Author of the publication

PinKDD'07: privacy, security, and trust in KDD post-workshop report.

, , , and . SIGKDD Explor., 9 (2): 93-95 (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Characterizing Uncertain Data using Compression., , and . SDM, page 534-545. SIAM / Omnipress, (2011)The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)Revenue Maximization in Incentivized Social Advertising., , , and . Proc. VLDB Endow., 10 (11): 1238-1249 (2017)Correction to: Exposing the probabilistic causal structure of discrimination., , , and . Int. J. Data Sci. Anal., 9 (3): 373 (2020)FaiRecSys: mitigating algorithmic bias in recommender systems., , , , and . Int. J. Data Sci. Anal., 9 (2): 197-213 (2020)Trajectory anonymity in publishing personal mobility data., , and . SIGKDD Explor., 13 (1): 30-42 (2011)Fair-by-design matching., and . Data Min. Knowl. Discov., 34 (5): 1291-1335 (2020)The Minimum Wiener Connector., , , , and . CoRR, (2015)Pushing Constraints to Detect Local Patterns., and . Local Pattern Detection, volume 3539 of Lecture Notes in Computer Science, page 1-19. Springer, (2004)The query-flow graph: model and applications, , , , , and . CIKM '08: Proceeding of the 17th ACM conference on Information and knowledge management, page 609--618. New York, NY, USA, ACM, (2008)