2017 article
Exact Detection of Information Leakage: Decidability and Complexity
TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1β23.
2015 conference paper
Detecting opinion spammer groups through community discovery and sentiment analysis
Data and applications security and privacy xxix, 9149, 170β187.
2015 conference paper
Interactive preference-aware query optimization
2015 ieee 31st international conference on data engineering (icde), 1512β1515.
2014 conference paper
Integrity assurance for outsourced databases without DBMS modification
Data and applications security and privacy xxviii, 8566, 1β16.
2014 conference paper
PAQO: Preference-aware query optimization for decentralized database systems
2014 ieee 30th international conference on data engineering (icde), 424β435.
2014 journal article
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730β739.
2013 journal article
Protecting Sensitive Labels in Social Network Data Anonymization
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633β647.
2010 article
Anonymizing bipartite graph data using safe groupings
Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115β139.
2009 journal article
Coupling winds to ocean surface currents over the global ocean
OCEAN MODELLING, 29(4), 261β268.
2009 article
Denial of service attacks and defenses in decentralized trust management
Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89β101.
2009 journal article
On the Modeling of Honest Players in Reputation Systems
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808β819.
2009 article
SecureMR: A Service Integrity Assurance Framework for Map Reduce
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73β82.
2008 article
A framework for identifying compromised nodes in wireless sensor networks
Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.
2007 journal article
A roadmap for COMPREHENSIVE online privacy policy management
COMMUNICATIONS OF THE ACM, 50(7), 109β116.
2007 book
Secure data management in decentralized systems
2006 journal article
A semantics based approach to privacy languages
Computer Systems Science and Engineering, 21(5), 339β352.
2006 journal article
Integrating XML data sources using approximate joins
ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161β207.
2004 journal article
A compressed accessibility map for XML
ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363β402.