Author of the publication

A Game-Theoretical Approach to Data-Privacy Protection from Context-Based Inference Attacks: A Location-Privacy Protection Case Study.

, and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 133-150. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Special Section Guest Editorial: Retinex at 50., , , and . J. Electronic Imaging, 26 (3): 31201 (2017)Toward behavioral business process analysis., , and . CEC, page 2347-2353. IEEE, (2015)Assessing Separation of Duty Policies through the Interpretation of Sampled Video Sequences: A Pair Programming Case Study., , , and . New Directions in Intelligent Interactive Multimedia, volume 142 of Studies in Computational Intelligence, Springer, (2008)Analysing Neural Network Topologies: a Game Theoretic Approach., , , and . CoRR, (2019)Tag Similarity in Folksonomies., , , , , and . INFORSID, page 319-334. (2013)A Framework for the Design Configuration of Accountable Selfish-Resilient Peer-to-Peer Systems., , , , , , and . SRDS, page 276-285. IEEE Computer Society, (2015)Lightweight Behavior-Based Malware Detection., , , , and . MEDES, volume 2022 of Communications in Computer and Information Science, page 237-250. Springer, (2023)Geo-based automatic image annotation., , , , , and . ICMR, page 46. ACM, (2012)Tag Relatedness Using Laplacian Score Feature Selection and Adapted Jensen-Shannon Divergence., , , , , and . MMM (1), volume 8325 of Lecture Notes in Computer Science, page 159-171. Springer, (2014)An Ontology-Driven Approach to Metadata Design in the Mining of Software Process Events., and . KES, volume 3215 of Lecture Notes in Computer Science, page 321-327. Springer, (2004)