Title | Authors |
---|---|
Differentially Private Event Detection on Data Streams | Maryam Fanaeepour (Duke University); Ashwin Machanavajjhala (Duke University) |
Custom-made Anonymization by Data Analysis Program Provided by Recipient | Wakana Maeda (FUJITSU LABORATORIES LTD.); Yuji Yamaoka (FUJITSU LABORATORIES LTD.) |
ABACaaS: Attribute-Based Access Control as a Service | Augustee Meshram (IIT); Saptarshi Das (IIT); Shamik Sural (IIT, Kharagpur); Jaideep Vaidya (Rutgers University); Vijay Atluri (Rutgers University) |
Toward Efficient Spammers Gathering in Twitter Social Networks | Yihe Zhang (University of Louisiana at Lafayette); Hao Zhang (Oracle Inc); Xu Yuan (University of Louisiana at Lafayette) |
Large Scale PoC Experiment with 57,000 people to Accumulate Patterns for Lifestyle Authentication | Ryosuke Kobayashi (Mitsubishi Electric Information Systems Corporation); Nobuyuki Saji (INFOCORPUS Inc.); Nobuo Shigeta (The University of Tokyo); Rie Yamaguchi (The University of Tokyo) |
Scaling Cryptographic Techniques by Exploiting Data Sensitivity at a Public Cloud | Sharad Mehrotra (University of California, Irvine); Shantanu Sharma (University of California, Irvine); Jeffrey Ullman (Stanford University) |
Experiments on Malware Clustering | Houtan Faridi (University of Houston); Srivathsan Srinivasagopalan (AlienVault); Rakesh Verma (University of Houston) |