Works (2)
2009 article
Anonymizing bipartite graph data using safe groupings
Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.
2008 article
A framework for identifying compromised nodes in wireless sensor networks
Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.