From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization., , и . CODASPY, стр. 109-119. ACM, (2019)Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids., , , и . ISGT Asia, стр. 1-6. IEEE, (2015)A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media., , и . AINA (1), том 449 из Lecture Notes in Networks and Systems, стр. 140-151. Springer, (2022)A Review of Scaling Genome Sequencing Data Anonymisation., , и . AINA (3), том 227 из Lecture Notes in Networks and Systems, стр. 491-501. Springer, (2021)Graphical Passwords - A Discussion.. AINA Workshops, стр. 596-600. IEEE Computer Society, (2016)Adaptive Cryptographic Access Control, , и . Advances in Information Security Springer, (2010)How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect., , , и . PDH, стр. 55-62. ACM, (2019)Enabling PII Discovery in Textual Data via Outlier Detection., , и . DEXA (2), том 14147 из Lecture Notes in Computer Science, стр. 209-216. Springer, (2023)On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments., и . Privacy and Identity Management, том 526 из IFIP Advances in Information and Communication Technology, стр. 170-186. Springer, (2017)Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings., , и . AINA (4), том 202 из Lecture Notes on Data Engineering and Communications Technologies, стр. 145-158. Springer, (2024)