Jianneng Cao (曹健能)
Jianneng Cao (曹健能)
Scientist at Institute for Infocomm Research
Email verificata su i2r.a-star.edu.sg
TitoloCitata daAnno
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
Proceedings of the VLDB Endowment 5 (11), 1340-1351, 2012
1362012
Castle: Continuously anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
IEEE Transactions on Dependable and Secure Computing 8 (3), 337-352, 2010
1042010
ρ-uncertainty: inference-proof transaction anonymization
J Cao, P Karras, C Raïssi, KL Tan
Proceedings of the VLDB Endowment 3 (1-2), 1033-1044, 2010
862010
An overview of state-of-the-art partial discharge analysis techniques for condition monitoring
M Wu, H Cao, J Cao, HL Nguyen, JB Gomes, SP Krishnaswamy
IEEE electrical insulation magazine 31 (6), 22-35, 2015
772015
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
J Cao, P Karras, P Kalnis, KL Tan
The VLDB Journal—The International Journal on Very Large Data Bases 20 (1 …, 2011
752011
A framework to enforce access control over data streams
B Carminati, E Ferrari, J Cao, KL Tan
ACM Transactions on Information and System Security (TISSEC) 13 (3), 28, 2010
642010
Publishing microdata with a robust privacy guarantee
J Cao, P Karras
Proceedings of the VLDB Endowment 5 (11), 1388-1399, 2012
592012
Repeat buyer prediction for e-commerce
G Liu, TT Nguyen, G Zhao, W Zha, J Yang, J Cao, M Wu, P Zhao, W Chen
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
492016
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
462016
Efficient and accurate strategies for differentially-private sliding window queries
J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan
Proceedings of the 16th International Conference on Extending Database …, 2013
402013
CASTLE: A delay-constrained scheme for ks-anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
2008 IEEE 24th International Conference on Data Engineering, 1376-1378, 2008
392008
Acstream: Enforcing access control over data streams
J Cao, B Carminati, E Ferrari, KL Tan
2009 IEEE 25th International Conference on Data Engineering, 1495-1498, 2009
312009
Dbmask: Fine-grained access control on encrypted relational databases
MI Sarfraz, M Nabeel, J Cao, E Bertino
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
252015
A hybrid private record linkage scheme: Separating differentially private synopses from matching records
J Cao, FY Rao, E Bertino, M Kantarcioglu
2015 IEEE 31st International Conference on Data Engineering, 1011-1022, 2015
182015
Efficient tree pattern queries on encrypted xml documents
J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu
Proceedings of the Joint EDBT/ICDT 2013 workshops, 111-120, 2013
152013
Integrative dynamic reconfiguration in a parallel stream processing engine
KGS Madsen, Y Zhou, J Cao
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 227-230, 2017
122017
Discrete particle swarm optimization routing protocol for wireless sensor networks with multiple mobile sinks
J Yang, F Liu, J Cao, L Wang
Sensors 16 (7), 1081, 2016
72016
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 16, 2017
42017
Matrix eigen-decomposition via doubly stochastic riemannian optimization
Z Xu, P Zhao, J Cao, X Li
International Conference on Machine Learning, 1660-1669, 2016
42016
Fuzzy trajectory linking
H Wu, M Xue, J Cao, P Karras, WS Ng, KK Koo
2016 IEEE 32nd International Conference on Data Engineering (ICDE), 859-870, 2016
42016
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20