Author of the publication

Improving Data Utility Through Game Theory in Personalized Differential Privacy.

, , , , , and . J. Comput. Sci. Technol., 34 (2): 272-286 (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

LayoutLM: Pre-training of Text and Layout for Document Image Understanding., , , , , and . CoRR, (2019)A two layer model of malware propagation in a search engine context., , , , , and . INFOCOM Workshops, page 21-26. IEEE, (2018)SyncSnap: Synchronized Live Memory Snapshots of Virtual Machine Networks., , , , and . HPCC/CSS/ICESS, page 490-497. IEEE, (2014)Evaluating reliability of co-citation clustering analysis in representing the research history of subject., , and . Scientometrics, 80 (1): 91-102 (2009)Modeling and Analyzing the Spatial-Temporal Propagation of Malware in Mobile Wearable IoT Networks., , , , and . IEEE Internet Things J., 11 (2): 2438-2452 (January 2024)A deep learning-based framework for lung cancer survival analysis with biomarker interpretation., , , , , , , and . BMC Bioinform., 21 (1): 112 (2020)Cross-Modality Attention with Semantic Graph Embedding for Multi-Label Classification., , , , , and . AAAI, page 12709-12716. AAAI Press, (2020)Exploring Efficient and Robust Virtual Machine Introspection Techniques., , , , , and . ICA3PP (3), volume 9530 of Lecture Notes in Computer Science, page 429-448. Springer, (2015)Hybrid Decoding: Decoding with Partial Hypotheses Combination over Multiple SMT Systems., , , , and . COLING (Posters), page 214-222. Chinese Information Processing Society of China, (2010)Non-Technical Losses Detection in Smart Grids: An Ensemble Data-Driven Approach., , , , , and . ICPADS, page 563-568. IEEE, (2020)