Author of the publication

Achieving Causal Fairness through Generative Adversarial Networks.

, , , , and . IJCAI, page 1452-1458. ijcai.org, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Protecting business intelligence and customer privacy while outsourcing data mining tasks., , and . Knowl. Inf. Syst., 17 (1): 99-120 (2008)Examining Multi-factor Interactions in Microblogging Based on Log-linear Modeling., , , and . ASONAM, page 189-193. IEEE Computer Society, (2012)Approximate Inverse Frequent Itemset Mining: Privacy, Complexity, and Approximation., and . ICDM, page 482-489. IEEE Computer Society, (2005)Privacy Aware Data Generation for Testing Database Applications., , , and . IDEAS, page 317-326. IEEE Computer Society, (2005)Randomizing Social Networks: a Spectrum Preserving Approach., and . SDM, page 739-750. SIAM, (2008)On Discrimination Discovery and Removal in Ranked Data using Causal Graph., , and . KDD, page 2536-2544. ACM, (2018)FairGAN: Fairness-aware Generative Adversarial Networks., , , and . BigData, page 570-575. IEEE, (2018)On Addressing Accuracy Concerns in Privacy Preserving Association Rule Mining., , and . PAKDD, volume 5012 of Lecture Notes in Computer Science, page 124-135. Springer, (2008)On Burst Detection and Prediction in Retweeting Sequence., , , , and . PAKDD (1), volume 9077 of Lecture Notes in Computer Science, page 96-107. Springer, (2015)Spectral Analysis of k-Balanced Signed Graphs., , , , and . PAKDD (2), volume 6635 of Lecture Notes in Computer Science, page 1-12. Springer, (2011)