Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Discovering Eras in Evolving Social Networks (Extended Abstract)., , , , and . SEBD, page 78-85. Esculapio Editore, (2010)A Survey Of Methods For Explaining Black Box Models., , , , and . CoRR, (2018)Give more data, awareness and control to individual citizens, and they will help COVID-19 containment., , , , , , , , , and 24 other author(s). CoRR, (2020)Learning Data Mining., , and . DSAA, page 361-370. IEEE, (2018)C-safety: a framework for the anonymization of semantic trajectories., , , , and . Trans. Data Priv., 4 (2): 73-101 (2011)Privacy-by-design in big data analytics and social mining., , , , and . EPJ Data Sci., 3 (1): 10 (2014)Evolving networks: Eras and turning points., , , , and . Intell. Data Anal., 17 (1): 27-48 (2013)Visual Analytics for Session-based Time-Windows Identification in Virtual Learning Environments., , and . IV, page 251-258. IEEE, (2022)Guest editors' foreword., , and . J. Log. Algebraic Methods Program., (2019)Analyzing Privacy Risk in Human Mobility Data., , , and . STAF Workshops, volume 11176 of Lecture Notes in Computer Science, page 114-129. Springer, (2018)