Author of the publication

Efficiently anonymizing social networks with reachability preservation.

, , and . CIKM, page 1613-1618. ACM, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Efficient Ring-Based Metadata Management Policy for Large-Scale Distributed File Systems., , , , and . IEEE Trans. Parallel Distributed Syst., 30 (9): 1962-1974 (2019)University Code Refactoring Practice-Driven Curriculum Instructed by Industry Professionals., , , and . CompEd, page 240. ACM, (2019)Protecting Sensitive Relationships against Inference Attacks in Social Networks., and . DASFAA (1), volume 7238 of Lecture Notes in Computer Science, page 335-350. Springer, (2012)Efficient regular expression matching on LZ77 compressed strings using negative factors., , , , and . World Wide Web, 22 (6): 2519-2543 (2019)Modeling Enterprise Objects in a Virtual Enterprise Integrating System: VIASCOPE., , , and . ICSC, volume 1749 of Lecture Notes in Computer Science, page 166-175. Springer, (1999)MCIS2010 Workshop Organizers' Message., , , and . DASFAA Workshops, volume 6193 of Lecture Notes in Computer Science, page 117. Springer, (2010)Answering Constrained k-NN Queries in Unstructured P2P Systems., , , , , , and . DBISP2P, volume 4125 of Lecture Notes in Computer Science, page 397-405. Springer, (2006)A Generalization Based Approach for Anonymizing Weighted Social Network Graphs., and . WAIM, volume 6897 of Lecture Notes in Computer Science, page 118-130. Springer, (2011)Efficiently Mining High Quality Phrases from Texts., , , and . AAAI, page 3474-3481. AAAI Press, (2017)The Design and Implementation of Code Reading and Code Quality Practice Discussion Course., , and . SIGCSE, page 1255. ACM, (2021)