Author of the publication

A Two-Levels Data Anonymization Approach.

, , , and . AIAI (1), volume 583 of IFIP Advances in Information and Communication Technology, page 85-95. Springer, (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Une mesure de pertinence pour la sélection de variables dans les perceptrons multicouches., and . Rev. d'Intelligence Artif., 15 (3-4): 393-410 (2001)The structure of verbal sequences analyzed with unsupervised learning techniques, , and . CoRR, (2007)Enriched topological learning for cluster detection and visualization., , and . Neural Networks, (2012)Sparsity analysis of learned factors in Multilayer NMF., and . IJCNN, page 1-7. IEEE, (2015)Learning random subspace novelty detection filters., and . IJCNN, page 2273-2280. IEEE, (2011)Controlling orthogonality constraints for better NMF clustering., and . IJCNN, page 3894-3900. IEEE, (2014)Learning confidence exchange in Collaborative Clustering., , and . IJCNN, page 872-879. IEEE, (2011)Simultaneous Pattern and Variable Weighting during Topological Clustering., and . ICONIP (1), volume 7062 of Lecture Notes in Computer Science, page 570-579. Springer, (2011)A Hybrid System for Symbolic-Connectionist Interaction., and . NC, page 922-925. ICSC Academic Press, International Computer Science Conventions, Canada / Switzerland, (1998)Apprendre les contraintes topologiques dans les cartes auto-organisatrices., and . EGC, volume RNTI-E-20 of Revue des Nouvelles Technologies de l'Information, page 137-148. Hermann-Éditions, (2011)