Author of the publication

Paying for Likes?: Understanding Facebook Like Fraud Using Honeypots.

, , , , and . Internet Measurement Conference, page 129-136. ACM, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

No persons found for author name Friedman, Arik
add a person with the name Friedman, Arik
 

Other publications of authors with the same name

Providing k-anonymity in data mining., , and . VLDB J., 17 (4): 789-804 (2008)PrivacyCanary: Privacy-Aware Recommenders with Adaptive Input Obfuscation., , , and . MASCOTS, page 453-462. IEEE Computer Society, (2014)A differential privacy framework for matrix factorization recommender systems., , and . User Model. User-Adapt. Interact., 26 (5): 425-458 (2016)Characterizing key stakeholders in an online black-hat marketplace., , , , , , , and . eCrime, page 17-27. IEEE, (2017)Privacy-Preserving Distributed Stream Monitoring., , , and . NDSS, The Internet Society, (2014)Federated flow-based approach for privacy preserving connectivity tracking., , , , and . CoNEXT, page 429-440. ACM, (2013)Characterizing Seller-Driven Black-Hat Marketplaces., , , , , , , , and . CoRR, (2015)Applying Differential Privacy to Matrix Factorization., , , , and . RecSys, page 107-114. ACM, (2015)Differential privacy in intelligent transportation systems., , and . WISEC, page 107-112. ACM, (2013)Censorship in the Wild: Analyzing Internet Filtering in Syria., , , , , and . Internet Measurement Conference, page 285-298. ACM, (2014)