Author of the publication

Enhancing Utility and Privacy-Safety via Semi-homogenous Generalization.

, , , , , and . DEXA (1), volume 7446 of Lecture Notes in Computer Science, page 311-325. Springer, (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Study on Privacy Preservation for Multi-user and Multi-granularity., , , , and . ICDM Workshops, page 638-645. IEEE Computer Society, (2013)A New Method to Find Top K Items in Data Streams at Arbitrary Time Granularities., and . CSSE (4), page 267-270. IEEE Computer Society, (2008)978-0-7695-3336-0.面向复杂网络的图稀疏算法综述 (Survey of Graph Sparsification Algorithms for Complex Networks)., , , and . 计算机科学, 45 (5): 24-30 (2018)Multimodal heterogeneous graph attention network., , , , , , and . Neural Comput. Appl., 35 (4): 3357-3372 (February 2023)Preservation of Proximity Privacy in Publishing Categorical Sensitive Data., , , , and . APWeb, volume 7808 of Lecture Notes in Computer Science, page 563-570. Springer, (2013)Skeleton boxes: Solving skeleton based action detection with a single deep convolutional neural network., , , , and . ICME Workshops, page 613-616. IEEE Computer Society, (2017)Multi-scale 3D deep convolutional neural network for hyperspectral image classification., , and . ICIP, page 3904-3908. IEEE, (2017)Finding overlapping communities in networks using evolutionary method, , , and . CoRR, (2013)Enhancing Utility and Privacy-Safety via Semi-homogenous Generalization., , , , , and . DEXA (1), volume 7446 of Lecture Notes in Computer Science, page 311-325. Springer, (2012)The Hardness of (ε, m)-anonymity., , , , and . WAIM, volume 7923 of Lecture Notes in Computer Science, page 741-746. Springer, (2013)