Workload characterization is a well-established discipline that plays a key role in many performance engineering studies. The large-scale social behavior inherent in the …
M Latah - Expert Systems with Applications, 2020 - Elsevier
Social bots represent a new generation of bots that make use of online social networks (OSNs) as command and control (C&C) channels. Malicious social bots have been used as …
M Chen, S Mao, Y Liu - Mobile networks and applications, 2014 - Springer
In this paper, we review the background and state-of-the-art of big data. We first introduce the general background of big data and review related technologies, such as could …
H Hu, Y Wen, TS Chua, X Li - IEEE access, 2014 - ieeexplore.ieee.org
Recent technological advancements have led to a deluge of data from distinctive domains (eg, health care and scientific sensors, user-generated data, Internet and financial …
A large amount of valuable information resides in decentralized social graphs, where no entity has access to the complete graph structure. Instead, each user maintains locally a …
Users in various web and mobile applications are vulnerable to attribute inference attacks, in which an attacker leverages a machine learning classifier to infer a target user's private …
Differential privacy (DP) is a widely accepted mathematical framework for protecting data privacy. Simply stated, it guarantees that the distribution of query results changes only …
B Wang, NZ Gong - Proceedings of the 2019 ACM SIGSAC Conference …, 2019 - dl.acm.org
Graph-based classification methods are widely used for security analytics. Roughly speaking, graph-based classification methods include collective classification and graph …
H Wei, JX Yu, C Lu, X Lin - … of the 2016 International Conference on …, 2016 - dl.acm.org
The CPU cache performance is one of the key issues to efficiency in database systems. It is reported that cache miss latency takes a half of the execution time in database systems. To …