Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Potential mass surveillance and privacy violations in proximity-based social applications., , and . CoRR, (2016)Systematic lossy forward error protection for video waveforms., , , and . ICIP (1), page 609-612. IEEE, (2003)INRISCO: INcident monitoRing in Smart COmmunities., , , , , , , , , and 6 other author(s). IEEE Access, (2020)Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?, , , , and . IEEE Access, (2018)On the measurement of privacy as an attacker's estimation error., , , and . Int. J. Inf. Sec., 12 (2): 129-149 (2013)Shall I post this now? Optimized, delay-based privacy protection in social networks., , , and . Knowl. Inf. Syst., 52 (1): 113-145 (2017)p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation., , , and . Inf. Sci., (2017)On web user tracking of browsing patterns for personalised advertising., , and . Int. J. Parallel Emergent Distributed Syst., 32 (5): 502-521 (2017)On content-based recommendation and user privacy in social-tagging systems., , , and . Comput. Stand. Interfaces, (2015)An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers., , and . Data Knowl. Eng., 70 (10): 892-921 (2011)