Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hierarchical Spherical Clustering., and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 10 (2): 157-172 (2002)The effect of constraints on information loss and risk for clustering and modification based graph anonymization methods., , and . CoRR, (2014)Semantic Microaggregation for the Anonymization of Query Logs., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 127-137. Springer, (2010)On some clustering approaches for graphs., and . FUZZ-IEEE, page 409-415. IEEE, (2011)Data Privacy for Simply Anonymized Social Network Logs Represented as Graphs - Considerations for Graph alteration Operations., and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 19 (Supplement-1): 107-125 (2011)Hesitant fuzzy sets.. Int. J. Intell. Syst., 25 (6): 529-539 (2010)An evolutionary approach to enhance data privacy., , and . Soft Comput., 15 (7): 1301-1311 (2011)Privacy-preserving data-mining through micro-aggregation for web-based e-commerce., and . Internet Res., 20 (3): 366-384 (2010)Learning weights for the quasi-weighted means.. IEEE Trans. Fuzzy Syst., 10 (5): 653-666 (2002)Multidimensional Fuzzy Integrals., and . MDAI, volume 4617 of Lecture Notes in Computer Science, page 145-155. Springer, (2007)