From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Maintenance of High Fuzzy Utility Itemsets Using the Pre-Large-Itemset Concept and Tree Structure., , , и . MISNC, стр. 118-123. ACM, (2023)Anonymizing Set-Valued Social Data., , , и . GreenCom/CPSCom, стр. 809-812. IEEE Computer Society, (2010)Confining Edge Types in K-anonymization of Shortest Paths., , , и . IBICA, стр. 318-322. IEEE, (2012)Multi-table association rules hiding., , , и . ISDA, стр. 1298-1302. IEEE, (2010)K-anonymity on sensitive transaction items., , , и . GrC, стр. 723-727. IEEE Computer Society, (2011)Tree-Based Unified Temporal Erasable-Itemset Mining., , , и . ACIIDS (1), том 13995 из Lecture Notes in Computer Science, стр. 224-233. Springer, (2023)Unified Temporal Erasable Itemset Mining with a Lower-Bound Strategy., , , и . IEEE Big Data, стр. 6207-6211. IEEE, (2022)Flexible Anonymization of Transactions with Sensitive Items., , , и . BESC, стр. 201-206. IEEE, (2018)Extending K 1 , K 2 Anonymization of Shortest Paths for Social Networks., , , и . MISNC, том 540 из Communications in Computer and Information Science, стр. 187-199. Springer, (2015)Incremental High Fuzzy Utility Itemset Mining., , , и . MISNC, стр. 66-69. ACM, (2022)