Year |
Citation |
Score |
2020 |
Kaplan E, Gursoy ME, Nergiz ME, Saygin Y. Known Sample Attacks on Relation Preserving Data Transformations Ieee Transactions On Dependable and Secure Computing. 17: 443-450. DOI: 10.1109/Tdsc.2017.2759732 |
0.463 |
|
2017 |
Gursoy ME, Inan A, Nergiz ME, Saygin Y. Differentially private nearest neighbor classification Data Mining and Knowledge Discovery. 31: 1544-1575. DOI: 10.1007/S10618-017-0532-Z |
0.455 |
|
2016 |
Ozalp I, Gursoy ME, Nergiz ME, Saygin Y. Privacy-Preserving Publishing of Hierarchical Data Acm Transactions On Privacy and Security. 19: 1-29. DOI: 10.1145/2976738 |
0.427 |
|
2014 |
Nergiz ME, Gök MZ. Hybrid k-Anonymity Computers and Security. 44: 51-63. DOI: 10.1016/J.Cose.2014.03.006 |
0.481 |
|
2014 |
Cicek AE, Nergiz ME, Saygin Y. Ensuring location diversity in privacy-preserving spatio-temporal data publishing Vldb Journal. 23: 609-625. DOI: 10.1007/s00778-013-0342-x |
0.361 |
|
2013 |
Abdalaal A, Nergiz ME, Saygin Y. Privacy-preserving publishing of opinion polls Computers and Security. 37: 143-154. DOI: 10.1016/J.Cose.2013.03.008 |
0.415 |
|
2013 |
Nergiz ME, Gök MZ, Özkanli U. Preservation of utility through hybrid k-anonymization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8058: 97-111. DOI: 10.1007/978-3-642-40343-9_9 |
0.4 |
|
2012 |
Nergiz ME, Çiçek E, Pedersen T, Saygin Y. A look-ahead approach to secure multiparty protocols Ieee Transactions On Knowledge and Data Engineering. 24: 1170-1185. DOI: 10.1109/Tkde.2011.44 |
0.427 |
|
2011 |
Nergiz ME, Tamersoy A, Saygin Y. Instant anonymization Acm Transactions On Database Systems. 36. DOI: 10.1145/1929934.1929936 |
0.418 |
|
2010 |
Nergiz ME, Clifton C. Presence without complete world knowledge Ieee Transactions On Knowledge and Data Engineering. 22: 868-883. DOI: 10.1109/Tkde.2009.125 |
0.661 |
|
2010 |
Nergiz AE, Nergiz ME, Pedersen T, Clifton C. Practical and secure integer comparison and interval check Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 791-799. DOI: 10.1109/SocialCom.2010.121 |
0.57 |
|
2009 |
Nergiz ME, Clifton C, Nergiz AE. Multirelational k-anonymity Ieee Transactions On Knowledge and Data Engineering. 21: 1104-1117. DOI: 10.1109/Tkde.2008.210 |
0.462 |
|
2007 |
Nergiz ME, Clifton C. Thoughts on k-anonymization Data and Knowledge Engineering. 63: 622-645. DOI: 10.1016/j.datak.2007.03.009 |
0.45 |
|
Show low-probability matches. |