Abstract is missing.
- Privacy, Polarization, and Passage of Divisive LawsBenjamin Johnson, Paul Laskowski. 1-9 [doi]
- PhotoSafer: Content-Based and Context-Aware Private Photo Protection for SmartphonesAng Li, David Darling, Qinghua Li. 10-18 [doi]
- Epsilon Voting: Mechanism Design for Parameter Selection in Differential PrivacyNitin Kohli, Paul Laskowski. 19-30 [doi]
- The Potential for User-Tailored Privacy on FacebookMoses Namara, Henry Sloan, Priyanka Jaiswal, Bart P. Knijnenburg. 31-42 [doi]
- BigBing: Privacy-Preserving Cloud-Based Malware Classification ServiceYunus Kucuk, Nikhil Patil, Zhan Shu, Guanhua Yan. 43-54 [doi]
- Efficient Privacy-Preserving Outsourcing of Large-Scale Geometric ProgrammingWei Bao, Qinghua Li. 55-63 [doi]
- Informational Privacy, A Right to Explanation, and Interpretable AITae Wan Kim, Bryan R. Routledge. 64-74 [doi]
- Privacy-Preserving Data Collection in Context-Aware ApplicationsWei Li, Chunqiang Hu, Tianyi Song, Jiguo Yu, Xiaoshuang Xing, Zhipeng Cai. 75-85 [doi]
- Deriving Privacy Settings for Location Sharing: Are Context Factors Always the Best Choice?Frederic Raber, Antonio Krüger. 86-94 [doi]
- Privacy Enabled Crowdsourced Transmitter Localization Using Adjusted MeasurementsHarsimran Singh, Shamik Sarkar, Anuj Dimri, Aditya Bhaskara, Neal Patwari, Sneha Kumar Kasera, Samuel Ramirez, Kurt Derr. 95-106 [doi]
- A Cloud-Based Secure and Privacy-Preserving Clustering Analysis of Infectious DiseaseJianqing Liu, Yaodan Hu, Hao Yue, Yanmin Gong, Yuguang Fang. 107-116 [doi]
- Privacy-Preserving POI Recommendation Using Nonnegative Matrix FactorizationXiwei Wang, Hao Yang 0002, Kiho Lim. 117-118 [doi]
- A Reputation Management Framework for MANETsShiwen Wang, Hui Xia. 119-120 [doi]
- Malware Variants Detection Using Behavior Destructive FeaturesYongle Chen, Bingchu Jin, Dan Yu, Junjie Chen. 121-122 [doi]
- Backward Thinking of Routing with High Uncertainties: Causal Entropy Based Routing in Multi-Agent NetworksZhonghu Xu, Kai Xing, Xuefeng Liu, Jiannong Cao. 123-124 [doi]
- Privacy Preserving Scheme for Location Based Services Using Cryptographic ApproachYuwen Pu, Jin Luo, Ying Wang, Chunqiang Hu, Yan Huo, Jiong Zhang. 125-126 [doi]