Showing results 1 to 20 of 34
next >
Issue Date | Title | Author(s) |
2020-03-01 | Correlated Differential Privacy: Feature Selection in Machine Learning | Zhang, T; Zhu, T; Xiong, P; Huo, H; Tari, Z; Zhou, W |
2019-12 | Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions | Liu, B; Zhu, T; Zhou, W; Wang, K; Zhou, H; Ding, M |
2019-10-15 | Optimizing rewards allocation for privacy-preserving spatial crowdsourcing | Xiong, P; Zhu, D; Zhang, L; Ren, W; Zhu, T |
2019-10-10 | Adversaries or allies? Privacy and deep learning in big data era | Liu, B; Ding, M; Zhu, T; Xiang, Y; Zhou, W |
2019-10-10 | A differentially private method for crowdsourcing data submission | Zhang, L; Xiong, P; Ren, W; Zhu, T |
2019-08-01 | Effects of microstructure and growth conditions on quantum emitters in gallium nitride | Nguyen, M; Zhu, T; Kianinia, M; Massabuau, F; Aharonovich, I; Toth, M; Oliver, R; Bradac, C |
2019-07-01 | Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks | Fu, C; Liu, XY; Yang, J; Yang, LT; Yu, S; Zhu, T |
2019-06-01 | SaaS: A situational awareness and analysis system for massive android malware detection | Zhang, Y; Ren, W; Zhu, T; Ren, Y |
2019-05-01 | A blockchain-based location privacy-preserving crowdsensing system | Yang, M; Zhu, T; Liang, K; Zhou, W; Deng, RH |
2019-01-01 | CaACBIM: A context-aware access control model for BIM | Zheng, R; Jiang, J; Hao, X; Ren, W; Xiong, F; Zhu, T |
2019-01-01 | PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management | Yao, S; Chen, J; He, K; Du, R; Zhu, T; Chen, X |
2019-01-01 | MoSa: A modeling and sentiment analysis system for mobile application big data | Zhang, Y; Ren, W; Zhu, T; Faith, E |
2018-10-01 | Answering differentially private queries for continual datasets release | Zhu, T; Li, G; Xiong, P; Zhou, W |
2018-09-14 | Lico: A Lightweight Access Control Model for Inter-Networking Linkages | Li, S; Ren, W; Zhu, T; Choo, KKR |
2018-08-20 | Resonant excitation of quantum emitters in gallium nitride | Kianinia, M; Bradac, C; Minh, N; Zhu, T; Toth, M; Oliver, R; Aharonovich, I |
2018-07-29 | A watermark-based in-situ access control model for image big data | Guo, J; Ren, W; Ren, Y; Zhu, T |
2018-07-05 | Performance and Security Evaluations of Identity-and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt | Zhong, S; Ren, W; Zhu, T; Ren, Y; Choo, KKR |
2018-05-27 | Differential Private POI Queries via Johnson-Lindenstrauss Transform | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |
2018-03-31 | Location Privacy and Its Applications: A Systematic Study | Liu, B; Zhou, W; Zhu, T; Gao, L; Xiang, Y |
2018-03-19 | Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture | Yang, M; Zhu, T; Liu, B; Xiang, Y; Zhou, W |