Author of the publication

Anonymization of moving objects databases by clustering and perturbation.

, , and . Inf. Syst., 35 (8): 884-910 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The role of information diffusion in the evolution of social networks, , , , , , , , and . Proc. 19th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), (2013)A Classification-Based Methodology for Planning Audit Strategies in Fraud Detection., , , and . KDD, page 175-184. ACM, (1999)The Minimum Wiener Connector., , , , and . CoRR, (2015)Pushing Constraints to Detect Local Patterns., and . Local Pattern Detection, volume 3539 of Lecture Notes in Computer Science, page 1-19. Springer, (2004)Give more data, awareness and control to individual citizens, and they will help COVID-19 containment., , , , , , , , , and 30 other author(s). Ethics Inf. Technol., 23 (S1): 1-6 (2021)Finding events in temporal networks: segmentation meets densest subgraph discovery., , , , and . Knowl. Inf. Syst., 62 (4): 1611-1639 (2020)Conditional Reliability in Uncertain Graphs., , , and . CoRR, (2016)On learning agent-based models from data., , , and . CoRR, (2022)Discovering Polarization Niches via Dense Subgraphs with Attractors and Repulsers., , , , and . Proc. VLDB Endow., 15 (13): 3883-3896 (2022)Exante: A Preprocessing Method for Frequent-Pattern Mining., , , and . IEEE Intell. Syst., 20 (3): 25-31 (2005)