Author of the publication

Discovering Actual Delivery Locations from Mis-Annotated Couriers' Trajectories.

, , , , , , , , , and . ICDE, page 3241-3253. IEEE, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Near-Optimal Partial Linear Scan for Nearest Neighbor Search in High-Dimensional Space., , , and . DASFAA (1), volume 7825 of Lecture Notes in Computer Science, page 101-115. Springer, (2013)Estimating Interactions of Functional Brain Connectivity by Hidden Markov Models., , and . ADMA, volume 11323 of Lecture Notes in Computer Science, page 403-412. Springer, (2018)aChain: A SQL-Empowered Analytical Blockchain as a Database., , , , , , and . IEEE Trans. Computers, 72 (11): 3099-3112 (November 2023)Improving the utility in differential private histogram publishing: Theoretical study and practice., , , and . IEEE BigData, page 1100-1109. IEEE Computer Society, (2016)DBinsight: A Tool for Interactively Understanding the Query Processing Pipeline in RDBMSs., , , , and . CIKM, page 4960-4964. ACM, (2022)DP-HORUS: Differentially Private Hierarchical Count Histograms under Untrusted Server., , , and . CIKM, page 530-539. ACM, (2022)SaDes: An Interactive System for Sensitivity-aware Desensitization towards Tabular Data., , , and . CIKM, page 4828-4832. ACM, (2021)Addressing the Hardness of k-Facility Relocation Problem: A Pair of Approximate Solutions., , , and . CIKM, page 1919-1928. ACM, (2021)a2RegInf: An Interactive System for Maximizing Influence within Arbitrary Number of Arbitrary Shaped Query Regions., , and . WSDM, page 1585-1588. ACM, (2022)An Efficient Range Query Model over Encrypted Outsourced Data Using Secure K-D Tree., , , , and . NaNA, page 250-253. IEEE Computer Society, (2016)