Author of the publication

Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets.

, , , , , and . Expert Syst. Appl., (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Comparison of propagation and packet error models in vehicular networks performance., , , , , and . Veh. Commun., (2018)Preserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis., , , , and . Eng. Appl. Artif. Intell., (2020)The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data., , , , , and . Eng. Appl. Artif. Intell., (2020)Obfuscated Privacy Malware Classifiers Based on Memory Dumping Analysis., , , , and . IEEE Access, (2024)A Measurement Study of Online Tracking and Advertising in Ibero-America., , , , and . IEEE Access, (2021)Evaluation of a Query-Obfuscation Mechanism for the Privacy Protection of User Profiles., , , and . Netw. Protoc. Algorithms, 6 (2): 55-92 (2014)Empirical Analysis of the Minkowski Distance Order in Geographical Routing Protocols for VANETs., , , and . WWIC, volume 9071 of Lecture Notes in Computer Science, page 327-340. Springer, (2015)On the regulation of personal data distribution in online advertising platforms., , , and . Eng. Appl. Artif. Intell., (2019)Mathematically optimized, recursive prepartitioning strategies for k-anonymous microaggregation of large-scale datasets., , , , , and . Expert Syst. Appl., (2020)Fraud Detection Using the Fraud Triangle Theory and Data Mining Techniques: A Literature Review., , and . Comput., 10 (10): 121 (2021)