Author of the publication

A Study on Privacy Preservation for Multi-user and Multi-granularity.

, , , , and . ICDM Workshops, page 638-645. IEEE Computer Society, (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Clustering-Based k-Anonymity., , , , , and . PAKDD (1), volume 7301 of Lecture Notes in Computer Science, page 405-417. Springer, (2012)Enhancing Utility and Privacy-Safety via Semi-homogenous Generalization., , , , , and . DEXA (1), volume 7446 of Lecture Notes in Computer Science, page 311-325. Springer, (2012)AK-Modes: A weighted clustering algorithm for finding similar case subsets., , and . ISKE, page 218-223. IEEE, (2010)A Study on Privacy Preservation for Multi-user and Multi-granularity., , , , and . ICDM Workshops, page 638-645. IEEE Computer Society, (2013)Exploring Constructivist Learning Theory and Course Visualization on Computer Graphics., , , and . ICCSA (4), volume 3483 of Lecture Notes in Computer Science, page 1-9. Springer, (2005)