Author of the publication

Generating Microdata with P -Sensitive K -Anonymity Property.

, , and . Secure Data Management, volume 4721 of Lecture Notes in Computer Science, page 124-141. Springer, (2007)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A New Incremental Core-Based Clustering Method., and . AIAI, volume 187 of IFIP, page 269-278. Springer, (2005)An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules., , , and . DMIN, page 107-113. CSREA Press, (2006)On-the-Fly Hierarchies for Numerical Attributes in Data Anonymization., and . Secure Data Management, volume 6358 of Lecture Notes in Computer Science, page 13-25. Springer, (2010)Adaptive Clustering Algorithms., and . Canadian AI, volume 4013 of Lecture Notes in Computer Science, page 407-418. Springer, (2006)Data and Structural k-Anonymity in Social Networks., and . PinKDD, volume 5456 of Lecture Notes in Computer Science, page 33-54. Springer, (2008)P-Sensitive K-Anonymity for Social Networks., , and . DMIN, page 403-409. CSREA Press, (2009)Hierarchical Adaptive Clustering., and . Informatica, 19 (1): 101-112 (2008)Is Data Collection through Twitter Streaming API Useful for Academic Research?, , , and . IEEE BigData, page 3638-3643. IEEE, (2018)COVID-19 Vaccine Brand Sentiment on Twitter., , , , and . OASIS@HT, page 39-49. ACM, (2022)A Clustering Approach for Achieving Data Privacy., , , and . DMIN, page 321-330. CSREA Press, (2007)