Author of the publication

Bayesian Network Induction With Incomplete Private Data.

, , and . ICEB, page 1119-1124. Academic Publishers/World Publishing Corporation, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Review of Attribute Disclosure Control., , , and . Advanced Research in Data Privacy, volume 567 of Studies in Computational Intelligence, Springer, (2015)Privacy-preserving collaborative association rule mining., , and . J. Netw. Comput. Appl., 30 (3): 1216-1227 (2007)Guest Editorial.. Mach. Learn., 57 (3): 203-204 (2004)Automating reuse of software for expert system analysis of remote sensing data., , , and . IEEE Trans. Geosci. Remote. Sens., 32 (3): 525-533 (1994)Privacy-Oriented Data Mining by Proof Checking., and . PKDD, volume 2431 of Lecture Notes in Computer Science, page 138-149. Springer, (2002)How to Prevent Private Data from being Disclosed to a Malicious Attacker., , and . Data Mining: Foundations and Practice, volume 118 of Studies in Computational Intelligence, Springer, (2008)Improving Co-training with Agreement-Based Sampling., , , and . RSCTC, volume 6086 of Lecture Notes in Computer Science, page 197-206. Springer, (2010)Privacy-Preserving Collaborative Association Rule Mining., , and . DBSec, volume 3654 of Lecture Notes in Computer Science, page 153-165. Springer, (2005)Using Qualitative Models to Guide Inductive Learning., and . ICML, page 49-56. Morgan Kaufmann, (1993)Bayesian Network Induction With Incomplete Private Data., , and . ICEB, page 1119-1124. Academic Publishers/World Publishing Corporation, (2004)