Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On Search Enhancement of the Record Linkage Process, and . Proceedings of the KDD-2003 Workshop on Data Cleaning, Record Linkage, and Object Consolidation, page 31--33. Washington, DC, (2003)Identifying Unsafe Routes for Network-Based Trajectory Privacy., , and . SDM, page 942-953. SIAM, (2009)Privacy preserving record linkage approaches., , and . Int. J. Data Min. Model. Manag., 1 (2): 206-221 (2009)Community detection and social presence in students' discussion fora., , , and . Intell. Decis. Technol., 17 (4): 879-891 (2023)A Parallelization Framework for Exact Knowledge Hiding in Transactional Databases., and . SEC, volume 278 of IFIP, page 349-363. Springer, (2008)A Free Terrain Model for Trajectory K-Anonymity., and . DEXA, volume 5181 of Lecture Notes in Computer Science, page 49-56. Springer, (2008)A data perturbation approach to sensitive classification rule hiding., , and . SAC, page 605-609. ACM, (2010)The Pursuit of Patterns in Educational Data Mining as a Threat to Student Privacy, , , and . Journal of Interactive Media in Education, (2019)A Machine Learning Pipeline Using KNIME to Predict Hospital Admission in the MIMIC-IV Database., , , , , and . IISA, page 1-6. IEEE, (2023)Graph based Hiding of Sensitive Knowledge., , , and . ICTAI, page 199-203. IEEE, (2023)