Jordi Nin

Orcid: 0000-0002-9659-2762

According to our database1, Jordi Nin authored at least 74 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Revisiting online anonymization algorithms to ensure location privacy.
J. Ambient Intell. Humaniz. Comput., 2023

Default propagation in customer-supplier networks: An agent-based model approach to the isolation of companies in default.
J. Ambient Intell. Humaniz. Comput., 2023

A Scalable and Efficient Iterative Method for Copying Machine Learning Classifiers.
CoRR, 2023

Resource Allocation in Home Care Services Using Reinforcement Learning.
Proceedings of the Artificial Intelligence Research and Development, 2023

2021
Differential Replication for Credit Scoring in Regulated Environments.
Entropy, 2021

Quantile Encoder: Tackling High Cardinality Categorical Features in Regression Problems.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2021

On the Convergence of Financial Distress Propagation on Generic Networks.
Proceedings of the Artificial Intelligence Research and Development, 2021

2020
Environmental Adaptation and Differential Replication in Machine Learning.
Entropy, 2020

Differential Replication in Machine Learning.
CoRR, 2020

Copying Machine Learning Classifiers.
IEEE Access, 2020

Sampling Unknown Decision Functions to Build Classifier Copies.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2020

2019
Assessing the risk of default propagation in interconnected sectoral financial networks.
EPJ Data Sci., 2019

Using Copies to Remove Sensitive Data: A Case Study on Fair Superhero Alignment Prediction.
Proceedings of the Pattern Recognition and Image Analysis - 9th Iberian Conference, 2019

From Batch to Online Learning Using Copies.
Proceedings of the Artificial Intelligence Research and Development, 2019

2018
End-to-end neural network architecture for fraud scoring in card payments.
Pattern Recognit. Lett., 2018

Towards Global Explanations for Credit Risk Scoring.
CoRR, 2018

On the Application of SDC Stream Methods to Card Payments Analytics.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2018

Answering Multiple Aggregate Queries Under a Specific Privacy Condition.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Tweet-SCAN: An event discovery technique for geo-located tweets.
Pattern Recognit. Lett., 2017

Towards the adaptation of SDC methods to stream mining.
Comput. Secur., 2017

2016
Lessons Learned About Deep Learning for Credit Card Fraud Scoring.
Proceedings of the Artificial Intelligence Research and Development, 2016

2015
A Review of Attribute Disclosure Control.
Proceedings of the Advanced Research in Data Privacy, 2015

Revisiting distance-based record linkage for privacy-preserving release of statistical datasets.
Data Knowl. Eng., 2015

CrowdWON: A Modelling Language for Crowd Processes based on Workflow Nets.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Variable linkage for multimedia metadata schema matching.
Multim. Tools Appl., 2014

Secure and efficient anonymization of distributed confidential databases.
Int. J. Inf. Sec., 2014

Using genetic algorithms for attribute grouping in multivariate microaggregation.
Intell. Data Anal., 2014

Towards the Cloudification of the Social Networks Analytics.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2014

Towards the Use of Sequential Patterns for Detection and Characterization of Natural and Agricultural Areas.
Proceedings of the Information Processing and Management of Uncertainty in Knowledge-Based Systems, 2014

Exploring high repetitivity remote sensing time series for mapping and monitoring natural habitats - A new approach combining OBIA and k-partite graphs.
Proceedings of the 2014 IEEE Geoscience and Remote Sensing Symposium, 2014

Worker ranking determination in crowdsourcing platforms using aggregation functions.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

2013
A modification of the k-means method for quasi-unsupervised learning.
Knowl. Based Syst., 2013

On the Use of Social Trajectory-Based Clustering Methods for Public Transport Optimization.
Proceedings of the Citizen in Sensor Networks - Second International Workshop, 2013

Beyond Multivariate Microaggregation for Large Record Anonymization.
Proceedings of the Citizen in Sensor Networks - Second International Workshop, 2013

Digital Watermarking Techniques and Security Issues in the Information and Communication Society.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
More Hybrid and Secure Protection of Statistical Data Sets.
IEEE Trans. Dependable Secur. Comput., 2012

Kd-trees and the real disclosure risks of large statistical databases.
Inf. Fusion, 2012

Efficient microaggregation techniques for large numerical data volumes.
Int. J. Inf. Sec., 2012

Energy-Efficiency and Security Issues in the Cisco Nexus Virtual Distributed Switching.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Citizens Sensor Networks.
Proceedings of the Citizen in Sensor Networks - First International Workshop, 2012

2011
Optimal Symbol Alignment Distance: A New Distance for Sequences of Symbols.
IEEE Trans. Knowl. Data Eng., 2011

Approaches and Standards for Metadata Interoperability in Distributed Image Search and Retrieval.
Proceedings of the Database and Expert Systems Applications, 2011

2010
Speed up gradual rule mining from stream data! A B-Tree and OWA-based approach.
J. Intell. Inf. Syst., 2010

Classifying data from protected statistical datasets.
Comput. Secur., 2010

Using Classification Methods to Evaluate Attribute Disclosure Risk.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2010

Possibilistic reasoning for trust-based access control enforcement in social networks.
Proceedings of the FUZZ-IEEE 2010, 2010

2009
Analysis of the Univariate Microaggregation Disclosure Risk.
New Gener. Comput., 2009

Towards the evaluation of time series protection methods.
Inf. Sci., 2009

Partial Symbol Ordering Distance.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2009

On the Use of Aggregation Operators for Location Privacy.
Proceedings of the Joint 2009 International Fuzzy Systems Association World Congress and 2009 European Society of Fuzzy Logic and Technology Conference, 2009

Distributed Privacy-Preserving Methods for Statistical Disclosure Control.
Proceedings of the Data Privacy Management and Autonomous Spontaneous Security, 2009

Computing Reputation for Collaborative Private Networks.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

Privacy and anonymization for very large datasets.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

A Cryptographic Solution for Private Distributed Simple Meeting Scheduling.
Proceedings of the Artificial Intelligence Research and Development, 2009

Using OWA operators for gene sequential pattern clustering.
Proceedings of the Twenty-Second IEEE International Symposium on Computer-Based Medical Systems, 2009

2008
How to Group Attributes in Multivariate Microaggregation.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2008

Record linkage for database integration using fuzzy integrals.
Int. J. Intell. Syst., 2008

On the disclosure risk of multivariate microaggregation.
Data Knowl. Eng., 2008

Rethinking rank swapping to decrease disclosure risk.
Data Knowl. Eng., 2008

ONN the Use of Neural Networks for Data Privacy.
Proceedings of the SOFSEM 2008: Theory and Practice of Computer Science, 2008

Towards a More Realistic Disclosure Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2008

Parallelizing Record Linkage for Disclosure Risk Assessment.
Proceedings of the Privacy in Statistical Databases, 2008

Improving Microaggregation for Complex Record Anonymization.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2008

Attribute selection in multivariate microaggregation.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

2007
Ordered Data Set Vectorization for Linear Regression on Data Privacy.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2007

Increasing Polynomial Regression Complexity for Data Anonymization.
Proceedings of the 2007 International Conference on Intelligent Pervasive Computing, 2007

On the Use of Semantic Blocking Techniques for Data Cleansing and Integration.
Proceedings of the Eleventh International Database Engineering and Applications Symposium (IDEAS 2007), 2007

Dex: high-performance exploration on large graphs for information retrieval.
Proceedings of the Sixteenth ACM Conference on Information and Knowledge Management, 2007

Semantic blocking for Record Linkage.
Proceedings of the Artificial Intelligence Research and Development, 2007

2006
Extending Microaggregation Procedures for Time Series Protection.
Proceedings of the Rough Sets and Current Trends in Computing, 2006

Distance Based Re-identification for Time Series, Analysis of Distances.
Proceedings of the Privacy in Statistical Databases, 2006

New Approach to the Re-identification Problem Using Neural Networks.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2006

2005
Towards the use of OWA operators for record linkage.
Proceedings of the Joint 4th Conference of the European Society for Fuzzy Logic and Technology and the 11th Rencontres Francophones sur la Logique Floue et ses Applications, 2005

Empirical Analysis of Database Privacy Using Twofold Integrals.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...