Author of the publication

The CASE histogram: privacy-aware processing of trajectory data using aggregates.

, , , and . GeoInformatica, 19 (4): 747-798 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Robust and Private Bayesian Inference., , , and . ALT, volume 8776 of Lecture Notes in Computer Science, page 291-305. Springer, (2014)A Learning-Based Approach to Reactive Security., , , , , and . Financial Cryptography, volume 6052 of Lecture Notes in Computer Science, page 192-206. Springer, (2010)Exploiting Machine Learning to Subvert Your Spam Filter., , , , , , , , and . LEET, USENIX Association, (2008)Shifting, One-Inclusion Mistake Bounds and Tight Multiclass Expected Risk Bounds., , and . NIPS, page 1193-1200. MIT Press, (2006)Near-Optimal Evasion of Convex-Inducing Classifiers., , , , , , , , and . AISTATS, volume 9 of JMLR Proceedings, page 549-556. JMLR.org, (2010)Open problems in the security of learning., , , , , , , and . AISec, page 19-26. ACM, (2008)Adversarial machine learning., , , , and . AISec, page 43-58. ACM, (2011)A Geometric Approach to Sample Compression., and . J. Mach. Learn. Res., (2012)Large Scale Metric learning., , and . IJCNN, page 1442-1449. IEEE, (2016)Fast trajectory clustering using Hashing methods., , , and . IJCNN, page 3689-3696. IEEE, (2016)