Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Recent advances in preserving privacy when mining data., , and . Data Knowl. Eng., 65 (1): 1-4 (2008)Anonymization of Longitudinal Electronic Medical Records., , , , and . IEEE Trans. Information Technology in Biomedicine, 16 (3): 413-423 (2012)Processing count queries over event streams at multiple time granularities., , and . Inf. Sci., 176 (14): 2066-2096 (2006)Suppressing microdata to prevent classification based inference., and . VLDB J., 19 (3): 385-410 (2010)Privacy Protection: Regulations and Technologies, Opportunities and Threats., , , , , , , and . Mobility, Data Mining and Privacy, Springer, (2008)Association Rule Hiding., , , , and . IEEE Trans. Knowl. Data Eng., 16 (4): 434-447 (2004)Using Unknowns to Prevent Discovery of Association Rules., , and . SIGMOD Rec., 30 (4): 45-54 (2001)State-of-the-art in privacy preserving data mining., , , , , and . SIGMOD Rec., 33 (1): 50-57 (2004)Sensitivity Analysis for Non-Interactive Differential Privacy: Bounds and Efficient Algorithms., , and . IEEE Trans. Dependable Secur. Comput., 17 (1): 194-207 (2020)08471 Report - Geographic Privacy-Aware Knowledge Discovery and Delivery., , , and . Geographic Privacy-Aware Knowledge Discovery and Delivery, volume 08471 of Dagstuhl Seminar Proceedings, Schloss Dagstuhl - Leibniz-Zentrum für Informatik, Germany, (2008)