Tianqing Zhu

Orcid: 0000-0003-3411-7947

According to our database1, Tianqing Zhu authored at least 244 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PPFed: A Privacy-Preserving and Personalized Federated Learning Framework.
IEEE Internet Things J., June, 2024

Public and Private Blockchain Infusion: A Novel Approach to Federated Learning.
IEEE Internet Things J., May, 2024

Blockchain-Based Gradient Inversion and Poisoning Defense for Federated Learning.
IEEE Internet Things J., May, 2024

Location-Based Real-Time Updated Advising Method for Traffic Signal Control.
IEEE Internet Things J., April, 2024

Blockchain-Empowered Multiagent Systems: Advancing IoT Security and Transaction Efficiency.
IEEE Internet Things J., April, 2024

AdvEWM: Generating image adversarial examples by embedding digital watermarks.
J. Inf. Secur. Appl., February, 2024

A Concurrent Federated Reinforcement Learning for IoT Resources Allocation With Local Differential Privacy.
IEEE Internet Things J., February, 2024

Privacy and Fairness in Federated Learning: On the Perspective of Tradeoff.
ACM Comput. Surv., February, 2024

A two-stage model extraction attack on GANs with a small collected dataset.
Comput. Secur., February, 2024

Graph neural networks: a survey on the links between privacy and security.
Artif. Intell. Rev., February, 2024

Machine Unlearning: A Survey.
ACM Comput. Surv., January, 2024

Inversion-Guided Defense: Detecting Model Stealing Attacks by Output Inverting.
IEEE Trans. Inf. Forensics Secur., 2024

Defending Against Label-Only Attacks via Meta-Reinforcement Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Boosting Model Inversion Attacks With Adversarial Examples.
IEEE Trans. Dependable Secur. Comput., 2024

Attribute-Based Membership Inference Attacks and Defenses on GANs.
IEEE Trans. Dependable Secur. Comput., 2024

A location-based advising method in teacher-student frameworks.
Knowl. Based Syst., 2024

Privacy preservation in deep reinforcement learning: A training perspective.
Knowl. Based Syst., 2024

A federated advisory teacher-student framework with simultaneous learning agents.
Knowl. Based Syst., 2024

Fair Federated Learning with Opposite GAN.
Knowl. Based Syst., 2024

Topology modification against membership inference attack in Graph Neural Networks.
Knowl. Based Syst., 2024

A realistic model extraction attack against graph neural networks.
Knowl. Based Syst., 2024

Defending against gradient inversion attacks in federated learning via statistical machine unlearning.
Knowl. Based Syst., 2024

Supplement data in federated learning with a generator transparent to clients.
Inf. Sci., 2024

Proactive image manipulation detection via deep semi-fragile watermark.
Neurocomputing, 2024

MeST-Former: Motion-enhanced Spatiotemporal Transformer for generalizable Deepfake detection.
Neurocomputing, 2024

A GNN-based teacher-student framework with multi-advice.
Expert Syst. Appl., 2024

Hybrid resampling and weighted majority voting for multi-class anomaly detection on imbalanced malware and network traffic data.
Eng. Appl. Artif. Intell., 2024

M3A: A multimodal misinformation dataset for media authenticity analysis.
Comput. Vis. Image Underst., 2024

Local differential privacy and its applications: A comprehensive survey.
Comput. Stand. Interfaces, 2024

Disentangling different levels of GAN fingerprints for task-specific forensics.
Comput. Stand. Interfaces, 2024

When deep learning meets watermarking: A survey of application, attacks and defenses.
Comput. Stand. Interfaces, 2024

Zero-shot Class Unlearning via Layer-wise Relevance Analysis and Neuronal Path Perturbation.
CoRR, 2024

When Machine Unlearning Meets Retrieval-Augmented Generation (RAG): Keep Secret or Forget Knowledge?
CoRR, 2024

BRC20 Pinning Attack.
CoRR, 2024

Evaluating of Machine Unlearning: Robustness Verification Without Prior Modifications.
CoRR, 2024

SoK: Bitcoin Layer Two (L2).
CoRR, 2024

Query-Efficient Video Adversarial Attack with Stylized Logo.
CoRR, 2024

The Emerged Security and Privacy of LLM Agent: A Survey with Case Studies.
CoRR, 2024

DreamCar: Leveraging Car-specific Prior for in-the-wild 3D Car Reconstruction.
CoRR, 2024

QUEEN: Query Unlearning against Model Extraction.
CoRR, 2024

Large Language Models for Link Stealing Attacks Against Graph Neural Networks.
CoRR, 2024

Update Selective Parameters: Federated Machine Unlearning Based on Model Explanation.
CoRR, 2024

Towards Efficient Target-Level Machine Unlearning Based on Essential Graph.
CoRR, 2024

Really Unlearned? Verifying Machine Unlearning via Influential Sample Pairs.
CoRR, 2024

Don't Forget Too Much: Towards Machine Unlearning on Feature Level.
CoRR, 2024

Linkage on Security, Privacy and Fairness in Federated Learning: New Balances and New Perspectives.
CoRR, 2024

Knowledge Distillation in Federated Learning: a Survey on Long Lasting Challenges and New Solutions.
CoRR, 2024

Unique Security and Privacy Threats of Large Language Model: A Comprehensive Survey.
CoRR, 2024

A Survey on Machine Unlearning: Techniques and New Emerged Privacy Risks.
CoRR, 2024

3DRealCar: An In-the-wild RGB-D Car Dataset with 360-degree Views.
CoRR, 2024

Federated TrustChain: Blockchain-Enhanced LLM Training and Unlearning.
CoRR, 2024

Federated Learning with Blockchain-Enhanced Machine Unlearning: A Trustworthy Approach.
CoRR, 2024

Class Machine Unlearning for Complex Data via Concepts Inference and Data Poisoning.
CoRR, 2024

The Frontier of Data Erasure: Machine Unlearning for Large Language Models.
CoRR, 2024

AICAttack: Adversarial Image Captioning Attack with Attention-Based Optimization.
CoRR, 2024

Gradient-based defense methods for data leakage in vertical federated learning.
Comput. Secur., 2024

How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers.
Proceedings of the 33rd USENIX Security Symposium, 2024

Enhancing Portability in Deep Learning-Based Side-Channel Attacks Against Kyber.
Proceedings of the Information Security Practice and Experience, 2024

When Fairness Meets Privacy: Exploring Privacy Threats in Fair Binary Classifiers via Membership Inference Attacks.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Machine Unlearning via Null Space Calibration.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Detection of Diffusion Model-Generated Faces by Assessing Smoothness and Noise Tolerance.
Proceedings of the IEEE International Symposium on Broadband Multimedia Systems and Broadcasting, 2024

2023
Privacy and evolutionary cooperation in neural-network-based game theory.
Knowl. Based Syst., December, 2023

BTC-Shadow: an analysis and visualization system for exposing implicit behaviors in Bitcoin transaction graphs.
Frontiers Comput. Sci., December, 2023

A Game-Theoretic Federated Learning Framework for Data Quality Improvement.
IEEE Trans. Knowl. Data Eng., November, 2023

A lightweight privacy-preserving scheme using pixel block mixing for facial image classification in deep learning.
Eng. Appl. Artif. Intell., November, 2023

Model-Based Self-Advising for Multi-Agent Learning.
IEEE Trans. Neural Networks Learn. Syst., October, 2023

Revisiting model fairness via adversarial examples.
Knowl. Based Syst., October, 2023

Balancing Learning Model Privacy, Fairness, and Accuracy With Early Stopping Criteria.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

Migrating federated learning to centralized learning with the leverage of unlabeled data.
Knowl. Inf. Syst., September, 2023

Improve individual fairness in federated learning via adversarial training.
Comput. Secur., September, 2023

Time-Driven and Privacy-Preserving Navigation Model for Vehicle-to-Vehicle Communication Systems.
IEEE Trans. Veh. Technol., July, 2023

Privacy Data Diffusion Modeling and Preserving in Online Social Network.
IEEE Trans. Knowl. Data Eng., June, 2023

Evolution of cooperation in malicious social networks with differential privacy mechanisms.
Neural Comput. Appl., June, 2023

Differentially Private Crowdsourcing With the Public and Private Blockchain.
IEEE Internet Things J., May, 2023

Learning Games for Defending Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Syst. Man Cybern. Syst., April, 2023

A Robust Game-Theoretical Federated Learning Framework With Joint Differential Privacy.
IEEE Trans. Knowl. Data Eng., April, 2023

Adversarial Attacks Against Deep Generative Models on Data: A Survey.
IEEE Trans. Knowl. Data Eng., April, 2023

Privacy Data Propagation and Preservation in Social Media: A Real-World Case Study.
IEEE Trans. Knowl. Data Eng., April, 2023

Defense against membership inference attack in graph neural networks through graph perturbation.
Int. J. Inf. Sec., April, 2023

A Blockchain-Based Decentralized, Fair and Authenticated Information Sharing Scheme in Zero Trust Internet-of-Things.
IEEE Trans. Computers, February, 2023

Fairness in graph-based semi-supervised learning.
Knowl. Inf. Syst., February, 2023

SPoFC: A framework for stream data aggregation with local differential privacy.
Concurr. Comput. Pract. Exp., February, 2023

Face image de-identification by feature space adversarial perturbation.
Concurr. Comput. Pract. Exp., February, 2023

Differential privacy: Review of improving utility through cryptography-based technologies.
Concurr. Comput. Pract. Exp., February, 2023

A Blockchain-Based Cross-Domain and Autonomous Access Control Scheme for Internet of Things.
IEEE Trans. Serv. Comput., 2023

Deep Metric Learning for K Nearest Neighbor Classification.
IEEE Trans. Knowl. Data Eng., 2023

Label-Only Model Inversion Attacks: Attack With the Least Information.
IEEE Trans. Inf. Forensics Secur., 2023

FedRecovery: Differentially Private Machine Unlearning for Federated Learning Frameworks.
IEEE Trans. Inf. Forensics Secur., 2023

A Game-Theoretic Method for Defending Against Advanced Persistent Threats in Cyber Systems.
IEEE Trans. Inf. Forensics Secur., 2023

Label-Only Membership Inference Attacks and Defenses in Semantic Segmentation Models.
IEEE Trans. Dependable Secur. Comput., 2023

Differentially Private Distributed Frequency Estimation.
IEEE Trans. Dependable Secur. Comput., 2023

Making DeepFakes More Spurious: Evading Deep Face Forgery Detection via Trace Removal Attack.
IEEE Trans. Dependable Secur. Comput., 2023

CIFair: Constructing continuous domains of invariant features for image fair classifications.
Knowl. Based Syst., 2023

Adversarial Attacks and Defenses in Deep Learning: From a Perspective of Cybersecurity.
ACM Comput. Surv., 2023

Privacy Intelligence: A Survey on Image Privacy in Online Social Networks.
ACM Comput. Surv., 2023

Reinforcement Unlearning.
CoRR, 2023

FD-MIA: Efficient Attacks on Fairness-enhanced Models.
CoRR, 2023

Divide and Ensemble: Progressively Learning for the Unknown.
CoRR, 2023

Generative Adversarial Networks Unlearning.
CoRR, 2023

Privacy and Fairness in Federated Learning: on the Perspective of Trade-off.
CoRR, 2023

Low-frequency Image Deep Steganography: Manipulate the Frequency Distribution to Hide Secrets with Tenacious Robustness.
CoRR, 2023

High-frequency Matters: An Overwriting Attack and defense for Image-processing Neural Network Watermarking.
CoRR, 2023

Preserving data privacy in federated learning through large gradient pruning.
Comput. Secur., 2023

New challenges in reinforcement learning: a survey of security and privacy.
Artif. Intell. Rev., 2023

Proactive Deepfake Defence via Identity Watermarking.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

TI<sup>2</sup>Net: Temporal Identity Inconsistency Network for Deepfake Detection.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023

Towards Robust Gan-Generated Image Detection: A Multi-View Completion Representation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

Protect Trajectory Privacy in Food Delivery with Differential Privacy and Multi-agent Reinforcement Learning.
Proceedings of the Advanced Information Networking and Applications, 2023

2022
Time-optimal and privacy preserving route planning for carpool policy.
World Wide Web, 2022

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence.
IEEE Trans. Knowl. Data Eng., 2022

The Dynamic Privacy-Preserving Mechanisms for Online Dynamic Social Networks.
IEEE Trans. Knowl. Data Eng., 2022

Fairness in Semi-Supervised Learning: Unlabeled Data Help to Reduce Discrimination.
IEEE Trans. Knowl. Data Eng., 2022

One Parameter Defense - Defending Against Data Inference Attacks via Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2022

Differentially Private Multi-Agent Planning for Logistic-Like Problems.
IEEE Trans. Dependable Secur. Comput., 2022

Differential Advising in Multiagent Reinforcement Learning.
IEEE Trans. Cybern., 2022

A Decentralized Electronic Reporting Scheme with Privacy Protection Based on Proxy Signature and Blockchain.
Secur. Commun. Networks, 2022

Image fairness in deep learning: problems, models, and challenges.
Neural Comput. Appl., 2022

Attacking neural machine translations via hybrid attention learning.
Mach. Learn., 2022

LOPO: a location privacy preserving path optimization scheme for spatial crowdsourcing.
J. Ambient Intell. Humaniz. Comput., 2022

Novel hybrid multi-head self-attention and multifractal algorithm for non-stationary time series prediction.
Inf. Sci., 2022

Resource Allocation in IoT Edge Computing via Concurrent Federated Reinforcement Learning.
IEEE Internet Things J., 2022

Privately Publishing Internet of Things Data: Bring Personalized Sampling Into Differentially Private Mechanisms.
IEEE Internet Things J., 2022

Multi-agent reinforcement learning via knowledge transfer with differentially private noise.
Int. J. Intell. Syst., 2022

Prioritized Experience Replay based on Multi-armed Bandit.
Expert Syst. Appl., 2022

More than Privacy: Adopting Differential Privacy in Game-theoretic Mechanism Design.
ACM Comput. Surv., 2022

How Does a Deep Learning Model Architecture Impact Its Privacy?
CoRR, 2022

BABD: A Bitcoin Address Behavior Dataset for Address Behavior Pattern Analysis.
CoRR, 2022

Model Inversion Attack against Transfer Learning: Inverting a Model without Accessing It.
CoRR, 2022

Label-only Model Inversion Attack: The Attack that Requires the Least Information.
CoRR, 2022

Private-encoder: Enforcing privacy in latent space for human face images.
Concurr. Comput. Pract. Exp., 2022

PriTxt: A privacy risk assessment method for text data based on semantic correlation learning.
Concurr. Comput. Pract. Exp., 2022

A novel differentially private advising framework in cloud server environment.
Concurr. Comput. Pract. Exp., 2022

From distributed machine learning to federated learning: In the view of data privacy and security.
Concurr. Comput. Pract. Exp., 2022

Correlated data in differential privacy: Definition and analysis.
Concurr. Comput. Pract. Exp., 2022

A privacy preservation method for multiple-source unstructured data in online social networks.
Comput. Secur., 2022

Fairness and privacy preservation for facial images: GAN-based methods.
Comput. Secur., 2022

Privacy, accuracy, and model fairness trade-offs in federated learning.
Comput. Secur., 2022

Visual privacy attacks and defenses in deep learning: a survey.
Artif. Intell. Rev., 2022

Privacy-Preserving in Double Deep-Q-Network with Differential Privacy in Continuous Spaces.
Proceedings of the AI 2021: Advances in Artificial Intelligence, 2022

2021
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing.
IEEE Trans. Mob. Comput., 2021

Game Theoretical Adversarial Deep Learning With Variational Adversaries.
IEEE Trans. Knowl. Data Eng., 2021

A Differentially Private Game Theoretic Approach for Deceiving Cyber Adversaries.
IEEE Trans. Inf. Forensics Secur., 2021

A Mixing Scheme Using a Decentralized Signature Protocol for Privacy Protection in Bitcoin Blockchain.
IEEE Trans. Dependable Secur. Comput., 2021

A multi-type and decentralized data transaction scheme based on smart contracts and digital watermarks.
J. Netw. Comput. Appl., 2021

FAPS: A fair, autonomous and privacy-preserving scheme for big data exchange based on oblivious transfer, Ether cheque and smart contracts.
Inf. Sci., 2021

Privacy preservation for image data: A GAN-based method.
Int. J. Intell. Syst., 2021

Asymmetric cryptographic functions based on generative adversarial neural networks for Internet of Things.
Future Gener. Comput. Syst., 2021

Semantic-Preserving Adversarial Text Attacks.
CoRR, 2021

A Lightweight Privacy-Preserving Scheme Using Label-based Pixel Block Mixing for Image Classification in Deep Learning.
CoRR, 2021

Fair and Differentially Private Distributed Frequency Estimation.
CoRR, 2021

DP-Image: Differential Privacy for Image Data in Feature Space.
CoRR, 2021

Heterogeneous differential privacy for vertically partitioned databases.
Concurr. Comput. Pract. Exp., 2021

An optimized differential privacy scheme with reinforcement learning in VANET.
Comput. Secur., 2021

CDVT: A Cluster-Based Distributed Video Transcoding Scheme for Mobile Stream Services.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Privacy Risk Assessment for Text Data Based on Semantic Correlation Learning.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

A Blockchain-based Fast Authentication and Collaborative Video Data Forwarding Scheme for Vehicular Networks.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

A Semantic-based Replacement for Event Image Privacy.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
Correlated Differential Privacy: Feature Selection in Machine Learning.
IEEE Trans. Ind. Informatics, 2020

Differentially Private Malicious Agent Avoidance in Multiagent Advising Learning.
IEEE Trans. Cybern., 2020

A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

A Hierarchical Encryption and Key Management Scheme for Layered Access Control on H.264/SVC Bitstream in the Internet of Things.
IEEE Internet Things J., 2020

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020

Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020

Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020

Security and privacy in 6G networks: New areas and new challenges.
Digit. Commun. Networks, 2020

Differential Advising in Multi-Agent Reinforcement Learning.
CoRR, 2020

the Connection between Cryptography and Differential Privacy: a Survey.
CoRR, 2020

Fairness Constraints in Semi-supervised Learning.
CoRR, 2020

Efficiently Constructing Adversarial Examples by Feature Watermarking.
CoRR, 2020

Privacy Intelligence: A Survey on Image Sharing on Online Social Networks.
CoRR, 2020

Local Differential Privacy and Its Applications: A Comprehensive Survey.
CoRR, 2020

Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020

Improving Laplace Mechanism of Differential Privacy by Personalized Sampling.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SCScan: A SVM-based Scanning System for Vulnerabilities in Blockchain Smart Contracts.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Model Poisoning Defense on Federated Learning: A Validation Based Approach.
Proceedings of the Network and System Security - 14th International Conference, 2020

Privacy and Utility Trade-Off for Textual Analysis via Calibrated Multivariate Perturbations.
Proceedings of the Network and System Security - 14th International Conference, 2020

The Impact of Differential Privacy on Model Fairness in Federated Learning.
Proceedings of the Network and System Security - 14th International Conference, 2020

GAN-Based Image Privacy Preservation: Balancing Privacy and Utility.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Fast Robustness Quantification Method for Evaluating Typical Deep Learning Models by Generally Image Processing.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Hiding Private Information in Images From AI.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

Blockchain in 5G and 6G networks.
Proceedings of the Blockchains for Network Security: Principles, 2020

2019
Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Symmetry, 2019

CaACBIM: A Context-aware Access Control Model for BIM.
Inf., 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019

A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019

Decentralized Learning with Average Difference Aggregation for Proactive Online Social Care.
CoRR, 2019

A differentially private method for crowdsourcing data submission.
Concurr. Comput. Pract. Exp., 2019

Adversaries or allies? Privacy and deep learning in big data era.
Concurr. Comput. Pract. Exp., 2019

Optimizing rewards allocation for privacy-preserving spatial crowdsourcing.
Comput. Commun., 2019

PICEAdatabase: a web database for Picea omics and phenotypic information.
Database J. Biol. Databases Curation, 2019

PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019

Applying Differential Privacy Mechanism in Artificial Intelligence.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Differential Privacy Preservation for Smart Meter Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Simultaneously Advising via Differential Privacy in Cloud Servers Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Detecting Suicidal Ideation with Data Protection in Online Communities.
Proceedings of the Database Systems for Advanced Applications, 2019

Privacy preserving in big data.
Proceedings of the Security and Privacy for Big Data, Cloud Computing and Applications, 2019

2018
A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

Location Privacy and Its Applications: A Systematic Study.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

A Differentially Private Method for Crowdsourcing Data Submission.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Using Adversarial Noises to Protect Privacy in Deep Learning Era.
Proceedings of the IEEE Global Communications Conference, 2018

Location Privacy in Mobile Applications
Springer, ISBN: 978-981-13-1704-0, 2018

2017
Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

A cyber-threat analytic model for autonomous detection of virtual property theft.
Inf. Comput. Secur., 2017

Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017

Reward-based spatial crowdsourcing with differential privacy preservation.
Enterp. Inf. Syst., 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

Taming transitive permission attack via bytecode rewriting on Android application.
Secur. Commun. Networks, 2016

Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

A differentially private algorithm for location data release.
Knowl. Inf. Syst., 2016

Semantic analysis in location privacy preserving.
Concurr. Comput. Pract. Exp., 2016

Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

2015
Privacy preserving data release for tagging recommender systems.
Web Intell., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Inf. Forensics Secur., 2015

2014
Privacy preserving collaborative filtering for KNN attack resisting.
Soc. Netw. Anal. Min., 2014

An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

2013
Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.
Proceedings of the Behavior and Social Computing, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2006
An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Suspicious Financial Transaction Detection Based on Empirical Mode Decomposition Method.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006


  Loading...