Skip to main content

Research Repository

Advanced Search

All Outputs (2)

Proximity user identification using correlogram (2010)
Book Chapter
Shahidi, S., Mazrooei, P., Esfahani, N., & Saraee, M. (2010). Proximity user identification using correlogram. In Intelligent Information Processing (343-351). Berlin: Springer -Velag

This paper represents a technique, applying user action patterns in order to distinguish between users and identify them. In this method, users’ actions sequences are mapped to numerical sequences and each user's profile is generated using autocorre... Read More about Proximity user identification using correlogram.

Privacy-preserving data mining in peer to peer networks (2010)
Book Chapter
Hussain, I., Irakleous, M., Siddiqi, M., & Saraee, M. (2010). Privacy-preserving data mining in peer to peer networks. In proceedings from the Annual International Conference on Data Analysis, Data Quality and Metadata Management. GSTF

In recent years, privacy-preserving data mining has been studied extensively, due to the wide increase of sensitive information on the internet. A number of algorithms and procedures have been designed, some of which are yet to be implemented, but a... Read More about Privacy-preserving data mining in peer to peer networks.