Author of the publication

Identifying Privacy Risks Raised by Utility Queries.

, , and . WISE, volume 13724 of Lecture Notes in Computer Science, page 309-324. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Use of CARIN Language and Algorithms for Information Integration: The PICSEL System., , and . Int. J. Cooperative Inf. Syst., 9 (4): 383-401 (2000)The Use of CARIN Language and Algorithms for Information Integration: The PICSEL System, , and . International Journal of Cooperative Information Systems, 9 (4): 383--401 (2000)Answering queries using views: A KRDB perspective for the semantic Web., and . ACM Trans. Internet Techn., 4 (3): 255-288 (2004)Negative and positive explanations in expert., and . Applied Artificial Intelligence, 1 (1): 25-38 (1987)Revision of Rule Bases., , and . EUROVAV, page 193-203. Katholieke Universiteit Leuven, Belgium, (1997)Construction et affinement de hiérarchies à partir de données semi-structurées., , and . EGC, volume 1 of Extraction des Connaissances et Apprentissage, page 81-92. Hermes Science Publications, (2001)On the consistency of knowledge bases: the COVADIS system.. Comput. Intell., (1988)Sanity checks and improvements for patch visualisation in prototype-based image classification., , , and . CoRR, (2023)CONSTRUCT Queries Performance on a Spark-Based Big RDF Triplestore., , and . ESWC, volume 13261 of Lecture Notes in Computer Science, page 444-460. Springer, (2022)Explanation-Based Tool for Helping Data Producers to Reduce Privacy Risks., , and . ESWC (Satellite Events), volume 13998 of Lecture Notes in Computer Science, page 86-90. Springer, (2023)