sustainable Cues—The Effects of Gender Differences and Consumer Innovativeness
  9. Detecting breaking news rumors of emerging topics in social media
  10. Systematic approach to provide building occupants with feedback to reduce energy consumption
  11. A cross-national study of young female consumer behaviour, innovativeness and apparel evaluation: China and India
  12. Arabic Authorship Attribution
  13. Development of a ranking procedure for energy performance evaluation of buildings based on occupant behavior
  14. Learning Stylometric Representations for Authorship Analysis
  15. A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction
  16. Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning
  17. Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care
  18. Wordnet-Based Criminal Networks Mining for Cybercrime Investigation
  19. SafePath: Differentially-private publishing of passenger trajectories in transportation systems
  20. Development of building energy saving advisory: A data mining approach
  21. Opportunistic mining of top-n high utility patterns
  22. Differentially private multidimensional data publishing
  23. Improving interpretations of topic modeling in microblogs
  24. Kam1n0
  25. Scalable code clone search for malware analysis
  26. Privacy-preserving trajectory stream publishing
  27. Quantifying the costs and benefits of privacy-preserving health data publishing
  28. BinClone: Detecting Code Clones in Malware
  29. D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups
  30. Privacy-Preserving Medical Reports Publishing for Cluster Analysis
  31. Anonymizing trajectory data for passenger flow analysis
  32. Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data
  33. Using data mining to analyse fashion consumers’ preferences from a cross-national perspective
  34. Preface to the Fourth IEEE Workshop on Privacy Aspects of Data Mining
  35. Correlated network data publication via differential privacy
  36. Subject-based semantic document clustering for digital forensic investigations
  37. A unified data mining solution for authorship analysis in anonymous textual communications
  38. Privacy-preserving trajectory data publishing by local suppression
  39. Product customization of tablet computers based on the information of online reviews by customers
  40. Extracting knowledge from building-related data — A data mining framework
  41. Analyzing topics and authors in chat logs for crime investigation
  42. Modeling, extraction, and transformation of semantics in computer aided engineering systems
  43. Preserving privacy and frequent sharing patterns for social network data publishing
  44. Privacy-preserving heterogeneous health data sharing
  45. Direct Discovery of High Utility Itemsets without Candidate Generation
  46. Mining Criminal Networks from Chat Log
  47. A novel methodology for knowledge discovery through mining associations between building operational data
  48. Mining criminal networks from unstructured text documents
  49. Differentially private transit data publication
  50. Frequent grams based embedding for privacy preserving record linkage
  51. Secure Distributed Framework for Achieving ε-Differential Privacy
  52. Service-Oriented Architecture for High-Dimensional Private Data Mashup
  53. Service-oriented architecture for sharing private spatial-temporal data
  54. A methodology for identifying and improving occupant behavior in residential buildings
  55. A systematic procedure to study the influence of occupant behavior on building energy consumption
  56. Differentially private data release for data mining
  57. Towards discovering criminal communities from textual data
  58. Verification of data pattern for interactive privacy preservation model
  59. Anonymity meets game theory: secure data integration with malicious participants
  60. A decision tree method for building energy demand modeling
  61. Centralized and Distributed Anonymization for High-Dimensional Healthcare Data
  62. Mining writeprints from anonymous e-mails for forensic investigation
  63. Privacy-preserving data publishing
  64. Anonymizing data with quasi-sensitive attribute values
  65. e-mail authorship verification for forensic investigation
  66. Using RFID tags to improve pilgrimage management
  67. Service-Oriented Architecture for Privacy-Preserving Data Mashup
  68. Preserving Privacy for Location-Based Services with Continuous Queries
  69. Privacy-preserving data publishing for cluster analysis
  70. Preserving RFID data privacy
  71. Anonymizing healthcare data
  72. Anonymizing location-based RFID data
  73. Privacy protection for RFID data
  74. Privacy-preserving data mashup
  75. Walking in the crowd
  76. Publishing Sensitive Transactions for Itemset Utility
  77. An Efficient Hybrid Hierarchical Document Clustering Method
  78. A novel approach of mining write-prints for authorship attribution in e-mail forensics
  79. A framework for privacy-preserving cluster analysis
  80. Anonymity for continuous data publishing
  81. Anonymizing Classification Data for Privacy Preservation
  82. Handicapping attacker's confidence: an alternative to k-anonymization
  83. Template-Based Privacy Preservation in Classification Problems
  84. Top-Down Specialization for Information and Privacy Preservation