Author of the publication

How Adversarial Assumptions Influence Re-identification Risk Measures: A COVID-19 Case Study.

, , , , , , , and . PSD, volume 13463 of Lecture Notes in Computer Science, page 361-374. Springer, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LSH-based private data protection for service quality with big range in distributed educational service recommendations., , and . EURASIP J. Wireless Comm. and Networking, (2019)A Polyamidoamine Dendrimer-Based Electrochemical Immunosensor for Label-Free Determination of Epithelial Cell Adhesion Molecule- Expressing Cancer Cells., , , and . Sensors, 19 (8): 1879 (2019)Exemplar-Based Image Inpainting using Automatic Patch Optimization., , , , and . ICVIP, page 128-133. ACM, (2018)Deep Imputation of Temporal Data., , , , and . ICHI, page 1-3. IEEE, (2019)Amplified locality-sensitive hashing-based recommender systems with privacy protection., , , , and . Concurr. Comput. Pract. Exp., (2022)MCGRAM: Linking Multi-Scale CNN With a Graph-Based Recurrent Attention Model for Subject-Independent ERP Detection., , , , and . IEEE Trans. Circuits Syst. II Express Briefs, 69 (12): 5199-5203 (2022)The Flux Reconstruction Method with Lax-Wendroff Type Temporal Discretization for Hyperbolic Conservation Laws., , , and . J. Sci. Comput., 82 (2): 42 (2020)Target Imaging Based on Generative Adversarial Nets in Through-wall Radar Imaging., , , , , and . ICCAIS, page 1-6. IEEE, (2019)Fast Anomaly Detection based on Data Stream in Network Intrusion Detection System., , , , , and . ACM TUR-C, page 87-91. ACM, (2021)Flocking and Collision Avoidance for a Dynamic Squad of Fixed-Wing UAVs Using Deep Reinforcement Learning., , , and . IROS, page 4738-4744. IEEE, (2021)