Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Cluster-and-Connect: An algorithmic approach to generating synthetic electric power network graphs., , and . Allerton, page 223-230. IEEE, (2015)Related-Key Linear Cryptanalysis., and . ISIT, page 1609-1613. IEEE, (2006)Towards Understanding Differential Privacy: When Do People Trust Randomized Response Technique?, , , and . CHI, page 3833-3837. ACM, (2017)A differentially private estimator for the stochastic Kronecker graph model., and . EDBT/ICDT Workshops, page 167-176. ACM, (2012)Information-Theoretic Foundations of Differential Privacy.. FPS, volume 7743 of Lecture Notes in Computer Science, page 374-381. Springer, (2012)It Takes a Village: A Community Based Participatory Framework for Privacy Design., , and . EuroS&P Workshops, page 112-115. IEEE, (2018)Embracing our Future: CS Courses and Curriculum for Non-CS-majors., , and . SIGCSE, page 1234. ACM, (2019)Cluster-and-connect: A more realistic model for the electric power network topology., , and . SmartGridComm, page 85-90. IEEE, (2015)Fighting Back Algocracy: The need for new participatory approaches to technology assessment., and . PDC (2), page 148-153. ACM, (2020)Differentially private models of tollgate usage: The Milan tollgate data set., , , and . IEEE BigData, page 46-48. IEEE Computer Society, (2014)