Xuyun Zhang
Orcid: 0000-0001-7353-4159
According to our database1,
Xuyun Zhang
authored at least 239 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Privacy-preserving Point-of-interest Recommendation based on Simplified Graph Convolutional Network for Geological Traveling.
ACM Trans. Intell. Syst. Technol., August, 2024
Privacy-Preserving Truth Discovery Based on Secure Multi-Party Computation in Vehicle-Based Mobile Crowdsensing.
IEEE Trans. Intell. Transp. Syst., July, 2024
The Path to Defence: A Roadmap to Characterising Data Poisoning Attacks on Victim Models.
ACM Comput. Surv., July, 2024
IEEE Trans. Dependable Secur. Comput., 2024
Softw. Pract. Exp., 2024
Softw. Pract. Exp., 2024
Digit. Commun. Networks, 2024
Looking From the Future: Multi-order Iterations Can Enhance Adversarial Attack Transferability.
CoRR, 2024
Guest Editorial: Special issue on trustworthy machine learning for behavioural and social computing.
CAAI Trans. Intell. Technol., 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
EvidenceQuest: An Interactive Evidence Discovery System for Explainable Artificial Intelligence.
Proceedings of the 17th ACM International Conference on Web Search and Data Mining, 2024
CMCLRec: Cross-modal Contrastive Learning for User Cold-start Sequential Recommendation.
Proceedings of the 47th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2024
Cluster-driven Personalized Federated Recommendation with Interest-aware Graph Convolution Network for Multimedia.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Counterfactual User Sequence Synthesis Augmented with Continuous Time Dynamic Preference Modeling for Sequential POI Recommendation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Shadow-Free Membership Inference Attacks: Recommender Systems Are More Vulnerable Than You Thought.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Hyperbolic Contrastive Learning with Second Order Sampling for Collaborative Filtering.
Proceedings of the IEEE International Conference on Web Services, 2024
Optimized MARL for Latency-Sensitive Collaborative Service Placement in Edge Computing.
Proceedings of the IEEE International Conference on Web Services, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 16th International Conference on Agents and Artificial Intelligence, 2024
Proceedings of the Database Systems for Advanced Applications, 2024
Cascading Graph Convolution Contrastive Learning Networks for Multi-behavior Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2024
GLFNet: Global and Local Frequency-domain Network for Long-term Time Series Forecasting.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
CHDAER: Consistent Hashing-based Data Allocation for Efficient Recommendation in Edge Environment.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
FedLPS: Heterogeneous Federated Learning for Multiple Tasks with Local Parameter Sharing.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE J. Sel. Areas Commun., October, 2023
TSDroid: A Novel Android Malware Detection Framework Based on Temporal & Spatial Metrics in IoMT.
ACM Trans. Sens. Networks, August, 2023
A Correlation Graph Based Approach for Personalized and Compatible Web APIs Recommendation in Mobile APP Development.
IEEE Trans. Knowl. Data Eng., June, 2023
IEEE J. Biomed. Health Informatics, May, 2023
Comput. Intell., February, 2023
NACA: A Joint Distortion-Based Non-Additive Cost Assignment Method for Video Steganography.
IEEE Trans. Dependable Secur. Comput., 2023
CoRR, 2023
Differentially private locality sensitive hashing based federated recommender system.
Concurr. Comput. Pract. Exp., 2023
An intelligent recommendation method based on multi-interest network and adversarial deep learning.
Comput. Secur., 2023
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
A Comprehensive Survey of Explainable Artificial Intelligence (XAI) Methods: Exploring Transparency and Interpretability.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Web Services, 2023
ProcessGPT: Transforming Business Process Management with Generative Artificial Intelligence.
Proceedings of the IEEE International Conference on Web Services, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Reinforcement Learning based Hyper-heuristics for Many-objective Pickup and Delivery Problem.
Proceedings of the IEEE International Conference on Data Mining, 2023
Multi-Granularity Entity Recognition based Sentence Ranking for Multi-Document Summarization.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023
Federated Learning Based Satellite-Marine Integrated Training for Marine Edge Intelligence.
Proceedings of the IEEE Intl Conf on Dependable, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
SMEF: Social-aware Multi-dimensional Edge Features-based Graph Representation Learning for Recommendation.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Mob. Networks Appl., December, 2022
ACM Comput. Surv., January, 2022
FlowSpectrum: a concrete characterization scheme of network traffic behavior for anomaly detection.
World Wide Web, 2022
Edge computing empowered anomaly detection framework with dynamic insertion and deletion schemes on data streams.
World Wide Web, 2022
DisCOV: Distributed COVID-19 Detection on X-Ray Images With Edge-Cloud Collaboration.
IEEE Trans. Serv. Comput., 2022
PSDF: Privacy-aware IoV Service Deployment with Federated Learning in Cloud-Edge Computing.
ACM Trans. Intell. Syst. Technol., 2022
FLEAM: A Federated Learning Empowered Architecture to Mitigate DDoS in Industrial IoT.
IEEE Trans. Ind. Informatics, 2022
DDCA: A Distortion Drift-Based Cost Assignment Method for Adaptive Video Steganography in the Transform Domain.
IEEE Trans. Dependable Secur. Comput., 2022
MRMondrian: Scalable Multidimensional Anonymisation for Big Data Privacy Preservation.
IEEE Trans. Big Data, 2022
IEEE Trans. Big Data, 2022
Int. J. Intell. Syst., 2022
Future Gener. Comput. Syst., 2022
Sports match prediction model for training and exercise using attention-based LSTM network.
Digit. Commun. Networks, 2022
Crowdsourcing-based Multi-Device Communication Cooperation for Mobile High-Quality Video Enhancement.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the IEEE Smartworld, 2022
DAWAR: Diversity-aware Web APIs Recommendation for Mashup Creation based on Correlation Graph.
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Privacy-aware Data Fusion and Prediction for Smart City Services in Edge Computing Environment.
Proceedings of the 2022 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Service Caching for Meteorological Emergency Decision-making in Cloud-Edge Computing.
Proceedings of the IEEE International Conference on Web Services, 2022
Proceedings of the IEEE International Conference on Data Mining, 2022
TD3 with Reverse KL Regularizer for Offline Reinforcement Learning from Mixed Datasets.
Proceedings of the IEEE International Conference on Data Mining, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
Evidence Based Pipeline for Explaining Artificial Intelligence Algorithms with Interactions.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022
A Transformer-Based User Satisfaction Prediction for Proactive Interaction Mechanism in DuerOS.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Smart Contract Scams Detection with Topological Data Analysis on Account Interaction.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Imitation Learning to Outperform Demonstrators by Directly Extrapolating Demonstrations.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the Advanced Data Mining and Applications - 18th International Conference, 2022
2021
CoPace: Edge Computation Offloading and Caching for Self-Driving With Deep Reinforcement Learning.
IEEE Trans. Veh. Technol., 2021
Clustering-based Efficient Privacy-preserving Face Recognition Scheme without Compromising Accuracy.
ACM Trans. Sens. Networks, 2021
TripRes: Traffic Flow Prediction Driven Resource Reservation for Multimedia IoV with Edge Computing.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Compatibility-Aware Web API Recommendation for Mashup Creation via Textual Description Mining.
ACM Trans. Multim. Comput. Commun. Appl., 2021
Secure Service Offloading for Internet of Vehicles in SDN-Enabled Mobile Edge Computing.
IEEE Trans. Intell. Transp. Syst., 2021
Guest Editorial: Artificial Intelligence for Securing Industrial-Based Cyber-Physical Systems.
IEEE Trans. Ind. Informatics, 2021
Privacy-Aware Data Fusion and Prediction With Spatial-Temporal Context for Smart City Industrial Environment.
IEEE Trans. Ind. Informatics, 2021
Efficient and Lightweight Data Streaming Authentication in Industrial Control and Automation Systems.
IEEE Trans. Ind. Informatics, 2021
IEEE Trans. Comput. Soc. Syst., 2021
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things.
IEEE Trans. Comput. Soc. Syst., 2021
Softw. Pract. Exp., 2021
Softw. Pract. Exp., 2021
Point-of-Interest Recommendation with User's Privacy Preserving in an IoT Environment.
Mob. Networks Appl., 2021
Towards effective learning for face super-resolution with shape and pose perturbations.
Knowl. Based Syst., 2021
IEEE Internet Things J., 2021
IEEE Internet Things J., 2021
Int. J. Intell. Syst., 2021
IEEE Intell. Syst., 2021
Diversity-aware Web APIs Assignment and Recommendation for Mashup Creation with Compatibility Guarantee.
CoRR, 2021
Concurr. Comput. Pract. Exp., 2021
Comput. Commun., 2021
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021
Proceedings of the IEEE International Conference on Smart Computing, 2021
EAR: An Enhanced Adversarial Regularization Approach against Membership Inference Attacks.
Proceedings of the International Joint Conference on Neural Networks, 2021
GoDeep: Intelligent IoV Service Deployment and Execution with Privacy Preservation in Cloud-edge Computing.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021
Game Theory-Based Task Offloading and Resource Allocation for Vehicular Networks in Edge-Cloud Computing.
Proceedings of the 2021 IEEE International Conference on Web Services, 2021
Computation Offloading and Resource Management for Energy and Cost Trade-Offs with Deep Reinforcement Learning in Mobile Edge Computing.
Proceedings of the Service-Oriented Computing - 19th International Conference, 2021
Proceedings of the IEEE International Conference on Data Mining, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021
Proceedings of the 25th International Enterprise Distributed Object Computing Workshop, 2021
International Workshop on Privacy, Security and Trust in Computational Intelligence (PSTCI2021).
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
Deep Reinforcement Learning Based Iterative Participant Selection Method for Industrial IoT Big Data Mobile Crowdsourcing.
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
Proceedings of the Advanced Data Mining and Applications - 17th International Conference, 2021
2020
A QoS-aware virtual machine scheduling method for energy conservation in cloud-based cyber-physical systems.
World Wide Web, 2020
Efficient QoS-Aware Service Recommendation for Multi-Tenant Service-Based Systems in Cloud.
IEEE Trans. Serv. Comput., 2020
IEEE Trans. Parallel Distributed Syst., 2020
Introduction to the Special Issue on Privacy and Security in Evolving Internet of Multimedia Things.
ACM Trans. Multim. Comput. Commun. Appl., 2020
IEEE Trans. Ind. Informatics, 2020
IEEE Trans. Emerg. Top. Comput. Intell., 2020
Pattern Recognit. Lett., 2020
Blockchain-based cloudlet management for multimedia workflow in mobile cloud computing.
Multim. Tools Appl., 2020
Knowl. Based Syst., 2020
Inf. Sci., 2020
Inf. Sci., 2020
IEEE Internet Things J., 2020
A balanced virtual machine scheduling method for energy-performance trade-offs in cyber-physical cloud systems.
Future Gener. Comput. Syst., 2020
Privacy-preserving matrix product based static mutual exclusive roles constraints violation detection in interoperable role-based access control.
Future Gener. Comput. Syst., 2020
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment.
Comput. Commun., 2020
Proceedings of the Security and Privacy in Digital Economy, 2020
Dynamic Task Offloading with Minority Game for Internet of Vehicles in Cloud-Edge Computing.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Computation Offloading and Content Caching with Traffic Flow Prediction for Internet of Vehicles in Edge Computing.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
OPHiForest: Order Preserving Hashing Based Isolation Forest for Robust and Scalable Anomaly Detection.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the 20th IEEE/ACM International Symposium on Cluster, 2020
A Proof-of-Majority Consensus Protocol for Blockchain-enabled Collaboration Infrastructure of 5G Network Slice Brokers.
Proceedings of the BSCI '20: Proceedings of the 2nd ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2020
A Service Computing Framework for Proteomics Analysis and Collaboration of Pathogenic Mechanism Studies.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020
2019
Proceedings of the Encyclopedia of Big Data Technologies., 2019
A Blockchain-Powered Crowdsourcing Method With Privacy Preservation in Mobile Environment.
IEEE Trans. Comput. Soc. Syst., 2019
Finding All You Need: Web APIs Recommendation in Web of Things Through Keywords Search.
IEEE Trans. Comput. Soc. Syst., 2019
Secur. Commun. Networks, 2019
An edge computing-enabled computation offloading method with privacy preservation for internet of connected vehicles.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
User attitudes and behaviors toward personalized control of privacy settings on smartphones.
Concurr. Comput. Pract. Exp., 2019
IEEE Access, 2019
Quality-Aware Service Selection for Multi-Tenant Service Oriented Systems Based on Combinatorial Auction.
IEEE Access, 2019
Load-Aware Computation Offloading with Privacy Preservation for 5G Networks in Edge Computing.
Proceedings of the Mobile Computing, Applications, and Services, 2019
Energy-Efficient Computation Offloading with Privacy Preservation for Edge Computing-Enabled 5G Networks.
Proceedings of the 2019 International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2019
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the Service-Oriented Computing - 17th International Conference, 2019
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the Advanced Data Mining and Applications - 15th International Conference, 2019
2018
IEEE Trans. Big Data, 2018
An IoT-Oriented Offloading Method with Privacy Preservation for Cloudlet-Enabled Wireless Metropolitan Area Networks.
Sensors, 2018
An Exception Handling Approach for Privacy-Preserving Service Recommendation Failure in a Cloud Environment.
Sensors, 2018
Secur. Commun. Networks, 2018
Pers. Ubiquitous Comput., 2018
Curve fitting based efficient parameter selection for robust provable data possession.
J. Parallel Distributed Comput., 2018
An IoT-Oriented data placement method with privacy preservation in cloud environment.
J. Netw. Comput. Appl., 2018
A two-stage locality-sensitive hashing based approach for privacy-preserving mobile service recommendation in cross-platform edge environment.
Future Gener. Comput. Syst., 2018
Secure Computing for the Internet of Things and Network Edges: Protecting Communication in the Worldwide Network of Devices.
IEEE Consumer Electron. Mag., 2018
Privacy-Aware Data Publishing and Integration for Collaborative Service Recommendation.
IEEE Access, 2018
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
One Intrusion Detection Method Based On Uniformed Conditional Dynamic Mutual Information.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Asymmetric Commutative Encryption Scheme Based Efficient Solution to the Millionaires' Problem.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the Testbeds and Research Infrastructures for the Development of Networks and Communications, 2018
Proceedings of the 2018 International Conference on Image and Vision Computing New Zealand, 2018
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Human-Computer Interaction. Interaction in Context, 2018
Collaborative Network Traffic Analysis via Alternating Direction Method of Multipliers.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018
2017
Softw. Pract. Exp., 2017
A Distributed Locality-Sensitive Hashing-Based Approach for Cloud Service Recommendation From Multi-Source Data.
IEEE J. Sel. Areas Commun., 2017
An energy-aware virtual machine scheduling method for service QoS enhancement in clouds over big data.
Concurr. Comput. Pract. Exp., 2017
Privacy-Preserving Detection of Statically Mutually Exclusive Roles Constraints Violation in Interoperable Role-Based Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017
Amplified Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017
Privacy-Preserving Distributed Service Recommendation Based on Locality-Sensitive Hashing.
Proceedings of the 2017 IEEE International Conference on Web Services, 2017
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
Efficient Keyword Search for Building Service-Based Systems Based on Dynamic Programming.
Proceedings of the Service-Oriented Computing - 15th International Conference, 2017
LSHiForest: A Generic Framework for Fast Tree Isolation Based Ensemble Anomaly Analysis.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Two-Phase Locality-Sensitive Hashing for Privacy-Preserving Distributed Service Recommendation.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Proceedings of the Applications and Techniques in Information Security, 2017
An inverse collaborative filtering approach for cold-start problem in web service recommendation.
Proceedings of the Australasian Computer Science Week Multiconference, 2017
2016
IEEE Trans. Knowl. Data Eng., 2016
EnReal: An Energy-Aware Resource Allocation Method for Scientific Workflow Executions in Cloud Environment.
IEEE Trans. Cloud Comput., 2016
A novel virtual node approach for interactive visual analytics of big datasets in parallel coordinates.
Future Gener. Comput. Syst., 2016
HKE-BC: hierarchical key exchange for secure scheduling and auditing of big data in cloud computing.
Concurr. Comput. Pract. Exp., 2016
Scalable Iterative Implementation of Mondrian for Big Data Multidimensional Anonymisation.
Proceedings of the Security, Privacy and Anonymity in Computation, Communication and Storage, 2016
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016
Scalable Local-Recoding Anonymization using Locality Sensitive Hashing for Big Data Privacy Preservation.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
Proceedings of the AI 2016: Advances in Artificial Intelligence, 2016
Combining Social Balance Theory and Collaborative Filtering for Service Recommendation in Sparse Environment.
Proceedings of the Advances in Services Computing, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
IEEE Trans. Parallel Distributed Syst., 2015
HireSome-II: Towards Privacy-Aware Cross-Cloud Service Composition for Big Data Applications.
IEEE Trans. Parallel Distributed Syst., 2015
Proximity-Aware Local-Recoding Anonymization with MapReduce for Scalable Big Data Privacy Preservation in Cloud.
IEEE Trans. Computers, 2015
MuR-DPA: Top-Down Levelled Multi-Replica Merkle Hash Tree Based Secure Public Auditing for Dynamic Big Data Storage on Cloud.
IEEE Trans. Computers, 2015
External integrity verification for outsourced big data in cloud and IoT: A big picture.
Future Gener. Comput. Syst., 2015
Using arced axes in parallel coordinates geometry for high dimensional BigData visual analytics in cloud computing.
Computing, 2015
Proceedings of the International Conference on Cloud Computing and Big Data, 2015
Proceedings of the Advances in Services Computing, 2015
2014
A Scalable Two-Phase Top-Down Specialization Approach for Data Anonymization Using MapReduce on Cloud.
IEEE Trans. Parallel Distributed Syst., 2014
KASR: A Keyword-Aware Service Recommendation Method on MapReduce for Big Data Applications.
IEEE Trans. Parallel Distributed Syst., 2014
Authorized Public Auditing of Dynamic Big Data Storage on Cloud with Efficient Verifiable Fine-Grained Updates.
IEEE Trans. Parallel Distributed Syst., 2014
A hybrid approach for scalable sub-tree anonymization over big data using MapReduce on cloud.
J. Comput. Syst. Sci., 2014
A spatiotemporal compression based approach for efficient big data processing on Cloud.
J. Comput. Syst. Sci., 2014
2013
A Privacy Leakage Upper Bound Constraint-Based Approach for Cost-Effective Privacy Preserving of Intermediate Data Sets in Cloud.
IEEE Trans. Parallel Distributed Syst., 2013
An evaluation method of outsourcing services for developing an elastic cloud platform.
J. Supercomput., 2013
An efficient quasi-identifier index based approach for privacy preservation over incremental data sets on cloud.
J. Comput. Syst. Sci., 2013
CCBKE - Session key negotiation for fast and secure scheduling of scientific applications in cloud computing.
Future Gener. Comput. Syst., 2013
SaC-FRAPP: a scalable and cost-effective framework for privacy preservation over big data on cloud.
Concurr. Comput. Pract. Exp., 2013
Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurr. Comput. Pract. Exp., 2013
Combining Top-Down and Bottom-Up: Scalable Sub-tree Anonymization over Big Data Using MapReduce on Cloud.
Proceedings of the 12th IEEE International Conference on Trust, 2013
An Iterative Hierarchical Key Exchange Scheme for Secure Scheduling of Big Data Applications in Cloud Computing.
Proceedings of the 12th IEEE International Conference on Trust, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013
A MapReduce Based Approach of Scalable Multidimensional Anonymization for Big Data Privacy Preservation on Cloud.
Proceedings of the 2013 International Conference on Cloud and Green Computing, Karlsruhe, Germany, September 30, 2013
2012
A Collaborative QoS-Aware Service Evaluation Method Among Multi-Users for a Shared Service.
Int. J. Web Serv. Res., 2012
A QoS-aware composition method supporting cross-platform service invocation in cloud environment.
J. Comput. Syst. Sci., 2012
An Association Probability Based Noise Generation Strategy for Privacy Protection in Cloud Computing.
Proceedings of the Service-Oriented Computing - 10th International Conference, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012
2011
A data-operation model based on partial vector space for batch processing in workflow.
Concurr. Comput. Pract. Exp., 2011
Proceedings of the IEEE International Conference on Web Services, 2011
An Upper-Bound Control Approach for Cost-Effective Privacy Protection of Intermediate Dataset Storage in Cloud.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
An Authenticated Key Exchange Scheme for Efficient Security-Aware Scheduling of Scientific Applications in Cloud Computing.
Proceedings of the IEEE Ninth International Conference on Dependable, 2011
2010
Preference-Aware QoS Evaluation for Cloud Web Service Composition Based on Artificial Neural Networks.
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Proceedings of the Web Information Systems and Mining - International Conference, 2010
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010
2009
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2009