video-img
01:55

Privacy Preserved

Zutao Zhu

calendar icon Feb 7, 2008 3377 views

video-img
17:58

Intelligent File Scoring System for Malware Detection from the Gray List

calendar icon Sep 14, 2009 3844 views

video-img
01:05:00

Geolocalisation in Cellular Telephone Networks

Bruce Denby

calendar icon Dec 3, 2007 6407 views

video-img
14:49

Discovering Frequent Patterns in Sensitive Data

Abhradeep Guha Thakurta

calendar icon Oct 1, 2010 4946 views

video-img
53:08

Detecting Money Laundering Actions Using Data Mining and Expert Systems

Ekrem Duman

calendar icon Dec 3, 2007 10278 views

video-img
18:47

Data Mining with Differential Privacy

Arik Friedman

calendar icon Oct 1, 2010 5248 views

video-img
20:14

Collusion-Resistant Privacy-Preserving Data Mining

Bin Yang

calendar icon Oct 1, 2010 3587 views

video-img
10:29

Beyond Blacklists: Learning to Detect Malicious Web Sites from Suspicious URLs

Justin Ma

calendar icon Sep 14, 2009 5435 views

video-img
01:58:37

Approximation algorithms for k-anonymity and privacy preservation in query logs

Aris Gionis

calendar icon Dec 3, 2007 7881 views

video-img
17:04

Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service

Noman Mohammed

calendar icon Sep 14, 2009 5278 views