Publications

2023

  1. Privacy-preserving Decentralized Learning of Knowledge Graph Embeddings
    Hoang, Anh-Tu, Lekssays, Ahmed, Carminati, Barbara, and Ferrari, Elena
    In Proceedings of the Workshops of the EDBT/ICDT 2023 Joint Conference, Ioannina, Greece, March, 28, 2023, vol. 3379, 2023

2022

  1. Time-Aware Anonymization of Knowledge Graphs (Accepted)
    Hoang, Anh-Tu, Carminati, Barbara, and Ferrari, Elena
    In the ACM Transactions on Privacy and Security (TOPS), vol. , pp. , 2022

2021

  1. Privacy-Preserving Sequential Publishing of Knowledge Graphs
    Hoang, Anh-Tu, Carminati, Barbara, and Ferrari, Elena
    In 2021 IEEE 37th International Conference on Data Engineering (ICDE), vol. , pp. 2021-2026, 2021

2020

  1. Cluster-Based Anonymization of Knowledge Graphs
    Hoang, Anh-Tu, Carminati, Barbara, and Ferrari, Elena
    In Applied Cryptography and Network Security, pp. 104–123, 2020
  2. BeadNet: a network for automated spherical marker detection in radiographs for geometry calibration
    Nguyen, Van, De Beenhouwer, Jan, Bazrafkan, Shabab,  Hoang, Anh-Tu, Wassenbergh, S, and Sijbers, Jan
    In CTMeeting-2020, pp. , , 2020

2019

  1. Cluster-Based Anonymization of Directed Graphs
    Hoang, Anh-Tu, Carminati, Barbara, and Ferrari, Elena
    In 2019 IEEE 5th International Conference on Collaboration and Internet Computing (CIC), vol. , pp. 91-100, 2019

2014

  1. Detecting Traitors in Re-publishing Updated Datasets
    Hoang, Anh-Tu, Nguyen-Son, Hoang-Quoc, Tran, Minh-Triet, and Echizen, Isao
    In Digital-Forensics and Watermarking, pp. 205–220, 2014
  2. Anonymizing Temporal Phrases in Natural Language Text to be Posted on Social Networking Services
    Nguyen-Son, Hoang-Quoc,  Hoang, Anh-Tu, Tran, Minh-Triet, Yoshiura, Hiroshi, Sonehara, Noboru, and Echizen, Isao
    In Digital-Forensics and Watermarking, pp. 437–451, 2014

2012

  1. An Indexed Bottom-up Approach for Publishing Anonymized Data
    Hoang, Anh-Tu, Tran, Minh-Triet, Duong, Anh-Duc, and Echizen, Isao
    In 2012 Eighth International Conference on Computational Intelligence and Security, vol. , pp. 641-645, 2012