Zhiyuan Chen

Orcid: 0000-0002-6984-7248

Affiliations:
  • University of Maryland, Department of Computer Information Systems, Baltimore, USA
  • Cornell University, Ithaca, NY, USA (PhD 2002)


According to our database1, Zhiyuan Chen authored at least 62 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Cluster-Based Joins for Federated SPARQL Queries.
IEEE Trans. Knowl. Data Eng., April, 2023

A Self-adaptive and Secure Approach to Share Network Trace Data.
DTRAP, 2023

2022
Using Randomness to Improve Robustness of Tree-Based Models Against Evasion Attacks.
IEEE Trans. Knowl. Data Eng., 2022

MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model.
ACM Trans. Manag. Inf. Syst., 2021

Anonymization of Network Traces Data through Condensation-based Differential Privacy.
DTRAP, 2021

Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2021

2020
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization.
Int. J. Inf. Secur. Priv., 2020

Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams.
Proceedings of the 32nd IEEE International Conference on Tools with Artificial Intelligence, 2020

RDFINT: A Benchmark for Comparing Data Warehouse with Virtual Integration Approaches for Integration of RDF Data.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting.
Proceedings of the 2020 IEEE International Conference on Services Computing, 2020

2019
A Comparative Study of Data Cleaning Tools.
Int. J. Data Warehous. Min., 2019

A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data.
CoRR, 2019

Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning.
CoRR, 2019

Cluster-Based Join for Geographically Distributed Big RDF Data.
Proceedings of the 2019 IEEE International Congress on Big Data, 2019

Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue.
Proceedings of the 2019 IEEE International Conference on Services Computing, 2019

2018
Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks.
CoRR, 2018

Analyzing attack strategies against rule-based intrusion detection systems.
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018

2017
Target-Based, Privacy Preserving, and Incremental Association Rule Mining.
IEEE Trans. Serv. Comput., 2017

A comparison of big data application programming approaches: A travel companion case study.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level.
Int. J. Inf. Secur. Priv., 2016

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Using Transfer Learning to Identify Privacy Leaks in Tweets.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Analyzing and retrieving illicit drug-related posts from social media.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2014
Dynamic Query Forms for Database Queries.
IEEE Trans. Knowl. Data Eng., 2014

A data recipient centered de-identification method to retain statistical attributes.
J. Biomed. Informatics, 2014

A generic and distributed privacy preserving classification method with a worst-case privacy guarantee.
Distributed Parallel Databases, 2014

2013
A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior.
IEEE Trans. Knowl. Data Eng., 2013

Stock Trend Prediction by Classifying Aggregative Web Topic-Opinion.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Co-anomaly Event Detection in Multiple Temperature Series.
Proceedings of the Knowledge Science, Engineering and Management, 2013

2012
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification.
Int. J. Inf. Secur. Priv., 2012

2011
Discrete wavelet transform-based time series analysis and mining.
ACM Comput. Surv., 2011

Target-based privacy preserving association rule mining.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

2010
A privacy protection technique for publishing data mining models and research data.
ACM Trans. Manag. Inf. Syst., 2010

A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining.
Int. J. Comput. Model. Algorithms Medicine, 2010

Privacy preserving linear discriminant analysis from perturbed data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

2009
Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts.
J. Data Semant., 2009

Preserving Privacy in Mining Quantitative Associations Rules.
Int. J. Inf. Secur. Priv., 2009

Addressing Diverse User Preferences: A Framework for Query Results Navigation.
IEEE Data Eng. Bull., 2009

Searching for relevant software change artifacts using semantic networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A tree-based approach to preserve the privacy of software engineering data and predictive models.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009

2008
Dynamic active probing of helpdesk databases.
Proc. VLDB Endow., 2008

A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes.
Int. J. Inf. Secur. Priv., 2008

A fuzzy programming approach for data reduction and privacy in distance-based mining.
Int. J. Inf. Comput. Secur., 2008

Measuring interestingness of discovered skewed patterns in data cubes.
Decis. Support Syst., 2008

A privacy preserving technique for distance-based classification with worst case privacy guarantees.
Data Knowl. Eng., 2008

2007
Semantic Integration and Knowledge Discovery for Environmental Research.
J. Database Manag., 2007

Semantic integration of government data for water quality management.
Gov. Inf. Q., 2007

Index structures for matching XML twigs using relational query processors.
Data Knowl. Eng., 2007

Addressing diverse user preferences in SQL-query-result navigation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

2006
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms.
VLDB J., 2006

Navigation Rules for Exploring Large Multidimensional Data Cubes.
Int. J. Data Warehous. Min., 2006

Personalization and visualization on handheld devices.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

2005
Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs.
IEEE Trans. Knowl. Data Eng., 2005

2003
Generalized substring selectivity estimation.
J. Comput. Syst. Sci., 2003

2002
Building Compressed Database Systems.
PhD thesis, 2002

2001
Query Optimization In Compressed Database Systems.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Counting Twig Matches in a Tree.
Proceedings of the 17th International Conference on Data Engineering, 2001

2000
Selectivity Estimation for Boolean Queries.
Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2000

An Algebraic Compression Framework for Query Results.
Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28, 2000

1999
The Cornell Jaguar System: Adding Mobility to PREDATOR.
Proceedings of the SIGMOD 1999, 1999


  Loading...