Author of the publication

A relative privacy model for effective privacy preservation in transactional data.

, , , , and . Concurr. Comput. Pract. Exp., (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Towards Efficient Discovery of Target High Utility Itemsets., , , , , and . ICDM (Workshops), page 517-526. IEEE, (2022)Utility Aware Clustering for Publishing Transactional Data., , , and . PAKDD (2), volume 10235 of Lecture Notes in Computer Science, page 481-494. (2017)An Efficient Approach for Discovering Graph Entity Dependencies (GEDs)., , , , , , , , and . CoRR, (2023)Agriculture 4.0 and beyond: Evaluating cyber threat intelligence sources and techniques in smart farming ecosystems., , , , , , , , , and 5 other author(s). Comput. Secur., (2024)Discovering Graph Differential Dependencies., , , , , , and . ADC, volume 14386 of Lecture Notes in Computer Science, page 259-272. Springer, (2023)Malicious Package Detection using Metadata Information., , , , , , , , , and . WWW, page 1779-1789. ACM, (2024)A relative privacy model for effective privacy preservation in transactional data., , , , and . Concurr. Comput. Pract. Exp., (2019)A Relative Privacy Model for Effective Privacy Preservation in Transactional Data., , , , and . TrustCom/BigDataSE/ICESS, page 394-401. IEEE Computer Society, (2017)SD-WAN: Hybrid Edge Cloud Network between Multi-site SDDC., , and . Comput. Networks, (2024)An efficient approach for discovering Graph Entity Dependencies (GEDs)., , , , , , , , and . Inf. Syst., (2024)