Works (2)

Updated: July 5th, 2023 15:53

2010 article

Anonymizing bipartite graph data using safe groupings

Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.

By: G. Cormode*, D. Srivastava*, T. Yu n & Q. Zhang n

author keywords: Privacy; Microdata; Graph; Query answering
TL;DR: This work introduces a new family of anonymizations for bipartite graph data, called (k, ℓ)-groupings, which preserve the underlying graph structure perfectly, and instead anonymize the mapping from entities to nodes of the graph. (via Semantic Scholar)
Source: Web Of Science
Added: August 6, 2018

2008 article

A framework for identifying compromised nodes in wireless sensor networks

Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.

By: Q. Zhang n, T. Yu n & P. Ning n

author keywords: algorithms; security; sensor networks; intrusion detection
TL;DR: An application-independent framework for accurately identifying compromised sensor nodes is proposed and an alert reasoning algorithms to identify compromised nodes are developed that are optimal in the sense that it identifies the largest number of compromised nodes without introducing false positives. (via Semantic Scholar)
UN Sustainable Development Goal Categories
16. Peace, Justice and Strong Institutions (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.