Author of the publication

Efficient Apriori based algorithms for privacy preserving frequent itemset mining.

, , and . CogInfoCom, page 431-435. IEEE, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

High Density Compression of Log Files., and . Data Compression Conference, page 557. IEEE Computer Society, (2004)Visualized subgraph search., , and . IEEE VAST, page 267-268. IEEE Computer Society, (2009)Shaping SQL-Based Frequent Pattern Mining Algorithms., and . KDID, volume 3933 of Lecture Notes in Computer Science, page 188-201. Springer, (2005)Dilated Convolutional Neural Networks for Lightweight Diacritics Restoration., and . LREC, page 4253-4259. European Language Resources Association, (2022)LlamBERT: Large-scale low-cost data annotation in NLP., , , , and . CoRR, (2024)On Local Expansion of Vertex-Transitive Graphs.. Comb. Probab. Comput., 7 (2): 205-209 (1998)Attention U-Net Based Adversarial Architectures for Chest X-ray Lung Segmentation., , and . CoRR, (2020)Efficient Apriori based algorithms for privacy preserving frequent itemset mining., , and . CogInfoCom, page 431-435. IEEE, (2014)Two-Phase Data Warehouse Optimized for Data Mining., , , and . BIRTE, volume 4365 of Lecture Notes in Computer Science, page 63-76. Springer, (2006)Lattices in graphs with polynomial growth., and . Discret. Math., 186 (1-3): 227-236 (1998)