Author of the publication

Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption.

, , , and . DaWaK, volume 9263 of Lecture Notes in Computer Science, page 70-81. Springer, (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling., , , and . SDM, page 594-602. SIAM, (2021)Anonymizing healthcare data: a case study on the blood transfusion service., , , and . KDD, page 1285-1294. ACM, (2009)Privacy-preserving trajectory data publishing by local suppression., , , , and . Inf. Sci., (2013)Preface., , and . Fundam. Informaticae, (2015)Modeling, extraction, and transformation of semantics in computer aided engineering systems., , , , and . Adv. Eng. Informatics, 27 (1): 1-3 (2013)Subject-based semantic document clustering for digital forensic investigations., and . Data Knowl. Eng., (2013)Learning Phenotypes and Dynamic Patient Representations via RNN Regularized Collective Non-Negative Tensor Factorization., , , , and . AAAI, page 1246-1253. AAAI Press, (2019)DUGRA: Dual-Graph Representation Learning for Health Information Networks., , and . IEEE BigData, page 4961-4970. IEEE, (2020)Privacy-preserving data mashup., , , and . EDBT, volume 360 of ACM International Conference Proceeding Series, page 228-239. ACM, (2009)Service-oriented architecture for sharing private spatial-temporal data., and . CDC, page 40-47. IEEE Computer Society, (2011)