Author of the publication

Adaptive Attacks and Targeted Fingerprinting of Relational Data.

, , and . IEEE Big Data, page 5792-5801. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Query Logs of USPTO Patent Examiners., and . CLEF, volume 8138 of Lecture Notes in Computer Science, page 136-142. Springer, (2013)Dictionary Based Amharic Sentiment Lexicon Generation., , and . ICT4DA, volume 1026 of Communications in Computer and Information Science, page 311-326. Springer, (2019)Cluster Analysis as a First Step in the Knowledge Discovery Process., and . J. Adv. Comput. Intell. Intell. Informatics, 4 (4): 258-262 (2000)User Interaction for Mobile Devices., , , , and . Multimodal Processing and Interaction, Springer, (2008)The Map of Mozart., , and . ISMIR, page 351-352. (2006)Visualizing Electronic Document Repositories: Drawing Books and Papers in a Digital Library., and . VDB, volume 168 of IFIP Conference Proceedings, page 95-. Kluwer, (2000)Content-based music indexing and organization., , and . SIGIR, page 409-410. ACM, (2002)Automatic text representation, classification and labeling in European law., , and . ICAIL, page 78-87. ACM, (2001)Which One to Choose: Random Walks or Spreading Activation?, , and . IRFC, volume 8849 of Lecture Notes in Computer Science, page 112-119. Springer, (2014)Migrating Home Computer Audio Waveforms to Digital Objects: A Case Study on Digital Archaeology., , , , and . IJDC, 6 (1): 79-98 (2011)