Anne V. D. M. Kayem
Orcid: 0000-0002-6587-5313Affiliations:
- Hasso-Plattner-Institute, Potsdam, Germany
- Queen's University, Canada (former)
- University of Cape Town, South Africa (former)
According to our database1,
Anne V. D. M. Kayem
authored at least 58 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2006
2008
2010
2012
2014
2016
2018
2020
2022
2024
0
5
10
4
1
1
1
1
1
2
1
2
4
4
4
3
12
7
2
1
1
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on mykayem.org
On csauthors.net:
Bibliography
2024
Identifying Personal Identifiable Information (PII) in Unstructured Text: A Comparative Study on Transformers.
Proceedings of the Database and Expert Systems Applications, 2024
Discovering Personally Identifiable Information in Textual Data - A Case Study with Automated Concatenation of Embeddings.
Proceedings of the Advanced Information Networking and Applications, 2024
2023
Proceedings of the Database and Expert Systems Applications, 2023
2022
Proceedings of the Database and Expert Systems Applications, 2022
A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media.
Proceedings of the Advanced Information Networking and Applications, 2022
2021
Trans. Large Scale Data Knowl. Centered Syst., 2021
Proceedings of the 18th International Conference on Security and Cryptography, 2021
Proceedings of the iiWAS2021: The 23rd International Conference on Information Integration and Web Intelligence, Linz, Austria, 29 November 2021, 2021
GPU Accelerated Bayesian Inference for Quasi-Identifier Discovery in High-Dimensional Data.
Proceedings of the Advanced Information Networking and Applications, 2021
Proceedings of the Advanced Information Networking and Applications, 2021
2019
How Data Anonymisation Techniques influence Disease Triage in Digital Health: A Study on Base Rate Neglect.
Proceedings of the 9th International Conference on Digital Public Health, 2019
Proceedings of the Database and Expert Systems Applications, 2019
Identifying Data Exposure Across Distributed High-Dimensional Health Data Silos through Bayesian Networks Optimised by Multigrid and Manifold.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019
Attribute Compartmentation and Greedy UCC Discovery for High-Dimensional Data Anonymization.
Proceedings of the Ninth ACM Conference on Data and Application Security and Privacy, 2019
2018
The Design and Classification of Cheating Attacks on Power Marketing Schemes in Resource Constrained Smart Micro-Grids.
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Proceedings of the Smart Micro-Grid Systems Security and Privacy, 2018
Trans. Large Scale Data Knowl. Centered Syst., 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Minimising Information Loss on Anonymised High Dimensional Data with Greedy In-Memory Processing.
Proceedings of the Database and Expert Systems Applications, 2018
Proceedings of the 32nd IEEE International Conference on Advanced Information Networking and Applications, 2018
Proceedings of the 32nd International Conference on Advanced Information Networking and Applications Workshops, 2018
2017
On Anonymizing Streaming Crime Data: A Solution Approach for Resource Constrained Environments.
Proceedings of the Privacy and Identity Management. The Smart Revolution, 2017
Proceedings of the Database and Expert Systems Applications, 2017
Proceedings of the 31st IEEE International Conference on Advanced Information Networking and Applications, 2017
2016
Fault-tolerant Distributed Continuous Double Auctioning on Computationally Constrained Microgrids.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the Information Systems Security and Privacy, 2016
An Approach to Personalized Privacy Policy Recommendations on Online Social Networks.
Proceedings of the 2nd International Conference on Information Systems Security and Privacy, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Decentralised Scheduling of Power Consumption in Micro-grids: Optimisation and Security.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Physical Attestation and Authentication to Detect Cheating in Resource Constrained Smart Micro-grids.
Proceedings of the Security of Industrial Control Systems and Cyber-Physical Systems, 2016
Proceedings of the Database and Expert Systems Applications, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the Critical Information Infrastructures Security, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
Proceedings of the 30th International Conference on Advanced Information Networking and Applications Workshops, 2016
2015
Robust snapshot algorithm for power consumption monitoring in computationally constrained micro-grids.
Proceedings of the 2015 IEEE Innovative Smart Grid Technologies, 2015
Supporting Streaming Data Anonymization with Expressions of User Privacy Preferences.
Proceedings of the Information Systems Security and Privacy, 2015
Adaptive Buffer Resizing for Efficient Anonymization of Streaming Data with Minimal Information Loss.
Proceedings of the ICISSP 2015, 2015
Proceedings of the Future Network Systems and Security - First International Conference, 2015
A Distributed Continuous Double Auction Framework for Resource Constrained Microgrids.
Proceedings of the Critical Information Infrastructures Security, 2015
Secure and Efficient Mobile Personal Health Data Sharing in Resource Constrained Environments.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
A Usable and Secure Crime Reporting System for Technology Resource Constrained Context.
Proceedings of the 29th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2015
2014
Proceedings of the Database and Expert Systems Applications, 2014
K-Anonymity for Privacy Preserving Crime Data Publishing in Resource Constrained Environments.
Proceedings of the 28th International Conference on Advanced Information Networking and Applications Workshops, 2014
2013
Int. J. Parallel Emergent Distributed Syst., 2013
Proceedings of the Annual Symposium on Computing for Development, 2013
2012
Proceedings of the 2012 Information Security for South Africa, 2012
2011
Enhancing identity trust in cryptographic key management systems for dynamic environments.
Secur. Commun. Networks, 2011
Proceedings of the Information Security South Africa Conference 2011, 2011
2010
Advances in Information Security 48, Springer, ISBN: 978-0-387-77265-3, 2010
Proceedings of the Information Security South Africa Conference 2010, 2010
2008
J. Comput. Secur., 2008
Proceedings of the Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems, 2008
2007
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007
2005
An Independent Set Approach to Solving the Collaborative Attack Problem.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005