2009 article
Anonymizing bipartite graph data using safe groupings
Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.
2008 article
A framework for identifying compromised nodes in wireless sensor networks
Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.