Top-k query processing on encrypted databases with strong security guarantees X Meng, H Zhu, G Kollios 2018 IEEE 34th International Conference on Data Engineering (ICDE), 353-364, 2018 | 36 | 2018 |
Privacy preserving similarity evaluation of time series data. H Zhu, X Meng, G Kollios EDBT 2014, 499-510, 2014 | 33 | 2014 |
Mining trajectory corridors using Fréchet distance and meshing grids H Zhu, J Luo, H Yin, X Zhou, JZ Huang, FB Zhan Advances in Knowledge Discovery and Data Mining: 14th Pacific-Asia …, 2010 | 29 | 2010 |
Peak-detection algorithm in the demodulation for the fiber bragg grating sensor system Z Haohan, Q Haikun, Z Min J. Chinese Journal of Lasers 35 (6), 893-897, 2008 | 20 | 2008 |
A generic framework for efficient and effective subsequence retrieval H Zhu, G Kollios, V Athitsos arXiv preprint arXiv:1208.0286, 2012 | 15 | 2012 |
NED: an inter-graph node metric based on edit distance H Zhu, X Meng, G Kollios arXiv preprint arXiv:1602.02358, 2016 | 10 | 2016 |
Secure top-k query processing on encrypted databases X Meng, H Zhu, G Kollios CoRR, abs/1510.05175, 2015 | 2 | 2015 |
NED: An inter-graph node metric on edit distance H Zhu, X Meng, G Kollios CoRR, abs/1602.02358, 2016 | 1 | 2016 |
Sequence queries on temporal graphs H Zhu Boston University, 2016 | | 2016 |