October 8, 2014

Security Evaluation of Pattern Classifiers under Attack |FTJ1425

Security Evaluation of Pattern Classifiers under Attack : IEEE 2014 Abstract: Pattern classification systems are commonly used in adversarial applications, like biometric authentication, network intrusion detection, […]
October 8, 2014

Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development |FTJ1318

Tweet Analysis for Real-Time Event Detection and Earthquake Reporting System Development : IEEE2013 Abstract—Twitter has received much attention recently. An important characteristic of Twitter is its […]
October 8, 2014

Privacy-Preserving and Content-Protecting Location Based Queries |FTJ1424

Privacy-Preserving and Content-Protecting Location Based Queries : IEEE 2014 Abstract—In this paper we present a solution to one of the location-based query problems. This problem is […]
October 8, 2014

Protecting Sensitive Labels in Social Network Data Anonymization |FTJ1317

Protecting Sensitive Labels in Social Network Data Anonymization : IEEE2013 Abstract—Privacy is one of the major concerns when publishing or sharing social network data for social […]
October 8, 2014

Keyword Query Routing |FTJ1423

Keyword Query Routing : IEEE 2014 Abstract: Keyword search is an intuitive paradigm for searching linked data sources on the web. We propose to route keywords […]