Generating summaries and visualization for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 8th ACM international workshop on Multimedia information …, 2006 | 352 | 2006 |
Hierarchical threshold secret sharing T Tassa Journal of cryptology 20, 237-264, 2007 | 305 | 2007 |
Improved bounds on Bell numbers and on moments of sums of random variables D Berend, T Tassa Probability and Mathematical Statistics 30 (2), 185-205, 2010 | 281 | 2010 |
On syntactic anonymity and differential privacy C Clifton, T Tassa 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW …, 2013 | 275 | 2013 |
Dynamic traitor tracing A Fiat, T Tassa Annual International Cryptology Conference, 354-371, 1999 | 172 | 1999 |
Anonymization of centralized and distributed social networks by sequential clustering T Tassa, DJ Cohen IEEE Transactions on Knowledge and data Engineering 25 (2), 311-324, 2011 | 166 | 2011 |
Secure mining of association rules in horizontally distributed databases T Tassa IEEE Transactions on Knowledge and Data Engineering 26 (4), 970-983, 2013 | 154 | 2013 |
Injecting uncertainty in graphs for identity obfuscation P Boldi, F Bonchi, A Gionis, T Tassa arXiv preprint arXiv:1208.4145, 2012 | 152 | 2012 |
Dynamic traitor tracing A Fiat, T Tassa Journal of CRYPTOLOGY 14, 211-223, 2001 | 125 | 2001 |
Identity obfuscation in graphs through the information theoretic lens F Bonchi, A Gionis, T Tassa Information Sciences 275, 232-256, 2014 | 124 | 2014 |
k-Anonymization with minimal loss of information A Gionis, T Tassa IEEE Transactions on Knowledge and Data Engineering 21 (2), 206-219, 2008 | 122 | 2008 |
Multipartite secret sharing by bivariate interpolation T Tassa, N Dyn Journal of Cryptology 22, 227-258, 2009 | 117 | 2009 |
Characterizing ideal weighted threshold secret sharing A Beimel, T Tassa, E Weinreb Theory of Cryptography: Second Theory of Cryptography Conference, TCC 2005 …, 2005 | 108 | 2005 |
Hierarchical threshold secret sharing T Tassa Theory of Cryptography Conference, 473-490, 2004 | 106 | 2004 |
Generalized oblivious transfer by secret sharing T Tassa Designs, Codes and Cryptography 58, 11-21, 2011 | 102 | 2011 |
Generating summaries for large collections of geo-referenced photographs A Jaffe, M Naaman, T Tassa, M Davis Proceedings of the 15th international conference on World Wide Web, 853-854, 2006 | 95 | 2006 |
Efficient anonymizations with enhanced utility J Goldberger, T Tassa 2009 IEEE International Conference on Data Mining Workshops, 106-113, 2009 | 84 | 2009 |
FaiRecSys: mitigating algorithmic bias in recommender systems B Edizel, F Bonchi, S Hajian, A Panisson, T Tassa International Journal of Data Science and Analytics 9, 197-213, 2020 | 83 | 2020 |
A hierarchical clustering algorithm based on the Hungarian method J Goldberger, T Tassa Pattern Recognition Letters 29 (11), 1632-1638, 2008 | 79 | 2008 |
Improved versions of Tardos’ fingerprinting scheme O Blayer, T Tassa Designs, Codes and Cryptography 48, 79-103, 2008 | 78 | 2008 |