• Tenzer M, Rasheed Z and Shafique K. Learning citywide patterns of life from trajectory monitoring. Proceedings of the 30th International Conference on Advances in Geographic Information Systems. (1-12).

    https://doi.org/10.1145/3557915.3560978

  • Liang Y, Ouyang K, Wang Y, Liu X, Chen H, Zhang J, Zheng Y and Zimmermann R. TrajFormer: Efficient Trajectory Classification with Transformers. Proceedings of the 31st ACM International Conference on Information & Knowledge Management. (1229-1237).

    https://doi.org/10.1145/3511808.3557481

  • Chen Y, Feng K, Cong G and Kiah H. (2022). Example-based spatial pattern matching. Proceedings of the VLDB Endowment. 15:11. (2572-2584). Online publication date: 1-Jul-2022.

    https://doi.org/10.14778/3551793.3551815

  • Wang T, Wang C, Tian H, Liew A and Zhao Y. Clustering-based Location Authority Deep Model in the Next Point-of-Interest Recommendation. IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology. (335-342).

    https://doi.org/10.1145/3486622.3493943

  • Naghizade E, Kulik L, Tanin E and Bailey J. (2020). Privacy- and Context-aware Release of Trajectory Data. ACM Transactions on Spatial Algorithms and Systems. 6:1. (1-25). Online publication date: 31-Mar-2020.

    https://doi.org/10.1145/3363449

  • Wang J, Du K, Luo X and Li X. (2019). Two privacy-preserving approaches for data publishing with identity reservation. Knowledge and Information Systems. 60:2. (1039-1080). Online publication date: 1-Aug-2019.

    https://doi.org/10.1007/s10115-018-1237-3

  • Gunawan D and Mambo M. Hiding Personal Tendency in Set-valued Database Publication. Proceedings of the 2nd International Conference on Information Science and Systems. (284-289).

    https://doi.org/10.1145/3322645.3322673

  • Li X, Sui P, Bai Y and Wang L. (2018). M-generalization for multipurpose transactional data publication. Frontiers of Computer Science: Selected Publications from Chinese Universities. 12:6. (1241-1254). Online publication date: 1-Dec-2018.

    https://doi.org/10.1007/s11704-016-6061-x

  • Wang M, Jiang Z, Zhang Y and Yang H. (2018). T-Closeness Slicing. INFORMS Journal on Computing. 30:3. (438-453). Online publication date: 1-Aug-2018.

    https://doi.org/10.1287/ijoc.2017.0791

  • Telikani A and Shahbahrami A. (2018). Data sanitization in association rule mining. Expert Systems with Applications: An International Journal. 96:C. (406-426). Online publication date: 15-Apr-2018.

    https://doi.org/10.1016/j.eswa.2017.10.048

  • Wang L and Li X. (2018). A graph-based multifold model for anonymizing data with attributes of multiple types. Computers and Security. 72:C. (122-135). Online publication date: 1-Jan-2018.

    https://doi.org/10.1016/j.cose.2017.09.003

  • Khezerlou A, Zhou X, Li L, Shafiq Z, Liu A and Zhang F. (2017). A Traffic Flow Approach to Early Detection of Gathering Events. ACM Transactions on Intelligent Systems and Technology. 8:6. (1-24). Online publication date: 30-Nov-2017.

    https://doi.org/10.1145/3078850

  • Sui P and Li X. (2017). A privacy-preserving approach for multimodal transaction data integrated analysis. Neurocomputing. 253:C. (56-64). Online publication date: 30-Aug-2017.

    https://doi.org/10.1016/j.neucom.2016.09.130

  • Li H and Gou Y. Mining Mobile Sensor Data for Social Behaviors. Proceedings of the 2nd International Workshop on Social Sensing. (101-101).

    https://doi.org/10.1145/3055601.3055620

  • Poulis G, Loukides G, Skiadopoulos S and Gkoulalas-Divanis A. (2017). Anonymizing datasets with demographics and diagnosis codes in the presence of utility constraints. Journal of Biomedical Informatics. 65:C. (76-96). Online publication date: 1-Jan-2017.

    https://doi.org/10.1016/j.jbi.2016.11.001

  • Pham H, Shahabi C and Liu Y. (2016). Inferring Social Strength from Spatiotemporal Data. ACM Transactions on Database Systems. 41:1. (1-47). Online publication date: 7-Apr-2016.

    https://doi.org/10.1145/2877200

  • Bonomi L, Fan L and Jin H. An Information-Theoretic Approach to Individual Sequential Data Sanitization. Proceedings of the Ninth ACM International Conference on Web Search and Data Mining. (337-346).

    https://doi.org/10.1145/2835776.2835828

  • Gkoulalas-Divanis A, Loukides G and Sun J. (2014). Toward smarter healthcare. IBM Journal of Research and Development. 58:1. (9-9). Online publication date: 1-Jan-2014.

    https://doi.org/10.1147/JRD.2013.2288173

  • Gkoulalas-Divanis A and Aonghusa P. (2014). Privacy protection in open information management platforms. IBM Journal of Research and Development. 58:1. (2-2). Online publication date: 1-Jan-2014.

    https://doi.org/10.1147/JRD.2013.2285853

  • Slavov V, Rao P, Paturi S, Swami T, Barnes M, Rao D and Palvai R. (2013). A new tool for sharing and querying of clinical documents modeled using HL7 Version 3 standard. Computer Methods and Programs in Biomedicine. 112:3. (529-552). Online publication date: 1-Dec-2013.

    https://doi.org/10.1016/j.cmpb.2013.07.002

  • Jensen C. Spatial keyword querying of geo-tagged web content. Proceedings of the 7th International Workshop on Ranking in Databases. (1-4).

    https://doi.org/10.1145/2524828.2524829

  • Loukides G, Gkoulalas-Divanis A and Shao J. (2013). Efficient and flexible anonymization of transaction data. Knowledge and Information Systems. 36:1. (153-210). Online publication date: 1-Jul-2013.

    https://doi.org/10.1007/s10115-012-0544-3

  • Zeng C, Naughton J and Cai J. (2012). On differentially private frequent itemset mining. Proceedings of the VLDB Endowment. 6:1. (25-36). Online publication date: 1-Nov-2012.

    https://doi.org/10.14778/2428536.2428539

  • Xue M, Karras P, Raïssi C, Vaidya J and Tan K. Anonymizing set-valued data by nonreciprocal recoding. Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining. (1050-1058).

    https://doi.org/10.1145/2339530.2339696

  • Loukides G and Gkoulalas-Divanis A. (2012). Utility-preserving transaction data anonymization with low information loss. Expert Systems with Applications: An International Journal. 39:10. (9764-9777). Online publication date: 1-Aug-2012.

    https://doi.org/10.1016/j.eswa.2012.02.179

  • Li N, Qardaji W, Su D and Cao J. (2012). PrivBasis. Proceedings of the VLDB Endowment. 5:11. (1340-1351). Online publication date: 1-Jul-2012.

    https://doi.org/10.14778/2350229.2350251

  • Terrovitis M, Mamoulis N, Liagouris J and Skiadopoulos S. (2012). Privacy preservation by disassociation. Proceedings of the VLDB Endowment. 5:10. (944-955). Online publication date: 1-Jun-2012.

    https://doi.org/10.14778/2336664.2336668

  • Gkoulalas-Divanis A and Loukides G. (2012). Utility-guided Clustering-based Transaction Data Anonymization. Transactions on Data Privacy. 5:1. (223-251). Online publication date: 1-Apr-2012.

    /doi/10.5555/2207141.2207143

  • Gkoulalas-Divanis A and Loukides G. Revisiting sequential pattern hiding to enhance utility. Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining. (1316-1324).

    https://doi.org/10.1145/2020408.2020605

  • Gkoulalas-Divanis A and Loukides G. PCTA. Proceedings of the 4th International Workshop on Privacy and Anonymity in the Information Society. (1-10).

    https://doi.org/10.1145/1971690.1971695