Author of the publication

Anti-discrimination Analysis Using Privacy Attack Strategies.

, , , and . ECML/PKDD (2), volume 8725 of Lecture Notes in Computer Science, page 694-710. Springer, (2014)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Streaming with Affinity Propagation., , and . ECML/PKDD (2), volume 5212 of Lecture Notes in Computer Science, page 628-643. Springer, (2008)Mining Streaming and Temporal Data: from Representation to Knowledge.. IJCAI, page 5744-5748. ijcai.org, (2018)Efficient estimation of dynamic density functions with an application to outlier detection., , and . CIKM, page 2159-2163. ACM, (2012)When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System., , , , , , and . DASFAA (1), volume 10177 of Lecture Notes in Computer Science, page 576-591. Springer, (2017)Modeling Temporal Behavior of Awards Effect on Viewership of Movies., , and . PAKDD (1), volume 10234 of Lecture Notes in Computer Science, page 724-736. (2017)Efficient locality-sensitive hashing over high-dimensional streaming data., , , and . Neural Comput. Appl., 35 (5): 3753-3766 (February 2023)Multiple clusterings of heterogeneous information networks., , , , and . Mach. Learn., 110 (6): 1505-1526 (2021)CRSAL: Conversational Recommender Systems with Adversarial Learning., , , , , , and . ACM Trans. Inf. Syst., 38 (4): 34:1-34:40 (2020)Characterizing the Evasion Attackability of Multi-label Classifiers., , and . CoRR, (2020)Weakly-paired Cross-Modal Hashing., , , , and . CoRR, (2019)