Author of the publication

Inference attacks on genomic data based on probabilistic graphical models

, and . Big Data Mining and Analytics, 3 (3): 225--233 (2020)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Customized privacy preserving for inherent data and latent data., , , , and . Pers. Ubiquitous Comput., 21 (1): 43-54 (2017)Susceptible user search for defending opinion manipulation., , , , and . Future Gener. Comput. Syst., (2021)Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks., , , , , and . Sci. China Inf. Sci., 56 (9): 1-18 (2013)Differentially private approximate aggregation based on feature selection., , , , , and . J. Comb. Optim., 41 (2): 318-327 (2021)Approximate aggregation for tracking quantiles and range countings in wireless sensor networks., , , and . Theor. Comput. Sci., (2015)Modeling SNP-Trait Associations and Realizing Privacy-Utility Tradeoff in Genomic Data Publishing., and . ISBRA, volume 11490 of Lecture Notes in Computer Science, page 65-72. Springer, (2019)Trading Private Range Counting over Big IoT Data., and . ICDCS, page 144-153. IEEE, (2019)Primary and Secondary Social Activity Aware Routing for Cognitive Radio Networks., , , , , and . IIKI, page 311-316. IEEE Computer Society, (2016)Approximate Aggregation for Tracking Quantiles in Wireless Sensor Networks., , , and . COCOA, volume 8881 of Lecture Notes in Computer Science, page 161-172. Springer, (2014)User social activity-based routing for cognitive radio networks., , , , , and . Pers. Ubiquitous Comput., 22 (3): 471-487 (2018)