video-img
01:55

Privacy Preserved

Zutao Zhu

calendar icon Feb 7, 2008 3372 views

video-img
17:58

Intelligent File Scoring System for Malware Detection from the Gray List

calendar icon Sep 14, 2009 3841 views

video-img
01:05:00

Geolocalisation in Cellular Telephone Networks

Bruce Denby

calendar icon Dec 3, 2007 6402 views

video-img
14:49

Discovering Frequent Patterns in Sensitive Data

Abhradeep Guha Thakurta

calendar icon Oct 1, 2010 4943 views

video-img
53:08

Detecting Money Laundering Actions Using Data Mining and Expert Systems

Ekrem Duman

calendar icon Dec 3, 2007 10269 views

video-img
18:47

Data Mining with Differential Privacy

Arik Friedman

calendar icon Oct 1, 2010 5244 views

video-img
20:14

Collusion-Resistant Privacy-Preserving Data Mining

Bin Yang

calendar icon Oct 1, 2010 3580 views

video-img
10:29

Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs

Justin Ma

calendar icon Sep 14, 2009 5430 views

video-img
01:58:37

Approximation algorithms for k-anonymity and privacy preservation in query logs

Aris Gionis

calendar icon Dec 3, 2007 7876 views

video-img
17:04

Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service

Noman Mohammed

calendar icon Sep 14, 2009 5275 views