Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

EDA: an enhanced dual-active algorithm for location privacy preservation inmobile P2P networks., , , , and . Journal of Zhejiang University - Science C, 14 (5): 356-373 (2013)Rare Category Detection Forest., , , and . KSEM, volume 9403 of Lecture Notes in Computer Science, page 612-618. Springer, (2015)Rare category exploration., , , , and . Expert Syst. Appl., 41 (9): 4197-4210 (2014)Evaluation of local community metrics: from an experimental perspective., , , and . J. Intell. Inf. Syst., 51 (1): 1-22 (2018)Discovery of Regional Co-location Patterns with k-Nearest Neighbor Graph., , , , and . PAKDD (1), volume 7818 of Lecture Notes in Computer Science, page 174-186. Springer, (2013)Joint affinity aware grouping and virtual machine placement., , , , , , and . Microprocess. Microsystems, (2017)Privacy Disclosure Analysis and Control for 2D Contingency Tables Containing Inaccurate Data., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 1-16. Springer, (2010)Multistage Off-Line Permutation Packet Routing on a Mesh: An Approach with Elementary Mathematics., and . J. Comput. Sci. Technol., 24 (1): 175-180 (2009)Learning from Crowds under Experts' Supervision., , , , and . PAKDD (1), volume 8443 of Lecture Notes in Computer Science, page 200-211. Springer, (2014)GMAC: A Seed-Insensitive Approach to Local Community Detection., , , , , and . DaWaK, volume 8057 of Lecture Notes in Computer Science, page 297-308. Springer, (2013)