Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Network Motif Discovery: A GPU Approach., , , and . IEEE Trans. Knowl. Data Eng., 29 (3): 513-528 (2017)Shortest Path and Distance Queries on Road Networks: An Experimental Evaluation., , , , , and . Proc. VLDB Endow., 5 (5): 406-417 (2012)Publishing Search Logs - A Comparative Study of Privacy Guarantees., , , , and . IEEE Trans. Knowl. Data Eng., 24 (3): 520-532 (2012)Dynamic monitoring of optimal locations in road network databases., , , and . VLDB J., 23 (5): 697-720 (2014)Feature Inference Attack on Model Predictions in Vertical Federated Learning., , , and . CoRR, (2020)Privacy Enhanced Matrix Factorization for Recommendation with Local Differential Privacy., , , and . IEEE Trans. Knowl. Data Eng., 30 (9): 1770-1782 (2018)The Disruptions of 5G on Data-Driven Technologies and Applications., , , , , , , , , and 5 other author(s). IEEE Trans. Knowl. Data Eng., 32 (6): 1179-1198 (2020)Efficient Skyline and Top-k Retrieval in Subspaces., , and . IEEE Trans. Knowl. Data Eng., 19 (8): 1072-1088 (2007)PrivLava: Synthesizing Relational Data with Foreign Keys under Differential Privacy., , and . Proc. ACM Manag. Data, 1 (2): 142:1-142:25 (2023)Secure and Verifiable Data Collaboration with Low-Cost Zero-Knowledge Proofs., , , , and . CoRR, (2023)