According to our database1, David Rebollo-Monedero authored at least 52 papers between 2003 and 2018.
Collaborative distances :
Collaborative distances :
Legend:Book In proceedings Article PhD thesis Other
Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
IEEE Access, 2018
Improving Opinion Analysis Through Statistical Disclosure Control in eVoting Scenarios.
Proceedings of the Electronic Government and the Information Systems Perspective, 2018
On web user tracking of browsing patterns for personalised advertising.
Shall I post this now? Optimized, delay-based privacy protection in social networks.
Knowl. Inf. Syst., 2017
p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017
Coherent, automatic address resolution for vehicular ad hoc networks.
On the Anonymity Risk of Time-Varying User Profiles.
Computational Improvements in Parallelized K-Anonymous Microaggregation of Large Databases.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017
k-Anonymous microaggregation with preservation of statistical dependence.
Inf. Sci., 2016
On Web User Tracking: How Third-Party Http Requests Track Users' Browsing Patterns for Personalised Advertising.
You never surf alone. Ubiquitous tracking of users' browsing habits.
Potential mass surveillance and privacy violations in proximity-based social applications.
On Content-Based Recommendation and User Privacy in Social-Tagging Systems.
On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016
Privacy-Enhancing Technologies and Metrics in Personalized Information Systems.
Proceedings of the Advanced Research in Data Privacy, 2015
Entropy-Based Privacy against Profiling of User Mobility.
On content-based recommendation and user privacy in social-tagging systems.
Computer Standards & Interfaces, 2015
Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015
You Never Surf Alone. Ubiquitous Tracking of Users' Browsing Habits.
Proceedings of the Data Privacy Management, and Security Assurance, 2015
Privacy-Preserving Enhanced Collaborative Tagging.
IEEE Trans. Knowl. Data Eng., 2014
A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas.
On collaborative anonymous communications in lossy networks.
Security and Communication Networks, 2014
Measuring the privacy of user profiles in personalized information systems.
Future Generation Comp. Syst., 2014
Reconciling privacy and efficient utility management in smart cities.
Trans. Emerging Telecommunications Technologies, 2014
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems.
Smart Deferral of Messages for Privacy Protection in Online Social Networks.
Optimizing the design parameters of threshold pool mixes for anonymity and delay.
Computer Networks, 2014
A modification of the k-means method for quasi-unsupervised learning.
Knowl.-Based Syst., 2013
A modification of the Lloyd algorithm for k-anonymous quantization.
Inf. Sci., 2013
On the measurement of privacy as an attacker's estimation error.
Int. J. Inf. Sec., 2013
A collaborative protocol for anonymous reporting in vehicular ad hoc networks.
Computer Standards & Interfaces, 2013
Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
IEEE Trans. Dependable Sec. Comput., 2012
Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval
On the Measurement of Privacy as an Attacker's Estimation Error
An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
Proceedings of the Security Technology, 2011
A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011
From t-Closeness-Like Privacy to Postrandomization via Information Theory.
IEEE Trans. Knowl. Data Eng., 2010
Optimized query forgery for private information retrieval.
IEEE Trans. Information Theory, 2010
Private location-based information retrieval through user collaboration.
Computer Communications, 2010
A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression.
Proceedings of the Trust, 2010
Measuring risk and utility of anonymized data using information theory.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009
From t-Closeness to PRAM and Noise Addition Via Information Theory.
Proceedings of the Privacy in Statistical Databases, 2008
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007
High-rate quantization and transform coding with side information at the decoder.
Signal Processing, 2006
Distributed Video Coding.
Proceedings of the IEEE, 2005
Design of optimal quantizers for distributed coding of noisy sources.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005
A Generalization of the Rate-Distortion Function for Wyner-Ziv Coding of Noisy Sources in the Quadratic-Gaussian Case.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005
Systematic lossy forward error protection for video waveforms.
Proceedings of the 2003 International Conference on Image Processing, 2003
Design of Optimal Quantizers for Distributed Source Coding.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003