End-to-end neural network architecture for fraud scoring in card payments. | 6 | 0.47 | 2018 |
On the Application of SDC Stream Methods to Card Payments Analytics. | 0 | 0.34 | 2018 |
Tweet-SCAN: An event discovery technique for geo-located tweets. | 5 | 0.43 | 2017 |
Towards the adaptation of SDC methods to stream mining. | 1 | 0.39 | 2017 |
Lessons Learned About Deep Learning for Credit Card Fraud Scoring. | 0 | 0.34 | 2016 |
Crowdwon: A Modelling Language For Crowd Processes Based On Workflow Nets | 0 | 0.34 | 2015 |
Revisiting distance-based record linkage for privacy-preserving release of statistical datasets | 5 | 0.43 | 2015 |
Variable linkage for multimedia metadata schema matching | 0 | 0.34 | 2014 |
Worker ranking determination in crowdsourcing platforms using aggregation functions | 3 | 0.41 | 2014 |
Towards the Cloudification of the Social Networks Analytics. | 0 | 0.34 | 2014 |
Using genetic algorithms for attribute grouping in multivariate microaggregation | 1 | 0.36 | 2014 |
Towards the Use of Sequential Patterns for Detection and Characterization of Natural and Agricultural Areas. | 1 | 0.37 | 2014 |
Beyond Multivariate Microaggregation For Large Record Anonymization | 0 | 0.34 | 2013 |
A modification of the k-means method for quasi-unsupervised learning | 2 | 0.39 | 2013 |
On The Use Of Social Trajectory-Based Clustering Methods For Public Transport Optimization | 0 | 0.34 | 2013 |
Digital Watermarking Techniques and Security Issues in the Information and Communication Society | 9 | 0.76 | 2013 |
Kd-trees and the real disclosure risks of large statistical databases | 8 | 0.45 | 2012 |
Efficient microaggregation techniques for large numerical data volumes | 12 | 0.54 | 2012 |
Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching | 2 | 0.40 | 2012 |
Citizens Sensor Networks. | 3 | 0.41 | 2012 |
More Hybrid and Secure Protection of Statistical Data Sets | 2 | 0.36 | 2012 |
Approaches and standards for metadata interoperability in distributed image search and retrieval | 1 | 0.36 | 2011 |
Speed up gradual rule mining from stream data! A B-Tree and OWA-based approach | 2 | 0.41 | 2010 |
Using classification methods to evaluate attribute disclosure risk | 1 | 0.35 | 2010 |
Classifying data from protected statistical datasets | 14 | 0.58 | 2010 |
A Cryptographic Solution for Private Distributed Simple Meeting Scheduling | 0 | 0.34 | 2009 |
Privacy and anonymization for very large datasets | 10 | 0.65 | 2009 |
Distributed privacy-preserving methods for statistical disclosure control | 4 | 0.40 | 2009 |
Computing Reputation for Collaborative Private Networks | 8 | 0.56 | 2009 |
On The Use Of Aggregation Operators For Location Privacy | 2 | 0.37 | 2009 |
Analysis of the Univariate Microaggregation Disclosure Risk | 8 | 0.48 | 2009 |
Proceeding of the ACM First International Workshop on Privacy and Anonymity for Very Large Databases, CIKM-PAVLAD 2009, Hong Kong, China, November 6, 2009 | 8 | 0.63 | 2009 |
Towards the evaluation of time series protection methods | 15 | 0.68 | 2009 |
Towards a More Realistic Disclosure Risk Assessment | 1 | 0.36 | 2008 |
Record linkage for database integration using fuzzy integrals | 8 | 0.56 | 2008 |
Improving Microaggregation for Complex Record Anonymization | 0 | 0.34 | 2008 |
ONN the use of neural networks for data privacy | 0 | 0.34 | 2008 |
Rethinking rank swapping to decrease disclosure risk | 43 | 1.86 | 2008 |
How To Group Attributes In Multivariate Microaggregation | 14 | 0.69 | 2008 |
On the disclosure risk of multivariate microaggregation | 31 | 0.96 | 2008 |
Parallelizing Record Linkage for Disclosure Risk Assessment | 3 | 0.46 | 2008 |
Dex: high-performance exploration on large graphs for information retrieval | 51 | 2.53 | 2007 |
Ordered Data Set Vectorization for Linear Regression on Data Privacy | 7 | 0.64 | 2007 |
Increasing Polynomial Regression Complexity for Data Anonymization | 0 | 0.34 | 2007 |
Semantic blocking for Record Linkage | 0 | 0.34 | 2007 |
On the Use of Semantic Blocking Techniques for Data Cleansing and Integration | 4 | 0.57 | 2007 |
Distance based re-identification for time series, analysis of distances | 2 | 0.42 | 2006 |
New approach to the re-identification problem using neural networks | 1 | 0.35 | 2006 |
Extending microaggregation procedures for time series protection | 7 | 0.53 | 2006 |
Empirical analysis of database privacy using twofold integrals | 3 | 0.44 | 2005 |