Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Identifying tourists from public transport commuters., , , , and . KDD, page 1779-1788. ACM, (2014)Heterogeneous k-anonymization with high utility., , , , , and . IEEE BigData, page 1886-1890. IEEE Computer Society, (2015)Analysis of Clustering and Routing Overhead for Clustered Mobile Ad Hoc Networks., , and . ICDCS, page 46. IEEE Computer Society, (2006)Fuzzy trajectory linking., , , , , and . ICDE, page 859-870. IEEE Computer Society, (2016)k-Anonymization by Freeform Generalization., , , and . AsiaCCS, page 519-530. ACM, (2015)Delineating social network data anonymization via random edge perturbation., , , , and . CIKM, page 475-484. ACM, (2012)FTT: A System for Finding and Tracking Tourists in Public Transport Services., , , , and . SIGMOD Conference, page 1093-1098. ACM, (2015)P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks., , and . COMPSAC, page 48-57. IEEE Computer Society, (2011)Oscillation Resolution for Mobile Phone Cellular Tower Data to Enable Mobility Modelling., , , , , , , , , and 2 other author(s). MDM (1), page 321-328. IEEE Computer Society, (2014)Utility-driven anonymization in data publishing., , , and . CIKM, page 2277-2280. ACM, (2011)