2017 article
Exact Detection of Information Leakage: Decidability and Complexity
TRANSACTIONS ON LARGE-SCALE DATA- AND KNOWLEDGE-CENTERED SYSTEMS XXXII, Vol. 10420, pp. 1–23.
2015 conference paper
Detecting opinion spammer groups through community discovery and sentiment analysis
Data and applications security and privacy xxix, 9149, 170–187.
2015 conference paper
Interactive preference-aware query optimization
2015 ieee 31st international conference on data engineering (icde), 1512–1515.
2014 conference paper
Integrity assurance for outsourced databases without DBMS modification
Data and applications security and privacy xxviii, 8566, 1–16.
2014 conference paper
PAQO: Preference-aware query optimization for decentralized database systems
2014 ieee 30th international conference on data engineering (icde), 424–435.
2013 journal article
Scalable Distributed Service Integrity Attestation for Software-as-a-Service Clouds
IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 25(3), 730–739.
2011 journal article
Protecting Sensitive Labels in Social Network Data Anonymization
IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 25(3), 633–647.
2009 article
Anonymizing bipartite graph data using safe groupings
Cormode, G., Srivastava, D., Yu, T., & Zhang, Q. (2010, February). VLDB JOURNAL, Vol. 19, pp. 115–139.
2009 journal article
Coupling winds to ocean surface currents over the global ocean
OCEAN MODELLING, 29(4), 261–268.
2009 journal article
On the Modeling of Honest Players in Reputation Systems
JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 24(5), 808–819.
2009 article
SecureMR: A Service Integrity Assurance Framework for Map Reduce
25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, pp. 73–82.
2008 article
A framework for identifying compromised nodes in wireless sensor networks
Zhang, Q., Yu, T., & Ning, P. (2008, March). ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY, Vol. 11.
2008 article
Denial of service attacks and defenses in decentralized trust management
Li, J., Li, N., Wang, X. F., & Yu, T. (2009, April). INTERNATIONAL JOURNAL OF INFORMATION SECURITY, Vol. 8, pp. 89–101.
2007 journal article
A roadmap for COMPREHENSIVE online privacy policy management
COMMUNICATIONS OF THE ACM, 50(7), 109–116.
2007 book
Secure data management in decentralized systems
2006 journal article
A semantics based approach to privacy languages
Computer Systems Science and Engineering, 21(5), 339–352.
2006 journal article
Integrating XML data sources using approximate joins
ACM TRANSACTIONS ON DATABASE SYSTEMS, 31(1), 161–207.
2004 journal article
A compressed accessibility map for XML
ACM TRANSACTIONS ON DATABASE SYSTEMS, 29(2), 363–402.
Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.
Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.