Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LSimRank: Node Similarity in a Labeled Graph., , , and . APWeb/WAIM (1), volume 12317 of Lecture Notes in Computer Science, page 127-144. Springer, (2020)Randomization Resilient To Sensitive Reconstruction, , and . CoRR, (2012)Anonymization with Worst-Case Distribution-Based Background Knowledge, , , , , and . CoRR, (2009)Can the Utility of Anonymized Data be used for Privacy Breaches?, , , , and . CoRR, (2009)Small Count Privacy and Large Count Utility in Data Publishing, , , and . CoRR, (2012)STAIRS: Towards efficient full-text filtering and dissemination in DHT environments., , and . VLDB J., 20 (6): 793-817 (2011)Maximizing bichromatic reverse nearest neighbor for L p -norm in two- and three-dimensional spaces., , , , , and . VLDB J., 20 (6): 893-919 (2011)Class Indistinguishability for Outsourcing Equality Conjunction Search., , , , , and . CLOUD, volume 11513 of Lecture Notes in Computer Science, page 253-270. Springer, (2019)Discovering Temporal Patterns for Interval-Based Events., and . DaWaK, volume 1874 of Lecture Notes in Computer Science, page 317-326. Springer, (2000)Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures., , , and . DaWaK, volume 4081 of Lecture Notes in Computer Science, page 405-416. Springer, (2006)