Author of the publication

Data Mining: The Next Generation.

, , , , , , , , , , , , , , , , , , , , and . Perspectives Workshop: Data Mining: The Next Generation, volume 04292 of Dagstuhl Seminar Proceedings, Internationales Begegnungs- und Forschungszentrum für Informatik (IBFI), Schloss Dagstuhl, Germany, (2004)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy - Preserving Data Mining at 10: Whats Next?. AusDM, volume 121 of CRPIT, page 3. Australian Computer Society, (2011)d-Presence without Complete World Knowledge., and . IEEE Trans. Knowl. Data Eng., 22 (6): 868-883 (2010)Do Crowdsourced Fairness Preferences Correlate with Risk Perceptions?, , and . IUI, page 304-324. ACM, (2024)Privacy Preserving Data Mining, , and . Springer-Verlag New York, Inc., Secaucus, NJ, USA, (2005)The Indiana Center for Database Systems at Purdue University., , , , , , , , , and 2 other author(s). SIGMOD Rec., 34 (2): 53-58 (2005)Privacy-Preserving Kth Element Score over Vertically Partitioned Data., and . IEEE Trans. Knowl. Data Eng., 21 (2): 253-258 (2009)Privacy Beyond Confidentiality.. ACM Conference on Computer and Communications Security, page 1156. ACM, (2014)TKDE Guidelines for Survey Papers., , and . IEEE Trans. Knowl. Data Eng., 19 (11): 1449 (2007)Top-k frequent itemsets via differentially private FP-trees., and . KDD, page 931-940. ACM, (2014)Opportunities for private and secure machine learning.. AISec, page 31-32. ACM, (2008)