Author of the publication

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).

, , and . OTM Conferences, volume 10033 of Lecture Notes in Computer Science, page 934-942. (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Learning to Recommend with User Generated Content., , , , and . WAIM, volume 9098 of Lecture Notes in Computer Science, page 221-232. Springer, (2015)Target-based privacy preserving association rule mining., , , and . SAC, page 962-967. ACM, (2011)Helping mobile software code reviewers: a study of bug repair and refactoring patterns.. MOBILESoft, page 34-35. ACM, (2016)BUAA-PRO: A Tracking Dataset with Pixel-Level Annotation., , and . BMVC, page 249. BMVA Press, (2018)Lifelong Machine Learning for Topic Modeling and Beyond.. HLT-NAACL, page 133-139. The Association for Computational Linguistics, (2015)Data Fusion Optimization and Contribution Assessment of Dual-Polarization Radar Data in Short-Term Forecasting of Convective Precipitation., , , and . CSAI, page 165-171. ACM, (2023)A Single-Camera Stereo Apparatus for Road Detection., , and . SSIP, page 11-17. ACM, (2018)Identifying Search Keywords for Finding Relevant Social Media Posts., , , and . AAAI, page 3052-3058. AAAI Press, (2016)A Comparative Study of LSTM, LightGBM, and Autoregressive Model in Narrow-Based ETF Market Prediction with Multi-Ticker Models., , , and . MLMI, page 10-16. ACM, (2023)Machine learning techniques for anti-money laundering (AML) solutions in suspicious transaction detection: a review., , , , , and . Knowl. Inf. Syst., 57 (2): 245-285 (2018)