Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Search Enhancement of the Record Linkage Process, and . Proceedings of the KDD-2003 Workshop on Data Cleaning, Record Linkage, and Object Consolidation, page 31--33. Washington, DC, (2003)A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases., and . SEC, volume 278 of IFIP, page 349-363. Springer, (2008)An LSH-Based Blocking Approach with a Homomorphic Matching Technique for Privacy-Preserving Record Linkage., and . IEEE Trans. Knowl. Data Eng., 27 (4): 909-921 (2015)Summarizing and linking electronic health records., , and . Distributed Parallel Databases, 39 (2): 321-360 (2021)Identifying Unsafe Routes for Network-Based Trajectory Privacy., , and . SDM, page 942-953. SIAM, (2009)The Pursuit of Patterns in Educational Data Mining as a Threat to Student Privacy, , , and . Journal of Interactive Media in Education, (2019)A data perturbation approach to sensitive classification rule hiding., , and . SAC, page 605-609. ACM, (2010)A Free Terrain Model for Trajectory K-Anonymity., and . DEXA, volume 5181 of Lecture Notes in Computer Science, page 49-56. Springer, (2008)Exact Knowledge Hiding in Transactional Databases., and . Int. J. Artif. Intell. Tools, 18 (1): 17-37 (2009)Privacy preserving record linkage approaches., , and . Int. J. Data Min. Model. Manag., 1 (2): 206-221 (2009)