Publications

Export 287 results:
Sort by: Author Title Type [ Year  (Desc)]
2013
Lin Q, Wang J, Qiao W. Denoising of wind speed data by wavelet thresholding. In: Chinese Automation Congress (CAC), 2013. Chinese Automation Congress (CAC), 2013.; 2013:518–521.
Hommersom A, Verwer SE, Lucas PJF. Discovering Probabilistic Structures of Healthcare Processes. In: Process Support and Knowledge Representation in Health Care. Process Support and Knowledge Representation in Health Care.; 2013:53–67.
De Paula Costa E, Verwer SE, Blockeel H. Estimating Prediction Certainty in Decision Trees. In: Advances in Intelligent Data Analysis (IDA). Advances in Intelligent Data Analysis (IDA).; 2013:138–149.
Verwer SE, Calders T. Introducing Positive Discrimination in Predictive Models. In: Discrimination and Privacy in the Information Society. Discrimination and Privacy in the Information Society.; 2013:255–270.
Doerr C, Blenn N. Metric convergence in social network sampling. In: Proceedings of the 5th ACM workshop on HotPlanet. Proceedings of the 5th ACM workshop on HotPlanet.; 2013:45–50.
Jeckmans AJP, Beye M, Erkin Z, et al. Privacy in Recommender Systems. In: Hua X-S, Ramzan N, van Zwol R, Lee J-S, Clüver K Social Media Retrieval. Social Media Retrieval.; 2013:263-281.
Bakhtiari M, Nateghizad M, Zainal A. Secure Search Over Encrypted Data in Cloud Computing. In: Proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies. Proceedings of the 2013 International Conference on Advanced Computer Science Applications and Technologies.; 2013:290–295. Download: SSED.pdf (240.77 KB)
Verwer SE, van den Braak S, Choenni S. Sharing confidential data for algorithm development by multiple imputation. In: Proceedings of the International Conference on Scientific and Statistical Database Management (SSDBM). Proceedings of the International Conference on Scientific and Statistical Database Management (SSDBM).; 2013:42.
2012
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy-Preserving Content-Based Recommendations through Homomorphic Encryption. In: 33rd WIC Symposium on Information Theory in the Benelux. 33rd WIC Symposium on Information Theory in the Benelux. Boekelo, The Netherlands; 2012. Download: Privacy-Preserving Content-Based Recommendations through Homomorphic Encryption - 2012.pdf (128.24 KB)
Veugen T. Improving the DGK comparison protocol. In: IEEE Workshop on Information Forensics and Security. IEEE Workshop on Information Forensics and Security. Tenerife; 2012. Download: 0000049.pdf (1.23 MB)
Puech W, Erkin Z, Barni M, Rane S, Lagendijk RL. Emerging Cryptographic Challenges in Image and Video Processing. IEEE International Conference on Image Processing. 2012. Download: 0002629.pdf (128.89 KB)
Erkin Z, Beye M, Veugen T, Lagendijk RL. Privacy-Preserving Content-Based Recommender System. In: The 14th ACM Workshop on Multimedia and Security. The 14th ACM Workshop on Multimedia and Security. Coventry, UK; 2012:77-84. Download: Privacy-Preserving Content-Based Recommender System - 2012.pdf (134.14 KB)
Kamiran F, Karim A, Verwer SE, Goudriaan H. Classifying socially sensitive data without discrimination: an analysis of a crime suspect dataset. In: Data Mining Workshops (ICDMW) at IEEE International Conference on Data Mining (ICDM). Data Mining Workshops (ICDMW) at IEEE International Conference on Data Mining (ICDM).; 2012:370–377.
Blenn N, Doerr C, Shadravan N, Van Mieghem P. How much do your friends know about you?: reconstructing private information from the friendship graph. In: Proceedings of the Fifth Workshop on Social Network Systems. Proceedings of the Fifth Workshop on Social Network Systems.; 2012:2.