Author of the publication

Social network integration and analysis using a generalization and probabilistic approach for privacy preservation.

, and . Secur. Informatics, 1 (1): 7 (2012)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Social networks integration and privacy preservation using subgraph generalization., and . KDD Workshop on CyberSecurity and Intelligence Informatics, page 53-61. ACM, (2009)A Study of Social Interactions in Online Health Communities., , , and . SocialCom/PASSAT, page 774-779. IEEE Computer Society, (2011)Identifing influential users in an online healthcare social network., and . ISI, page 43-48. IEEE, (2010)Ranking User Influence in Healthcare Social Media., and . ACM TIST, 3 (4): 73:1-73:21 (2012)Detecting Social Media Hidden Communities Using Dynamic Stochastic Blockmodel with Temporal Dirichlet Process., and . ACM TIST, 5 (2): 36:1-36:21 (2014)Social network integration and analysis using a generalization and probabilistic approach for privacy preservation., and . Secur. Informatics, 1 (1): 7 (2012)Application of dynamic logistic regression with unscented Kalman filter in predictive coding., , and . IEEE BigData, page 1381-1389. IEEE Computer Society, (2017)User Interest and Topic Detection for Personalized Recommendation., , and . Web Intelligence, page 442-446. IEEE Computer Society, (2012)Terrorist and criminal social network data sharing and integration., and . ISI, page 230. IEEE, (2009)Identifying Dark Web clusters with temporal coherence analysis., , and . ISI, page 167-172. IEEE, (2011)