Author of the publication

Ant-driven clustering for utility-aware disassociation of set-valued datasets.

, , , and . IDEAS, page 6:1-6:9. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

The Image Protector - A Flexible Security Rule Specification Toolkit ., , and . SECRYPT, page 345-350. SciTePress, (2011)Random Sampling Plus Fake Data: Multidimensional Frequency Estimates With Local Differential Privacy., , , and . CIKM, page 47-57. ACM, (2021)Longitudinal Collection and Analysis of Mobile Phone Data with Local Differential Privacy., , , and . Privacy and Identity Management, volume 619 of IFIP Advances in Information and Communication Technology, page 40-57. Springer, (2020)Cloud-based differentially private image classification., , , and . Wirel. Networks, 29 (3): 997-1004 (April 2023)VIP Blowfish Privacy in Communication Graphs., , , and . ICETE (2), page 459-467. ScitePress, (2020)Ant-driven clustering for utility-aware disassociation of set-valued datasets., , , and . IDEAS, page 6:1-6:9. ACM, (2019)A Flexible Image-Based Access Control Model for Social Networks., , , and . Security and Privacy Preserving in Social Networks, Springer, (2013)Multimedia-based authorization and access control policy specification., and . SWS, page 61-68. ACM, (2006)Forecasting the number of firefighter interventions per region with local-differential-privacy-based data., , , , , , and . Comput. Secur., (2020)Improving the utility of locally differentially private protocols for longitudinal and multidimensional frequency estimates., , , and . Digit. Commun. Networks, 10 (2): 369-379 (2024)