Nan Zhang

Orcid: 0000-0002-0454-7885

Affiliations:
  • The Pennsylvania State University, University Park, PA, USA
  • The George Washington University, Washington, DC (former)


According to our database1, Nan Zhang authored at least 126 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Fairness of Ratemaking for Catastrophe Insurance: Lessons from Machine Learning.
Inf. Syst. Res., 2024

Dynamic Subgraph Matching via Cost-Model-based Vertex Dominance Embeddings (Technical Report).
CoRR, 2024

Reverse Influential Community Search Over Social Networks (Technical Report).
CoRR, 2024

Top-<i>L</i> Most Influential Community Detection Over Social Networks.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

2023
Top-L Most Influential Community Detection Over Social Networks (Technical Report).
CoRR, 2023

Brief Industry Paper: Towards Efficient Task Scheduling for AUTOSAR using Parallel Pruning.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

2022
On Finding Rank Regret Representatives.
ACM Trans. Database Syst., 2022

From Contextualizing to Context Theorizing: Assessing Context Effects in Privacy Research.
Manag. Sci., 2022

Implications of Data Anonymization on the Statistical Evidence of Disparity.
Manag. Sci., 2022

2021
Reconciling the Paradoxical Findings of Choice Overload Through an Analytical Lens.
MIS Q., December, 2021

Scalable signal reconstruction for a broad range of applications.
Commun. ACM, 2021

2020
Scalable algorithms for signal reconstruction by leveraging similarity joins.
VLDB J., 2020

Orca-SR: A Real-Time Traffic Engineering Framework leveraging Similarity Joins.
Proc. VLDB Endow., 2020

Speed up random walk by leveraging community affiliation information.
CCF Trans. Pervasive Comput. Interact., 2020

2019
Efficient Signal Reconstruction for a Broad Range of Applications.
SIGMOD Rec., 2019

RRR: Rank-Regret Representative.
Proceedings of the 2019 International Conference on Management of Data, 2019

Protecting Privacy on Social Media: Is Consumer Privacy Self-Management Sufficient?
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019

2018
Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense.
IEEE Trans. Veh. Technol., 2018

Leveraging Similarity Joins for Signal Reconstruction.
Proc. VLDB Endow., 2018

An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018

DBLOC: Density Based Clustering over LOCation Based Services.
Proceedings of the 2018 International Conference on Management of Data, 2018

QR2: A Third-Party Query Reranking Service over Web Databases.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018

Confidence Levels for Empirical Research Using Twitter Data.
Proceedings of the Technology, Mind, and Society Conference, 2018

2017
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017

Conceptual data sampling for breast cancer histology image classification.
Comput. Biol. Medicine, 2017

Efficient Computation of Regret-ratio Minimizing Set: A Compact Maxima Representative.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

HDBExpDetector: Aggregate Sudden-Change Detector over Dynamic Web Databases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Density Based Clustering over Location Based Services.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Optimized Processing of a Batch of Aggregate Queries over Hidden Databases.
Proceedings of the International Conference on Computer and Applications, 2017

MobiFace: A Mobile Application for Faceted Search over Hidden Web Databases.
Proceedings of the International Conference on Computer and Applications, 2017

Individual Query Cardinality Estimation using Multiple Query Combinations on a Search Engine's Corpus.
Proceedings of the International Conference on Computer and Applications, 2017

On data integrity attacks against route guidance in transportation-based cyber-physical systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017

2016
Faster Random Walks by Rewiring Online Social Networks On-the-Fly.
ACM Trans. Database Syst., 2016

Crawling Hidden Objects with kNN Queries.
IEEE Trans. Knowl. Data Eng., 2016

Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Secur. Comput., 2016

Query Reranking As A Service.
Proc. VLDB Endow., 2016

Discovering the Skyline of Web Databases.
Proc. VLDB Endow., 2016

Security in wearable communications.
IEEE Netw., 2016

Discover Aggregates Exceptions over Hidden Web Databases.
CoRR, 2016

HDBSCAN: Density based Clustering over Location Based Services.
CoRR, 2016

ANALOC: Efficient analytics over Location Based Services.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources.
IEEE Trans. Parallel Distributed Syst., 2015

Aggregate Estimation in Hidden Databases with Checkbox Interfaces.
IEEE Trans. Knowl. Data Eng., 2015

Leveraging History for Faster Sampling of Online Social Networks.
Proc. VLDB Endow., 2015

Privacy Implications of Database Ranking.
Proc. VLDB Endow., 2015

Walk, Not Wait: Faster Sampling Over Online Social Networks.
Proc. VLDB Endow., 2015

Aggregate Estimations over Location Based Services.
Proc. VLDB Endow., 2015

Adaptive ensemble with trust networks and collaborative recommendations.
Knowl. Inf. Syst., 2015

Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2015

TrustRank: a Cold-Start tolerant recommender system.
Enterp. Inf. Syst., 2015

Hidden Database Research and Analytics (HYDRA) System .
IEEE Data Eng. Bull., 2015

Privacy Disclosure from Wearable Devices.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Querying Hidden Attributes in an Online Community Network.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Linking virtual and real-world identities.
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015

Answering Complex Queries in an Online Community Network.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distributed Syst., 2014

Robust Collaborative Spectrum Sensing Schemes for Cognitive Radio Networks.
IEEE Trans. Parallel Distributed Syst., 2014

On Skyline Groups.
IEEE Trans. Knowl. Data Eng., 2014

Aggregate Estimation Over Dynamic Hidden Web Databases.
Proc. VLDB Endow., 2014

HDBTracker: Monitoring the Aggregates On Dynamic Hidden Web Databases.
Proc. VLDB Endow., 2014

Rank-Based Inference over Web Databases.
CoRR, 2014

Exploration and mining of web repositories.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

Aggregate estimation over a microblog platform.
Proceedings of the International Conference on Management of Data, 2014

Query Hidden Attributes in Social Networks.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Anything You Can Do, I Can Do Better: Finding Expert Teams by CrewScout.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Time-Bounded Essential Localization for Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Rank Discovery From Web Databases.
Proc. VLDB Endow., 2013

Body Area Network Security: A Fuzzy Attribute-Based Signcryption Scheme.
IEEE J. Sel. Areas Commun., 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Breaking the top-k barrier of hidden web databases?
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

On effective localization attacks against Internet Threat monitors.
Proceedings of IEEE International Conference on Communications, 2013

Mining a search engine's corpus without a query pool.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012

Just-in-Time Analytics on Large File Systems.
IEEE Trans. Computers, 2012

Optimal Algorithms for Crawling a Hidden Database in the Web.
Proc. VLDB Endow., 2012

No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.
Int. J. Heal. Inf. Syst. Informatics, 2012

Digging Deeper into Deep Web Databases by Breaking Through the Top-k Barrier
CoRR, 2012

A context-aware scheme for privacy-preserving location-based services.
Comput. Networks, 2012

Brief Announcement: Detecting Users' Connectivity on Online Social Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Aggregate suppression for enterprise search engines.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-Preserving OLAP: An Information-Theoretic Approach.
IEEE Trans. Knowl. Data Eng., 2011

Randomized Generalization for Aggregate Suppression Over Hidden Web Databases.
Proc. VLDB Endow., 2011

Exploration of Deep Web Repositories.
Proc. VLDB Endow., 2011

ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing.
Inf. Syst., 2011

Preserving Relation Privacy in Online Social Network Data.
IEEE Internet Comput., 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Relationship Privacy Preservation in Publishing Online Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Mining a search engine's corpus: efficient yet unbiased sampling and aggregate estimation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Attribute domain discovery for hidden web databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

MOBIES: mobile-interface enhancement service for hidden web database.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sparse target counting and localization in sensor networks based on compressive sensing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Protection of query privacy for continuous location based services.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On a Hierarchical False Data Injection Attack on Power System State Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks.
IEEE Trans. Syst. Man Cybern. Part B, 2010

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distributed Syst., 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

Unbiased estimation of size and other aggregates over hidden web databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Time-Bounded Essential Localization for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Versatile publishing for privacy preservation.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

3DLoc: Three Dimensional Wireless Localization Toolkit.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.
Proceedings of the Decision and Game Theory for Security, 2010

Algorithm-safe privacy-preserving data publishing.
Proceedings of the EDBT 2010, 2010

Turbo-charging hidden database samplers with overflowing queries and skew reduction.
Proceedings of the EDBT 2010, 2010

2009
Privacy preservation in wireless sensor networks: A state-of-the-art survey.
Ad Hoc Networks, 2009

Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009

HDSampler: revealing data behind web form interfaces.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Privacy risks in health databases from aggregate disclosure.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Leveraging COUNT Information in Sampling Hidden Databases.
Proceedings of the 25th International Conference on Data Engineering, 2009

CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems.
IEEE Trans. Knowl. Data Eng., 2008

Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Privacy-Preserving Data Mining Systems.
Computer, 2007

Towards Comprehensive Privacy Protection in Data Clustering.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

On the Communication Complexity of Privacy-Preserving Information Sharing Protocols.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

2006
Self-adaptive Worms and Countermeasures.
Proceedings of the Stabilization, 2006

2005
Distributed Privacy Preserving Information Sharing.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Performance Measurements for Privacy Preserving Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

A new scheme on privacy-preserving data classification.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

2004
A New Scheme on Privacy Preserving Association Rule Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

Cardinality-based inference control in OLAP systems: an information theoretic approach.
Proceedings of the DOLAP 2004, 2004


  Loading...