Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Probabilistic Name and Address Cleaning and Standardisation., , and . AusDM, page 99-108. University of Technology Sydney, Australia, (2002)Preparation of name and address data for record linkage using hidden Markov models., , , and . BMC Medical Informatics Decis. Mak., (2002)Taxonomy of Attacks on Privacy-Preserving Record Linkage., , , and . J. Priv. Confidentiality, (2022)A Vulnerability Assessment Framework for Privacy-preserving Record Linkage., , , and . ACM Trans. Priv. Secur., 26 (3): 36:1-36:31 (August 2023)A Comparison of Fast Blocking Methods for Record Linkage, , and . ACM SIGKDD '03 Workshop on Data Cleaning, Record Linkage, and Object Consolidation, page 25--27. (2003)Large Scale Record Linkage in the Presence of Missing Data., , and . CoRR, (2021)Accurate privacy-preserving record linkage for databases with missing values., , , and . Inf. Syst., (2022)Tuning the Utility-Privacy Trade-Off in Trajectory Data., , , , and . EDBT, page 839-842. OpenProceedings.org, (2023)(Privately) Estimating Linkage Quality for Record Linkage., , , , and . EDBT, page 294-306. OpenProceedings.org, (2024)Rule-Based Knowledge Discovery via Anomaly Detection in Tabular Data., , , and . AAAI Spring Symposium: MAKE, volume 3433 of CEUR Workshop Proceedings, CEUR-WS.org, (2023)