Mehmet E. Nergiz, Ph.D. - Publications

Affiliations: 
2008 Computer Sciences Purdue University, West Lafayette, IN, United States 
Area:
Computer Science

13 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Kaplan E, Gursoy ME, Nergiz ME, Saygin Y. Known Sample Attacks on Relation Preserving Data Transformations Ieee Transactions On Dependable and Secure Computing. 17: 443-450. DOI: 10.1109/Tdsc.2017.2759732  0.463
2017 Gursoy ME, Inan A, Nergiz ME, Saygin Y. Differentially private nearest neighbor classification Data Mining and Knowledge Discovery. 31: 1544-1575. DOI: 10.1007/S10618-017-0532-Z  0.455
2016 Ozalp I, Gursoy ME, Nergiz ME, Saygin Y. Privacy-Preserving Publishing of Hierarchical Data Acm Transactions On Privacy and Security. 19: 1-29. DOI: 10.1145/2976738  0.427
2014 Nergiz ME, Gök MZ. Hybrid k-Anonymity Computers and Security. 44: 51-63. DOI: 10.1016/J.Cose.2014.03.006  0.481
2014 Cicek AE, Nergiz ME, Saygin Y. Ensuring location diversity in privacy-preserving spatio-temporal data publishing Vldb Journal. 23: 609-625. DOI: 10.1007/s00778-013-0342-x  0.361
2013 Abdalaal A, Nergiz ME, Saygin Y. Privacy-preserving publishing of opinion polls Computers and Security. 37: 143-154. DOI: 10.1016/J.Cose.2013.03.008  0.415
2013 Nergiz ME, Gök MZ, Özkanli U. Preservation of utility through hybrid k-anonymization Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics). 8058: 97-111. DOI: 10.1007/978-3-642-40343-9_9  0.4
2012 Nergiz ME, Çiçek E, Pedersen T, Saygin Y. A look-ahead approach to secure multiparty protocols Ieee Transactions On Knowledge and Data Engineering. 24: 1170-1185. DOI: 10.1109/Tkde.2011.44  0.427
2011 Nergiz ME, Tamersoy A, Saygin Y. Instant anonymization Acm Transactions On Database Systems. 36. DOI: 10.1145/1929934.1929936  0.418
2010 Nergiz ME, Clifton C. Presence without complete world knowledge Ieee Transactions On Knowledge and Data Engineering. 22: 868-883. DOI: 10.1109/Tkde.2009.125  0.661
2010 Nergiz AE, Nergiz ME, Pedersen T, Clifton C. Practical and secure integer comparison and interval check Proceedings - Socialcom 2010: 2nd Ieee International Conference On Social Computing, Passat 2010: 2nd Ieee International Conference On Privacy, Security, Risk and Trust. 791-799. DOI: 10.1109/SocialCom.2010.121  0.57
2009 Nergiz ME, Clifton C, Nergiz AE. Multirelational k-anonymity Ieee Transactions On Knowledge and Data Engineering. 21: 1104-1117. DOI: 10.1109/Tkde.2008.210  0.462
2007 Nergiz ME, Clifton C. Thoughts on k-anonymization Data and Knowledge Engineering. 63: 622-645. DOI: 10.1016/j.datak.2007.03.009  0.45
Show low-probability matches.