Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DAG: A General Model for Privacy-Preserving Data Mining : (Extended Abstract)., , and . ICDE, page 2018-2019. IEEE, (2020)Privacy-preserving survey by crowdsourcing with smartphones., , and . WF-IoT, page 647-651. IEEE, (2018)ASSIST: Access Controlled Ship Identification Streams., , , , , , and . Trans. Large Scale Data Knowl. Centered Syst., (2013)ASSIST: access controlled ship identification streams., , , , , and . GIS, page 485-488. ACM, (2011)Differentially Private Projected Histograms of Multi-Attribute Data for Classification., , and . CoRR, (2015)DBMask: Fine-Grained Access Control on Encrypted Relational Databases., , , and . CODASPY, page 1-11. ACM, (2015)rho-uncertainty: Inference-Proof Transaction Anonymization., , , and . Proc. VLDB Endow., 3 (1): 1033-1044 (2010)Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments., , , , and . MDM (Workshops), page 37-42. IEEE Computer Society, (2016)CASTLE: A delay-constrained scheme for ks-anonymizing data streams., , , and . ICDE, page 1376-1378. IEEE Computer Society, (2008)Adaptive Grid-Based k-median Clustering of Streaming Data with Accuracy Guarantee., , and . DASFAA (1), volume 9049 of Lecture Notes in Computer Science, page 75-91. Springer, (2015)