Arik Friedman
Arik Friedman
Data Scientist, Atlassian
Verified email at atlassian.com
TitleCited byYear
Data mining with differential privacy
A Friedman, A Schuster
Proceedings of the 16th ACM SIGKDD international conference on Knowledge …, 2010
3822010
Providing k-anonymity in data mining
A Friedman, R Wolff, A Schuster
The VLDB Journal—The International Journal on Very Large Data Bases 17 (4 …, 2008
1492008
Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots
E De Cristofaro, A Friedman, G Jourjon, MA Kaafar, MZ Shafiq
Proceedings of the 2014 Conference on Internet Measurement Conference, 129-136, 2014
1022014
Censorship in the Wild: Analyzing Internet Filtering in Syria
A Chaabane, T Chen, M Cunche, E De Cristofaro, A Friedman, MA Kaafar
Proceedings of the 2014 Conference on Internet Measurement Conference, 285-298, 2014
572014
Is more always merrier?: a deep dive into online social footprints
T Chen, MA Kaafar, A Friedman, R Boreli
Proceedings of the 2012 ACM workshop on Workshop on online social networks …, 2012
572012
Applying Differential Privacy to Matrix Factorization
A Berlioz, A Friedman, MA Kaafar, R Boreli, S Berkovsky
Proceedings of the 9th ACM Conference on Recommender Systems, 107-114, 2015
512015
Privacy-Preserving Distributed Stream Monitoring
A Friedman, I Sharfman, D Keren, A Schuster
Proceedings of the Network and Distributed System Security Symposium (NDSS), 2014
452014
Privacy aspects of recommender systems
A Friedman, BP Knijnenburg, K Vanhecke, L Martens, S Berkovsky
Recommender Systems Handbook, 649-688, 2015
412015
A differential privacy framework for matrix factorization recommender systems
A Friedman, S Berkovsky, MA Kaafar
User Modeling and User-Adapted Interaction 26 (5), 425-458, 2016
342016
Differential privacy in intelligent transportation systems
F Kargl, A Friedman, R Boreli
Proceedings of the sixth ACM conference on Security and privacy in wireless …, 2013
252013
Privacy in Crowdsourced Platforms
T Kandappu, A Friedman, V Sivaraman, R Boreli
Privacy in a Digital, Networked World, 57-84, 2015
152015
Federated flow-based approach for privacy preserving connectivity tracking
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
Proceedings of the ninth ACM conference on Emerging networking experiments …, 2013
152013
Secure evaluation protocol for personalized medicine
M Djatmiko, A Friedman, R Boreli, F Lawrence, B Thorne, S Hardy
Proceedings of the 13th Workshop on Privacy in the Electronic Society, 159-162, 2014
132014
k-Anonymous decision tree induction
A Friedman, A Schuster, R Wolff
European Conference on Principles of Data Mining and Knowledge Discovery …, 2006
132006
On the effectiveness of obfuscation techniques in online social networks
T Chen, R Boreli, MA Kaafar, A Friedman
International Symposium on Privacy Enhancing Technologies Symposium, 42-62, 2014
122014
Collaborative network outage troubleshooting with secure multiparty computation
M Djatmiko, D Schatzmann, X Dimitropoulos, A Friedman, R Boreli
IEEE Communications Magazine 51 (11), 78-84, 2013
122013
Rademacher observations, private data, and boosting
R Nock, G Patrini, A Friedman
International Conference on Machine Learning, 948-956, 2015
112015
Measuring, Characterizing, and Detecting Facebook Like Farms
M Ikram, L Onwuzurike, S Farooqi, ED Cristofaro, A Friedman, G Jourjon, ...
ACM Transactions on Privacy and Security (TOPS) 20 (4), 13, 2017
102017
Loki: A Privacy-Conscious Platform for Crowdsourced Surveys
T Kandappu, V Sivaraman, A Friedman, R Boreli
6th International Conference on Communication Systems& Networks (COMSNETS), 2014
102014
Characterizing key stakeholders in an online black-hat marketplace
S Farooqi, G Jourjon, M Ikram, MA Kaafar, E De Cristofaro, Z Shafiq, ...
Electronic Crime Research (eCrime), 2017 APWG Symposium on, 17-27, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20