Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Composition in Differential Privacy for General Granularity Notions (Long Version)., , , and . CoRR, (2023)Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems., , and . Entropy, 16 (3): 1586-1631 (2014)The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data., , , , , and . Eng. Appl. Artif. Intell., (2020)A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings., , and . DPM/SETOP, volume 7122 of Lecture Notes in Computer Science, page 42-57. Springer, (2011)Differentially private data publishing via cross-moment microaggregation., , and . Inf. Fusion, (2020)Shall I post this now? Optimized, delay-based privacy protection in social networks., , , and . Knowl. Inf. Syst., 52 (1): 113-145 (2017)Privacy-Protecting Techniques for Behavioral Data: A Survey., , , and . CoRR, (2021)On content-based recommendation and user privacy in social-tagging systems., , , and . Comput. Stand. Interfaces, (2015)On the privacy-utility trade-off in differentially private hierarchical text classification., , , , and . CoRR, (2021)Node Injection Link Stealing Attack., , , and . CoRR, (2023)