Browsing byAuthorZhu, T

Jump to a point in the index:
Showing results 1 to 20 of 34  next >
Issue DateTitleAuthor(s)
2020-03-01Correlated Differential Privacy: Feature Selection in Machine LearningZhang, T; Zhu, T; Xiong, P; Huo, H; Tari, Z; Zhou, W
2019-12Protecting Privacy-Sensitive Locations in Trajectories with Correlated PositionsLiu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M
2019-10-15Optimizing rewards allocation for privacy-preserving spatial crowdsourcingXiong, P; Zhu, D; Zhang, L; Ren, W; Zhu, T
2019-10-10Adversaries or allies? Privacy and deep learning in big data eraLiu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W
2019-10-10A differentially private method for crowdsourcing data submissionZhang, L; Xiong, P; Ren, W; Zhu, T
2019-08-01Effects of microstructure and growth conditions on quantum emitters in gallium nitrideNguyen, M; Zhu, T; Kianinia, M; Massabuau, F; Aharonovich, I; Toth, M; Oliver, R; Bradac, C
2019-07-01Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social NetworksFu, C; Liu, XY; Yang, J; Yang, LT; Yu, S; Zhu, T
2019-06-01SaaS: A situational awareness and analysis system for massive android malware detectionZhang, Y; Ren, W; Zhu, T; Ren, Y
2019-05-01A blockchain-based location privacy-preserving crowdsensing systemYang, M; Zhu, T; Liang, K; Zhou, W; Deng, RH
2019-01-01CaACBIM: A context-aware access control model for BIMZheng, R; Jiang, J; Hao, X; Ren, W; Xiong, F; Zhu, T
2019-01-01PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage ManagementYao, S; Chen, J; He, K; Du, R; Zhu, T; Chen, X
2019-01-01MoSa: A modeling and sentiment analysis system for mobile application big dataZhang, Y; Ren, W; Zhu, T; Faith, E
2018-10-01Answering differentially private queries for continual datasets releaseZhu, T; Li, G; Xiong, P; Zhou, W
2018-09-14Lico: A Lightweight Access Control Model for Inter-Networking LinkagesLi, S; Ren, W; Zhu, T; Choo, KKR
2018-08-20Resonant excitation of quantum emitters in gallium nitrideKianinia, M; Bradac, C; Minh, N; Zhu, T; Toth, M; Oliver, R; Aharonovich, I
2018-07-29A watermark-based in-situ access control model for image big dataGuo, J; Ren, W; Ren, Y; Zhu, T
2018-07-05Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and SchuldtZhong, S; Ren, W; Zhu, T; Ren, Y; Choo, KKR
2018-05-27Differential Private POI Queries via Johnson-Lindenstrauss TransformYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W
2018-03-31Location Privacy and Its Applications: A Systematic StudyLiu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y
2018-03-19Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing ArchitectureYang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W