Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vector Space Model Anonymization., , and . CCIA, volume 256 of Frontiers in Artificial Intelligence and Applications, page 141-150. IOS Press, (2013)An Information Retrieval Approach to Document Sanitization., and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Choquet integral for record linkage., , and . Ann. Oper. Res., 195 (1): 97-110 (2012)Document Sanitization: Measuring Search Engine Information Loss and Risk of Disclosure for the Wikileaks cables., and . Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 308-321. Springer, (2012)Spherical microaggregation: Anonymizing sparse vector spaces., , and . Comput. Secur., (2015)On the Declassification of Confidential Documents., , and . MDAI, volume 6820 of Lecture Notes in Computer Science, page 235-246. Springer, (2011)Towards Semantic Microaggregation of Categorical Data for Confidential Documents., , and . MDAI, volume 6408 of Lecture Notes in Computer Science, page 266-276. Springer, (2010)CIRG IRGDISCO at RepLab2013 Filtering Task: Use of Wikipedia's Graph Structure for Entity Name Disambiguation in Tweets., , , , and . CLEF (Working Notes), volume 1179 of CEUR Workshop Proceedings, CEUR-WS.org, (2013)Towards Privacy Preserving Information Retrieval through Semantic Microaggregation., , and . Web Intelligence/IAT Workshops, page 296-299. IEEE Computer Society, (2010)978-0-7695-4191-4.Towards a private vector space model for confidential documents., , and . SAC, page 944-945. ACM, (2013)