Author of the publication

Exploring Real Mobility Data with M-Atlas.

, , , , , , , and . ECML/PKDD (3), volume 6323 of Lecture Notes in Computer Science, page 624-627. Springer, (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Anonymous Sequences from Trajectory Data., , , and . SEBD, page 361-372. Edizioni Seneca, (2009)Privacy-Aware Distributed Mobility Data Analytics., , , , , , and . SEBD, page 329-342. Curran Associates, (2013)Privacy Risk for Individual Basket Patterns., , and . MIDAS/PAP@PKDD/ECML, volume 11054 of Lecture Notes in Computer Science, page 141-155. Springer, (2018)Black Box Explanation by Learning Image Exemplars in the Latent Feature Space., , , and . CoRR, (2020)A new approach for cross-silo federated learning and its privacy risks., , and . PST, page 1-10. IEEE, (2021)Time-on-Task Estimation by data-driven Outlier Detection based on Learning Activities., and . LAK, page 336-346. ACM, (2022)Privacy Risk of Global Explainers., , and . HHAI, volume 354 of Frontiers in Artificial Intelligence and Applications, page 249-251. IOS Press, (2022)Privacy-Preserving Outsourcing of Pattern Mining of Event-Log Data - A Use-Case from Process Industry., , , and . CloudCom, page 545-551. IEEE Computer Society, (2016)Black Box Explanation by Learning Image Exemplars in the Latent Feature Space., , , and . ECML/PKDD (1), volume 11906 of Lecture Notes in Computer Science, page 189-205. Springer, (2019)Preserving privacy in semantic-rich trajectories of human mobility., , , , and . SPRINGL, page 47-54. ACM, (2010)