Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

INRISCO: INcident monitoRing in Smart COmmunities., , , , , , , , , and 6 other author(s). IEEE Access, (2020)Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?, , , , and . IEEE Access, (2018)On the measurement of privacy as an attacker's estimation error., , , and . Int. J. Inf. Sec., 12 (2): 129-149 (2013)Systematic lossy forward error protection for video waveforms., , , and . ICIP (1), page 609-612. IEEE, (2003)p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation., , , and . Inf. Sci., (2017)Shall I post this now? Optimized, delay-based privacy protection in social networks., , , and . Knowl. Inf. Syst., 52 (1): 113-145 (2017)On content-based recommendation and user privacy in social-tagging systems., , , and . Comput. Stand. Interfaces, (2015)On web user tracking of browsing patterns for personalised advertising., , and . Int. J. Parallel Emergent Distributed Syst., 32 (5): 502-521 (2017)Potential mass surveillance and privacy violations in proximity-based social applications., , and . CoRR, (2016)An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers., , and . Data Knowl. Eng., 70 (10): 892-921 (2011)