David Rebollo-Monedero

Orcid: 0000-0002-0783-2382

According to our database1, David Rebollo-Monedero authored at least 54 papers between 2003 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
GNB-RPL: Gaussian Naïve Bayes for RPL Routing Protocol in Smart Grid Communications.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

2020
Mathematically optimized, recursive prepartitioning strategies for <i>k</i>-anonymous microaggregation of large-scale datasets.
Expert Syst. Appl., 2020

Preserving empirical data utility in k-anonymous microaggregation via linear discriminant analysis.
Eng. Appl. Artif. Intell., 2020

The Fast Maximum Distance to Average Vector (F-MDAV): An algorithm for k-anonymous microaggregation in big data.
Eng. Appl. Artif. Intell., 2020

INRISCO: INcident monitoRing in Smart COmmunities.
IEEE Access, 2020

Fair Detection of Poisoning Attacks in Federated Learning.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

2019
Efficient <i>k</i>-anonymous microaggregation of multivariate numerical data via principal component analysis.
Inf. Sci., 2019

Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach.
Proceedings of the 16th International Conference on Information Systems for Crisis Response and Management, 2019

2018
Does k-Anonymous Microaggregation Affect Machine-Learned Macrotrends?
IEEE Access, 2018

Incremental k-Anonymous Microaggregation in Large-Scale Electronic Surveys With Optimized Scheduling.
IEEE Access, 2018

Improving Opinion Analysis Through Statistical Disclosure Control in eVoting Scenarios.
Proceedings of the Electronic Government and the Information Systems Perspective, 2018

2017
On web user tracking of browsing patterns for personalised advertising.
Int. J. Parallel Emergent Distributed Syst., 2017

Shall I post this now? Optimized, delay-based privacy protection in social networks.
Knowl. Inf. Syst., 2017

p-Probabilistic k-anonymous microaggregation for the anonymization of surveys with uncertain participation.
Inf. Sci., 2017

Coherent, automatic address resolution for vehicular ad hoc networks.
Int. J. Ad Hoc Ubiquitous Comput., 2017

On the Anonymity Risk of Time-Varying User Profiles.
Entropy, 2017

Computational Improvements in Parallelized K-Anonymous Microaggregation of Large Databases.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems Workshops, 2017

2016
k-Anonymous microaggregation with preservation of statistical dependence.
Inf. Sci., 2016

On Web user tracking: How third-party http requests track users' browsing patterns for personalised advertising.
Proceedings of the 2016 Mediterranean Ad Hoc Networking Workshop, 2016

2015
Privacy-Enhancing Technologies and Metrics in Personalized Information Systems.
Proceedings of the Advanced Research in Data Privacy, 2015

Entropy-Based Privacy against Profiling of User Mobility.
Entropy, 2015

On content-based recommendation and user privacy in social-tagging systems.
Comput. Stand. Interfaces, 2015

Potential Mass Surveillance and Privacy Violations in Proximity-Based Social Applications.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

You Never Surf Alone. Ubiquitous Tracking of Users' Browsing Habits.
Proceedings of the Data Privacy Management, and Security Assurance, 2015

2014
Privacy-Preserving Enhanced Collaborative Tagging.
IEEE Trans. Knowl. Data Eng., 2014

A Multimetric, Map-Aware Routing Protocol for VANETs in Urban Areas.
Sensors, 2014

On collaborative anonymous communications in lossy networks.
Secur. Commun. Networks, 2014

Measuring the privacy of user profiles in personalized information systems.
Future Gener. Comput. Syst., 2014

Reconciling privacy and efficient utility management in smart cities.
Trans. Emerg. Telecommun. Technol., 2014

Optimal Forgery and Suppression of Ratings for Privacy Enhancement in Recommendation Systems.
Entropy, 2014

Smart Deferral of Messages for Privacy Protection in Online Social Networks.
CoRR, 2014

Optimizing the design parameters of threshold pool mixes for anonymity and delay.
Comput. Networks, 2014

2013
A modification of the k-means method for quasi-unsupervised learning.
Knowl. Based Syst., 2013

A modification of the Lloyd algorithm for k-anonymous quantization.
Inf. Sci., 2013

On the measurement of privacy as an attacker's estimation error.
Int. J. Inf. Sec., 2013

A collaborative protocol for anonymous reporting in vehicular ad hoc networks.
Comput. Stand. Interfaces, 2013

2012
Query Profile Obfuscation by Means of Optimal Query Exchange between Users.
IEEE Trans. Dependable Secur. Comput., 2012

Optimal tag suppression for privacy protection in the semantic Web.
Data Knowl. Eng., 2012

2011
An algorithm for k-anonymous microaggregation and clustering inspired by the design of distortion-optimized quantizers.
Data Knowl. Eng., 2011

An Information-Theoretic Privacy Criterion for Query Forgery in Information Retrieval.
Proceedings of the Security Technology, 2011

A Privacy-Protecting Architecture for Collaborative Filtering via Forgery and Suppression of Ratings.
Proceedings of the Data Privacy Management and Autonomous Spontaneus Security, 2011

2010
From t-Closeness-Like Privacy to Postrandomization via Information Theory.
IEEE Trans. Knowl. Data Eng., 2010

Optimized query forgery for private information retrieval.
IEEE Trans. Inf. Theory, 2010

Private location-based information retrieval through user collaboration.
Comput. Commun., 2010

A Privacy-Preserving Architecture for the Semantic Web Based on Tag Suppression.
Proceedings of the Trust, 2010

2009
Measuring risk and utility of anonymized data using information theory.
Proceedings of the 2009 EDBT/ICDT Workshops, Saint-Petersburg, Russia, March 22, 2009, 2009

2008
From t-Closeness to PRAM and Noise Addition Via Information Theory.
Proceedings of the Privacy in Statistical Databases, 2008

2007
High-Rate Analysis of Systematic Lossy Error Protection of a Predictively Encoded Source.
Proceedings of the 2007 Data Compression Conference (DCC 2007), 2007

2006
High-rate quantization and transform coding with side information at the decoder.
Signal Process., 2006

2005
Distributed Video Coding.
Proc. IEEE, 2005

Design of optimal quantizers for distributed coding of noisy sources.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

A Generalization of the Rate-Distortion Function for Wyner-Ziv Coding of Noisy Sources in the Quadratic-Gaussian Case.
Proceedings of the 2005 Data Compression Conference (DCC 2005), 2005

2003
Systematic lossy forward error protection for video waveforms.
Proceedings of the 2003 International Conference on Image Processing, 2003

Design of Optimal Quantizers for Distributed Source Coding.
Proceedings of the 2003 Data Compression Conference (DCC 2003), 2003


  Loading...