9 papers:
CIKM-2013-XuZCL #bibliography- Uncovering collusive spammers in Chinese review websites (CX, JZ, KC, CL), pp. 979–988.
SAC-2012-Kerschbaum #outsourcing #set- Collusion-resistant outsourcing of private set intersection (FK), pp. 1451–1456.
ICALP-v2-2011-Huang #game studies- Collusion in Atomic Splittable Routing Games (CCH), pp. 564–575.
KDD-2010-YangNSS #data mining #mining #privacy- Collusion-resistant privacy-preserving data mining (BY, HN, IS, JS), pp. 483–492.
KDD-2009-AshrafiN- Collusion-resistant anonymous data collection method (MZA, SKN), pp. 69–78.
ICALP-2007-FurukawaA #black box #encryption- Fully Collusion Resistant Black-Box Traitor Revocable Broadcast Encryption with Short Private Keys (JF, NA), pp. 496–508.
STOC-2006-HayrapetyanTW #game studies- The effect of collusion in congestion games (AH, ÉT, TW), pp. 89–98.
STOC-2005-LepinksiMS #protocol- Collusion-free protocols (ML, SM, AS), pp. 543–552.
KDD-2002-LittleJLRS #data mining #mining- Collusion in the U.S. crop insurance program: applied data mining (BBL, WLJ, ACL, RMR, SAS), pp. 594–598.