Wahbeh H. Qardaji

According to our database1, Wahbeh H. Qardaji authored at least 12 papers between 2009 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
PriView: practical differentially private release of marginal contingency tables.
Proceedings of the International Conference on Management of Data, 2014

2013
Understanding Hierarchical Methods for Differentially Private Histograms.
Proc. VLDB Endow., 2013

Differentially private grids for geospatial data.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Membership privacy: a unifying framework for privacy definitions.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
PrivBasis: Frequent Itemset Mining with Differential Privacy.
Proc. VLDB Endow., 2012

Anonymizing Network Traces with Temporal Pseudonym Consistency.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

Minimizing private data disclosures in the smart grid.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

Recursive partitioning and summarization: a practical framework for differentially private data publishing.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

On sampling, anonymization, and differential privacy or, <i>k</i>-anonymization meets differential privacy.
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy
CoRR, 2011

2009
An efficient framework for user authorization queries in RBAC systems.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009


  Loading...