Lei Zhang

Affiliations:
  • George Mason University, Fairfax, VA, USA (PhD 2010)


According to our database1, Lei Zhang authored at least 17 papers between 2005 and 2015.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
<i>k</i>-jump: A strategy to design publicly-known algorithms for privacy preserving micro-data disclosure.
J. Comput. Secur., 2015

2013
Preserving privacy against external and internal threats in WSN data aggregation.
Telecommun. Syst., 2013

2010
Securing the Information Disclosure Process.
PhD thesis, 2010

k-jump strategy for preserving privacy in micro-data disclosure.
Proceedings of the Database Theory, 2010

Restoring compromised privacy in micro-data disclosure.
Proceedings of the 5th ACM Symposium on Information, 2010

Reverse Tree-based Key Routing: Robust Data Aggregation in Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Privacy-preserving robust data aggregation in wireless sensor networks.
Secur. Commun. Networks, 2009

L-Cover: Preserving Diversity by Anonymity.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

2008
An Integrity Lock Architecture for Supporting Distributed Authorizations in Database Federations.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Simulatable Binding: Beyond Simulatable Auditing.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

A Framework for Maximizing Utility of Sanitized Documents Based on Meta-labeling.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Exclusive Strategy for Generalization Algorithms in Micro-data Disclosure.
Proceedings of the Data and Applications Security XXII, 2008

2007
Two secret sharing schemes based on Boolean operations.
Pattern Recognit., 2007

Answering Queries Based on Imprecision and Uncertainty Trade-Offs in Numeric Databases.
Proceedings of the Secure Data Management, 4th VLDB Workshop, SDM 2007, Vienna, Austria, 2007

Information disclosure under realistic assumptions: privacy versus optimality.
Proceedings of the 2007 ACM Conference on Computer and Communications Security, 2007

2006
Toward Information Sharing: Benefit And Risk Access Control (BARAC).
Proceedings of the 7th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2006), 2006

2005
Secret color images sharing schemes based on XOR operation.
IACR Cryptol. ePrint Arch., 2005


  Loading...