Nan Zhang
Orcid: 0000-0002-0454-7885Affiliations:
- The Pennsylvania State University, University Park, PA, USA
- The George Washington University, Washington, DC (former)
According to our database1,
Nan Zhang
authored at least 126 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on seas.gwu.edu
On csauthors.net:
Bibliography
2024
Inf. Syst. Res., 2024
Dynamic Subgraph Matching via Cost-Model-based Vertex Dominance Embeddings (Technical Report).
CoRR, 2024
CoRR, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
2023
CoRR, 2023
Brief Industry Paper: Towards Efficient Task Scheduling for AUTOSAR using Parallel Pruning.
Proceedings of the IEEE Real-Time Systems Symposium, 2023
2022
From Contextualizing to Context Theorizing: Assessing Context Effects in Privacy Research.
Manag. Sci., 2022
Manag. Sci., 2022
2021
MIS Q., December, 2021
2020
VLDB J., 2020
Proc. VLDB Endow., 2020
CCF Trans. Pervasive Comput. Interact., 2020
2019
Proceedings of the 2019 International Conference on Management of Data, 2019
Proceedings of the 52nd Hawaii International Conference on System Sciences, 2019
2018
Data Integrity Attacks Against Dynamic Route Guidance in Transportation-Based Cyber-Physical Systems: Modeling, Analysis, and Defense.
IEEE Trans. Veh. Technol., 2018
An Empirical Study of the Framework Impact on the Security of JavaScript Web Applications.
Proceedings of the Companion of the The Web Conference 2018 on The Web Conference 2018, 2018
Proceedings of the 2018 International Conference on Management of Data, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Your Privacy Is Your Friend's Privacy: Examining Interdependent Information Disclosure on Online Social Networks.
Proceedings of the 51st Hawaii International Conference on System Sciences, 2018
Proceedings of the Technology, Mind, and Society Conference, 2018
2017
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet Things J., 2017
Comput. Biol. Medicine, 2017
Efficient Computation of Regret-ratio Minimizing Set: A Compact Maxima Representative.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the International Conference on Computer and Applications, 2017
Proceedings of the International Conference on Computer and Applications, 2017
Individual Query Cardinality Estimation using Multiple Query Combinations on a Search Engine's Corpus.
Proceedings of the International Conference on Computer and Applications, 2017
On data integrity attacks against route guidance in transportation-based cyber-physical systems.
Proceedings of the 14th IEEE Annual Consumer Communications & Networking Conference, 2017
2016
ACM Trans. Database Syst., 2016
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016
2015
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources.
IEEE Trans. Parallel Distributed Syst., 2015
IEEE Trans. Knowl. Data Eng., 2015
Proc. VLDB Endow., 2015
Knowl. Inf. Syst., 2015
Distributed back-pressure scheduling with opportunistic routing in cognitive radio networks.
EURASIP J. Wirel. Commun. Netw., 2015
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015
Proceedings of the 2015 IEEE International Conference on Intelligence and Security Informatics, 2015
Proceedings of the Ninth International Conference on Web and Social Media, 2015
2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Parallel Distributed Syst., 2014
Proc. VLDB Endow., 2014
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014
Proceedings of the International Conference on Management of Data, 2014
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
2013
IEEE/ACM Trans. Netw., 2013
IEEE J. Sel. Areas Commun., 2013
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013
Proceedings of IEEE International Conference on Communications, 2013
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013
2012
IEEE Trans. Mob. Comput., 2012
Proc. VLDB Endow., 2012
No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.
Int. J. Heal. Inf. Syst. Informatics, 2012
CoRR, 2012
Comput. Networks, 2012
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
2011
IEEE Trans. Knowl. Data Eng., 2011
Proc. VLDB Endow., 2011
Inf. Syst., 2011
IEEE Internet Comput., 2011
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Mining a search engine's corpus: efficient yet unbiased sampling and aggregate estimation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011
Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011
Sparse target counting and localization in sensor networks based on compressive sensing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011
Proceedings of the Global Communications Conference, 2011
2010
IEEE Trans. Syst. Man Cybern. Part B, 2010
IEEE Trans. Parallel Distributed Syst., 2010
IEEE Trans. Computers, 2010
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010
Proceedings of the Decision and Game Theory for Security, 2010
Proceedings of the EDBT 2010, 2010
Proceedings of the EDBT 2010, 2010
2009
Ad Hoc Networks, 2009
Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009
2008
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems.
IEEE Trans. Knowl. Data Eng., 2008
Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008
On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008
2007
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007
2006
2005
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005
2004
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004
Cardinality-based inference control in OLAP systems: an information theoretic approach.
Proceedings of the DOLAP 2004, 2004