Author:
Atallah M.,Bertino E.,Elmagarmid A.,Ibrahim M.,Verykios V.
Cited by
29 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Graph based Hiding of Sensitive Knowledge;2023 IEEE 35th International Conference on Tools with Artificial Intelligence (ICTAI);2023-11-06
2. Interoperability of Information Sources for Identification With Privacy Preservation and Early Fraud Detection;2023 14th International Conference on Information, Intelligence, Systems & Applications (IISA);2023-07-10
3. A Comprehensive Analysis Of Normalization Approaches For Privacy Protection In Data Mining;International Journal of Scientific Research in Computer Science, Engineering and Information Technology;2022-09-15
4. Hiding Sensitive Itemsets Using Sibling Itemset Constraints;Symmetry;2022-07-15
5. Location-privacy preserving partial nearby friends querying in urban areas;Data & Knowledge Engineering;2022-05