Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Information preservation in statistical privacy and bayesian estimation of unattributed histograms., and . SIGMOD Conference, page 677-688. ACM, (2013)A Simple Baseline for Travel Time Estimation using Large-scale Trip Data., , , , and . ACM Trans. Intell. Syst. Technol., 10 (2): 19:1-19:22 (2019)Constructing a Large-Scale Landslide Database Across Heterogeneous Environments Using Task-Specific Model Updates., , , , , , , , , and 1 other author(s). IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., (2022)Recognizing Long Grammatical Sequences Using Recurrent Networks Augmented With An External Differentiable Stack., , , and . CoRR, (2020)Privacy-Preserving Data Publishing., , , and . Found. Trends Databases, 2 (1-2): 1-167 (2009)Recognizing and Verifying Mathematical Equations using Multiplicative Differential Neural Units., , , and . CoRR, (2021)The 2010 Census Confidentiality Protections Failed, Here's How and Why., , , , , , , , , and 4 other author(s). CoRR, (2023)Answering Private Linear Queries Adaptively using the Common Mechanism., , , and . Proc. VLDB Endow., 16 (8): 1883-1896 (2023)Attacks on privacy and deFinetti's theorem.. SIGMOD Conference, page 127-138. ACM, (2009)No free lunch in data privacy., and . SIGMOD Conference, page 193-204. ACM, (2011)