Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Influence maximization in the presence of vulnerable nodes: A ratio perspective., , , and . Theor. Comput. Sci., (2021)Reverse-Safe Text Indexing., , , , and . ACM J. Exp. Algorithmics, (2021)Clustering sequence graphs., , and . Data Knowl. Eng., (2022)Pattern Masking for Dictionary Matching., , , , , , and . ISAAC, volume 212 of LIPIcs, page 65:1-65:19. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Making de Bruijn Graphs Eulerian., , , , , and . CPM, volume 223 of LIPIcs, page 12:1-12:18. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2022)Bidirectional String Anchors: A New String Sampling Mechanism., and . ESA, volume 204 of LIPIcs, page 64:1-64:21. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, (2021)Space-Efficient Indexes for Uncertain Strings., , , , and . CoRR, (2024)Limiting the Influence to Vulnerable Users in Social Networks: A Ratio Perspective., , , and . AINA, volume 926 of Advances in Intelligent Systems and Computing, page 1106-1122. Springer, (2019)Location histogram privacy by sensitive location hiding and target histogram avoidance/resemblance (extended version)., and . CoRR, (2019)Bidirectional String Anchors for Improved Text Indexing and Top-$K$ Similarity Search., , and . IEEE Trans. Knowl. Data Eng., 35 (11): 11093-11111 (November 2023)