Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Pursuit of Patterns in Educational Data Mining as a Threat to Student Privacy, , , and . Journal of Interactive Media in Education, (2019)A data perturbation approach to sensitive classification rule hiding., , and . SAC, page 605-609. ACM, (2010)A Free Terrain Model for Trajectory K-Anonymity., and . DEXA, volume 5181 of Lecture Notes in Computer Science, page 49-56. Springer, (2008)On Search Enhancement of the Record Linkage Process, and . Proceedings of the KDD-2003 Workshop on Data Cleaning, Record Linkage, and Object Consolidation, page 31--33. Washington, DC, (2003)A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases., and . SEC, volume 278 of IFIP, page 349-363. Springer, (2008)A MaxMin approach for hiding frequent itemsets., and . Data Knowl. Eng., 65 (1): 75-89 (2008)Exact Knowledge Hiding in Transactional Databases., and . Int. J. Artif. Intell. Tools, 18 (1): 17-37 (2009)Privacy preserving record linkage approaches., , and . Int. J. Data Min. Model. Manag., 1 (2): 206-221 (2009)An LSH-Based Blocking Approach with a Homomorphic Matching Technique for Privacy-Preserving Record Linkage., and . IEEE Trans. Knowl. Data Eng., 27 (4): 909-921 (2015)Identifying Unsafe Routes for Network-Based Trajectory Privacy., , and . SDM, page 942-953. SIAM, (2009)