Publications

You are here

Export 5 results:
Author [ Title(Desc)] Type Year
Filters: Author is Anna Monreale  [Clear All Filters]
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
A. Monreale, Naretto, F., and Rizzo, S., Agnostic Label-Only Membership Inference Attack, in 17th International Conference on Network and System Security, 2023.
R. Guidotti, Monreale, A., and Pedreschi, D., The AI black box Explanation Problem, ERCIM NEWS, pp. 12–13, 2019.
R. Pellungrini, Pappalardo, L., Pratesi, F., and Monreale, A., Analyzing Privacy Risk in Human Mobility Data, in Software Technologies: Applications and Foundations - STAF 2018 Collocated Workshops, Toulouse, France, June 25-29, 2018, Revised Selected Papers, 2018.
S. Mascetti, Monreale, A., Ricci, A., and Gerino, A., Anonymity: a Comparison between the Legal and Computer Science Perspectives., in The 5rd International Conference on Computers, Privacy, and Data Protection: “European Data Protection: Coming of Age”, 2012.
A. Monreale, Pedreschi, D., Pensa, R. G., and Pinelli, F., Anonymity preserving sequential pattern mining, Artif. Intell. Law, vol. 22, pp. 141–173, 2014.
R. G. Pensa, Monreale, A., Pinelli, F., and Pedreschi, D., Anonymous Sequences from Trajectory Data, 17th Italian Symposium on Advanced Database Systems. Camogli, Italy, 2009.
M. Berlingerio, Coscia, M., Giannotti, F., Monreale, A., and Pedreschi, D., As Time Goes by: Discovering Eras in Evolving Social Networks, in PAKDD (1), 2010, pp. 81-90.
R.Liu, Wang, H. Wendy, Monreale, A., Pedreschi, D., Giannotti, F., and Guo, W., AUDIO: An Integrity Auditing Framework of Outlier-Mining-as-a-Service Systems., in Machine Learning and Knowledge Discovery in Databases, European Conference, ECML PKDD 2012 , 2012.
B. Dong, Wang, H. Wendy, Monreale, A., Pedreschi, D., Giannotti, F., and Guo, W., Authenticated Outlier Mining for Outsourced Databases, IEEE Transactions on Dependable and Secure Computing, 2017.
B. Dong, Wang, H., Monreale, A., Pedreschi, D., Giannotti, F., and Guo, W., Authenticated Outlier Mining for Outsourced Databases, IEEE Transactions on Dependable and Secure Computing, vol. 17, pp. 222 - 235, 2020.
C
A. Basu, Corena, J. C., Monreale, A., Pedreschi, D., Giannotti, F., Kiyomoto, S., Vaidya, J., and Miyake, Y., CF-inspired Privacy-Preserving Prediction of Next Location in the Cloud, in Cloud Computing Technology and Science (CloudCom), 2014 IEEE 6th International Conference on, 2014.
G. Bachi, Coscia, M., Monreale, A., and Giannotti, F., Classifying Trust/Distrust Relationships in Online Social Networks, in 2012 International Conference on Privacy, Security, Risk and Trust, {PASSAT} 2012, and 2012 International Confernece on Social Computing, SocialCom 2012, Amsterdam, Netherlands, September 3-5, 2012, 2012, pp. 552–557.
V. Grossi, Monreale, A., Nanni, M., Pedreschi, D., and Turini, F., Clustering Formulation Using Constraint Optimization, in Software Engineering and Formal Methods - {SEFM} 2015 Collocated Workshops: ATSE, HOFM, MoKMaSD, and VERY*SCART, York, UK, September 7-8, 2015, Revised Selected Papers, 2015.
R. Guidotti, Monreale, A., Nanni, M., Giannotti, F., and Pedreschi, D., Clustering Individual Transactional Data for Masses of Users, in Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2017.
A. Monreale, Trasarti, R., Pedreschi, D., Renso, C., and Bogorny, V., C-safety: a framework for the anonymization of semantic trajectories, Transactions on Data Privacy, vol. 4, pp. 73-101, 2011.

Pages