Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Possibilistic reasoning for trust-based access control enforcement in social networks., and . FUZZ-IEEE, page 1-6. IEEE, (2010)An evolutionary approach to enhance data privacy., , and . Soft Comput., 15 (7): 1301-1311 (2011)Extending Microaggregation Procedures for Time Series Protection., and . RSCTC, volume 4259 of Lecture Notes in Computer Science, page 899-908. Springer, (2006)Soft Computing in decision modeling., and . Soft Comput., 14 (5): 419-420 (2010)Semantic Microaggregation for the Anonymization of Query Logs., , , and . Privacy in Statistical Databases, volume 6344 of Lecture Notes in Computer Science, page 127-137. Springer, (2010)Clustering-Based Categorical Data Protection., and . Privacy in Statistical Databases, volume 7556 of Lecture Notes in Computer Science, page 78-89. Springer, (2012)On some clustering approaches for graphs., and . FUZZ-IEEE, page 409-415. IEEE, (2011)Computing Reputation for Collaborative Private Networks., , , and . COMPSAC (1), page 246-253. IEEE Computer Society, (2009)On the Comparison of Generic Information Loss Measures and Cluster-Specific Ones., and . International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 16 (Supplement-1): 107-120 (2008)Joint Multiple Efficient Neighbors and Graph Learning for Multi-view Clustering., and . IUKM (2), volume 14376 of Lecture Notes in Computer Science, page 25-36. Springer, (2023)