From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Disclosure risk measures for the sampling disclosure control method., , и . SAC, стр. 301-306. ACM, (2004)Generating Microdata with P -Sensitive K -Anonymity Property., , и . Secure Data Management, том 4721 из Lecture Notes in Computer Science, стр. 124-141. Springer, (2007)Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014)., , и . Trans. Data Priv., 8 (1): 1-2 (2015)A privacy preserving efficient protocol for semantic similarity join using long string attributes., , и . PAIS, стр. 6. ACM, (2011)Fighting fake news spread in online social networks: Actual trends and future research directions., , и . IEEE BigData, стр. 4453-4457. IEEE Computer Society, (2017)Efficient approximation algorithms to determine minimum partial dominating sets in social networks., , и . IEEE BigData, стр. 2390-2397. IEEE Computer Society, (2015)Community Detection in Anonymized Social Networks., , и . EDBT/ICDT Workshops, том 1133 из CEUR Workshop Proceedings, стр. 396-405. CEUR-WS.org, (2014)Assessing global disclosure risk in masked microdata., , и . WPES, стр. 85-93. ACM, (2004)On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited., , и . Secure Data Management, том 6933 из Lecture Notes in Computer Science, стр. 18-32. Springer, (2011)User-controlled generalization boundaries for p-sensitive k-anonymity., , и . SAC, стр. 1103-1104. ACM, (2010)