Towards trajectory anonymization: a generalization-based approach ME Nergiz, M Atzori, Y Saygin Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on …, 2008 | 476 | 2008 |
Hiding the presence of individuals from shared databases ME Nergiz, M Atzori, C Clifton Proceedings of the 2007 ACM SIGMOD international conference on Management of …, 2007 | 464 | 2007 |
Systematic exploration of synergistic drug pairs M Cokol, HN Chua, M Tasan, B Mutlu, ZB Weinstein, Y Suzuki, ME Nergiz, ... Molecular systems biology 7 (1), 544, 2011 | 357 | 2011 |
Multirelational k-anonymity ME Nergiz, C Clifton, AE Nergiz IEEE Transactions on Knowledge and Data Engineering 21 (8), 1104-1117, 2008 | 256 | 2008 |
Thoughts on k-anonymization ME Nergiz, C Clifton Data & Knowledge Engineering 63 (3), 622-645, 2007 | 244 | 2007 |
Privacy-preserving learning analytics: challenges and techniques ME Gursoy, A Inan, ME Nergiz, Y Saygin IEEE Transactions on Learning technologies 10 (1), 68-81, 2016 | 119 | 2016 |
Anonymization of longitudinal electronic medical records A Tamersoy, G Loukides, ME Nergiz, Y Saygin, B Malin IEEE Transactions on Information Technology in Biomedicine 16 (3), 413-423, 2012 | 80 | 2012 |
Ensuring location diversity in privacy-preserving spatio-temporal data publishing AE Cicek, ME Nergiz, Y Saygin The VLDB Journal 23 (4), 609-625, 2014 | 79 | 2014 |
δ-presence without complete world knowledge ME Nergiz, C Clifton IEEE Transactions on Knowledge and Data Engineering 22 (6), 868-883, 2009 | 62 | 2009 |
Differentially private nearest neighbor classification ME Gursoy, A Inan, ME Nergiz, Y Saygin Data Mining and Knowledge Discovery 31, 1544-1575, 2017 | 36 | 2017 |
Hybrid k-anonymity ME Nergiz, MZ Gök Computers & security 44, 51-63, 2014 | 33 | 2014 |
Privacy-preserving publishing of opinion polls A Abdalaal, ME Nergiz, Y Saygin Computers & security 37, 143-154, 2013 | 30 | 2013 |
Perturbation-driven anonymization of trajectories ME Nergiz, M Atzori, Y Saygin, CS Prog Tech. report, Technical Report 2007-TR-017, ISTICNR, Pisa, 2007 | 26 | 2007 |
A look-ahead approach to secure multiparty protocols ME Nergiz, E Cicek, T Pedersen, Y Saygin IEEE Transactions on Knowledge and Data Engineering 24 (7), 1170-1185, 2011 | 24 | 2011 |
Practical and secure integer comparison and interval check AE Nergiz, ME Nergiz, T Pedersen, C Clifton 2010 IEEE Second International Conference on Social Computing, 791-799, 2010 | 22 | 2010 |
Known sample attacks on relation preserving data transformations E Kaplan, ME Gursoy, ME Nergiz, Y Saygin IEEE Transactions on Dependable and Secure Computing 17 (2), 443-450, 2017 | 17 | 2017 |
Privacy-preserving publishing of hierarchical data I Ozalp, ME Gursoy, ME Nergiz, Y Saygin ACM Transactions on Privacy and Security (TOPS) 19 (3), 1-29, 2016 | 17 | 2016 |
Instant anonymization ME Nergiz, A Tamersoy, Y Saygin ACM Transactions on Database Systems (TODS) 36 (1), 1-33, 2011 | 15 | 2011 |
Preservation of Utility through Hybrid k-Anonymization ME Nergiz, MZ Gök, U Özkanlı International Conference on Trust, Privacy and Security in Digital Business …, 2013 | 14 | 2013 |
Is privacy still an issue for data mining? C Clifton, W Jiang, M Murugesan, ME Nergiz Next Generation of Data Mining, 383-400, 2008 | 13 | 2008 |