9 papers:
- CIKM-2013-XuZCL #bibliography
- Uncovering collusive spammers in Chinese review websites (CX, JZ, KC, CL), pp. 979–988.
- SAC-2012-Kerschbaum #outsourcing #set
- Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
- ICALP-v2-2011-Huang #game studies
- Collusion in Atomic Splittable Routing Games (CCH), pp. 564–575.
- KDD-2010-YangNSS #data mining #mining #privacy
- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
- KDD-2009-AshrafiN
- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
- ICALP-2007-FurukawaA #black box #encryption
- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
- STOC-2006-HayrapetyanTW #game studies
- The effect of collusion in congestion games (AH, ÉT, TW), pp. 89–98.
- STOC-2005-LepinksiMS #protocol
- Collusion-free protocols (ML, SM, AS), pp. 543–552.
- KDD-2002-LittleJLRS #data mining #mining
- Collusion in the U.S. crop insurance program: applied data mining (BBL, WLJ, ACL, RMR, SAS), pp. 594–598.