Aggregate query answering on anonymized tables Q Zhang, N Koudas, D Srivastava, T Yu 2007 IEEE 23rd international conference on data engineering, 116-125, 2007 | 501 | 2007 |
Anonymizing bipartite graph data using safe groupings G Cormode, D Srivastava, T Yu, Q Zhang Proceedings of the VLDB Endowment 1 (1), 833-844, 2008 | 216 | 2008 |
A framework for identifying compromised nodes in wireless sensor networks Q Zhang, T Yu, P Ning ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-37, 2008 | 91 | 2008 |
Anonymizing bipartite graph data using safe groupings G Cormode, D Srivastava, T Yu, Q Zhang the VLDB Journal 19 (1), 115-139, 2010 | 83 | 2010 |
A Classification Scheme for Trust Functions in Reputation-Based Trust Management. Q Zhang, T Yu, K Irwin Trust@ ISWC, 2004 | 77 | 2004 |
A framework for identifying compromised nodes in sensor networks Q Zhang, T Yu, P Ning 2006 Securecomm and Workshops, 1-10, 2006 | 51 | 2006 |
Systems and associated computer program products that disguise partitioned data structures using transformations having targeted distributions D Srivastava, N Koudas, T Yu, Q Zhang US Patent 8,209,342, 2012 | 32 | 2012 |
Method and apparatus for providing anonymization of data G Cormode, D Srivastava, T Yu, Q Zhang US Patent 8,590,049, 2013 | 24 | 2013 |
On the modeling of honest players in reputation systems Q Zhang, W Wei, T Yu Journal of Computer Science and Technology 24 (5), 808-819, 2009 | 18 | 2009 |
Distribution based microdata anonymization N Koudas, D Srivastava, T Yu, Q Zhang Proceedings of the VLDB Endowment 2 (1), 958-969, 2009 | 14 | 2009 |
Aggregate query answering on anonymized tables N Koudas, D Srivastava, T Yu, Q Zhang North Carolina State University. Dept. of Computer Science, 2006 | 4 | 2006 |
Microdata privacy protection through permutation-based approaches Q Zhang North Carolina State University, 2008 | 2 | 2008 |
Database Systems and Theory-Article 10 (25 pages)-Continuous Sampling from Distributed Streams G Cormode, S Muthukrishnan, K Yi, Q Zhang Journal of the ACM-Association for ComputingMachinery 59 (2), 2012 | | 2012 |