Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Efficient Discovery of Target High Utility Itemsets., , , , , and . ICDM (Workshops), page 517-526. IEEE, (2022)Utility Aware Clustering for Publishing Transactional Data., , , and . PAKDD (2), volume 10235 of Lecture Notes in Computer Science, page 481-494. (2017)An Efficient Approach for Discovering Graph Entity Dependencies (GEDs)., , , , , , , , and . CoRR, (2023)Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems., , , , , , , , , and 5 other author(s). Comput. Secur., (2024)Discovering Graph Differential Dependencies., , , , , , and . ADC, volume 14386 of Lecture Notes in Computer Science, page 259-272. Springer, (2023)Malicious Package Detection using Metadata Information., , , , , , , , , and . WWW, page 1779-1789. ACM, (2024)DATM: A Novel Data Agnostic Topic Modeling Technique With Improved Effectiveness for Both Short and Long Text., , , , , , , and . IEEE Access, (2023)FastAGEDs: Fast Approximate Graph Entity Dependency Discovery., , , , , , , , , and . WISE, volume 14306 of Lecture Notes in Computer Science, page 451-465. Springer, (2023)Optimization of UD-LDP with statistical prior knowledge., , , , and . PerCom Workshops, page 25-30. IEEE, (2024)A relative privacy model for effective privacy preservation in transactional data., , , , and . Concurr. Comput. Pract. Exp., (2019)