Traian Marius Truta

According to our database1, Traian Marius Truta authored at least 37 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
COVID-19 Vaccine Brand Sentiment on Twitter.
Proceedings of the OASIS@HT 2022: Open Challenges in Online Social Networks, 2022

2020
Collecting Domain-Relevant Tweets: Creation and Application of a New Framework.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2018
Efficient Approximation Algorithms for Minimum Dominating Sets in Social Networks.
Int. J. Serv. Sci. Manag. Eng. Technol., 2018

Is Data Collection through Twitter Streaming API Useful for Academic Research?
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
Impact of security awareness training on phishing click-through rates.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Fighting fake news spread in online social networks: Actual trends and future research directions.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2015
Foreword for the special issue of selected papers from the 7th EDBT/ICDT Workshop on Privacy and Anonymity in Information Society (PAIS 2014).
Trans. Data Priv., 2015

Preserving Communities in Anonymized Social Networks.
Trans. Data Priv., 2015

Fast Dominating Set Algorithms for Social Networks.
Proceedings of the 26th Modern AI and Cognitive Science Conference 2015, 2015

Efficient approximation algorithms to determine minimum partial dominating sets in social networks.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Privacy-Preserving Assessment of Social Network Data Trustworthiness.
Int. J. Cooperative Inf. Syst., 2014

Community Detection in Anonymized Social Networks.
Proceedings of the Workshops of the EDBT/ICDT 2014 Joint Conference (EDBT/ICDT 2014), 2014

2013
Finding anomalies in windows event logs using standard deviation.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

2012
Efficient Privacy Preserving Protocols for Similarity Join.
Trans. Data Priv., 2012

An Overview of P-Sensitive k-Anonymity Models for Microdata Anonymization.
Int. J. Uncertain. Fuzziness Knowl. Based Syst., 2012

Preservation of structural properties in anonymized social networks.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
On-the-Fly Generalization Hierarchies for Numerical Attributes Revisited.
Proceedings of the Secure Data Management - 8th VLDB Workshop, SDM 2011, Seattle, WA, USA, 2011

Preparing for future data center professionals: Integrating storage technology into the Computer Information Technology curriculum.
Proceedings of the 2011 Frontiers in Education Conference, 2011

A privacy preserving efficient protocol for semantic similarity join using long string attributes.
Proceedings of the 2011 International Workshop on Privacy and Anonymity in Information Society, 2011

2010
Avoiding Attribute Disclosure with the (Extended) <i>p</i>-Sensitive <i>k</i>-Anonymity Model.
Proceedings of the Data Mining - Special Issue in Annals of Information Systems, 2010

P-Sensitive K-Anonymity with Generalization Constraints.
Trans. Data Priv., 2010

User-controlled generalization boundaries for <i>p</i>-sensitive <i>k</i>-anonymity.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
P-Sensitive K-Anonymity for Social Networks.
Proceedings of The 2009 International Conference on Data Mining, 2009

2008
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing.
Trans. Data Priv., 2008

Report on international workshop on privacy and anonymity in the information society (PAIS 2008).
SIGMOD Rec., 2008

Data and Structural k-Anonymity in Social Networks.
Proceedings of the Privacy, 2008

Protecting privacy in recorded conversations.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

(p<sup>+</sup>, α)-sensitive k-anonymity: A new enhanced privacy protection model.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Generating Microdata with <i>P</i> -Sensitive <i>K</i> -Anonymity Property.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

<i>K</i>-anonymization incremental maintenance and optimization techniques.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

A Clustering Approach for Achieving Data Privacy.
Proceedings of the 2007 International Conference on Data Mining, 2007

2006
Privacy Protection: p-Sensitive k-Anonymity Property.
Proceedings of the 22nd International Conference on Data Engineering Workshops, 2006

An Algorithm for the Discovery of Arbitrary Length Ordinal Association Rules.
Proceedings of the 2006 International Conference on Data Mining, 2006

2004
Assessing global disclosure risk in masked microdata.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Disclosure risk measures for the sampling disclosure control method.
Proceedings of the 2004 ACM Symposium on Applied Computing (SAC), 2004

2003
Privacy and confidentiality management for the microaggregation disclosure control method: disclosure risk and information loss measures.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

Disclosure Risk Measures for Microdata.
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003


  Loading...