The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

LiWu Chang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. LiWu Chang, Ira S. Moskowitz
    An Integrated Framework for Database Privacy Protection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2000, pp:161-172 [Conf]
  2. LiWu Chang, Ira S. Moskowitz
    A Study of Inference Problems in Distributed Databases. [Citation Graph (0, 0)][DBLP]
    DBSec, 2002, pp:191-204 [Conf]
  3. LiWu Chang, Ira S. Moskowitz
    Bayesian Methods to the Database Inference Problem. [Citation Graph (0, 0)][DBLP]
    DBSec, 1998, pp:237-251 [Conf]
  4. Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon
    Randomly roving agents for intrusion detection. [Citation Graph (0, 0)][DBLP]
    DBSec, 2001, pp:135-149 [Conf]
  5. Justin Z. Zhan, LiWu Chang, Stan Matwin
    Privacy-Preserving Multi-Party Decision Tree Induction. [Citation Graph (0, 0)][DBLP]
    DBSec, 2004, pp:341-355 [Conf]
  6. Justin Z. Zhan, Stan Matwin, LiWu Chang
    Privacy-Preserving Collaborative Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    DBSec, 2005, pp:153-165 [Conf]
  7. Justin Z. Zhan, LiWu Chang, Stan Matwin
    Bayesian Network Induction With Incomplete Private Data. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1119-1124 [Conf]
  8. Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, LiWu Chang
    Privacy-Preserving Collaborative Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    ICEB, 2004, pp:1172-1178 [Conf]
  9. LiWu Chang, Ira S. Moskowitz
    Critical analysis of security in voice hiding techniques. [Citation Graph (0, 0)][DBLP]
    ICICS, 1997, pp:203-216 [Conf]
  10. James Tracy, LiWu Chang, Ira S. Moskowitz
    An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2002, pp:413-0 [Conf]
  11. Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang
    UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion Detection. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:743-750 [Conf]
  12. Thiago Quirino, Zongxing Xie, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang
    Collateral Representative Subspace Projection Modeling for Supervised Classification. [Citation Graph (0, 0)][DBLP]
    ICTAI, 2006, pp:98-105 [Conf]
  13. Ira S. Moskowitz, LiWu Chang
    An Entropy-Based Framework for Database Inference. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 1999, pp:405-418 [Conf]
  14. Richard E. Newman, Ira S. Moskowitz, LiWu Chang, Murali M. Brahmadesam
    A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2002, pp:258-277 [Conf]
  15. Mei-Ling Shyu, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang
    Handling missing values via decomposition of the conditioned set. [Citation Graph (0, 0)][DBLP]
    IRI, 2005, pp:199-204 [Conf]
  16. Justin Z. Zhan, Stan Matwin, LiWu Chang
    Private Mining of Association Rules. [Citation Graph (0, 0)][DBLP]
    ISI, 2005, pp:72-80 [Conf]
  17. LiWu Chang, Ira S. Moskowitz
    Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. [Citation Graph (0, 0)][DBLP]
    Workshop on New Security Paradigms, 1998, pp:82-89 [Conf]
  18. Mei-Ling Shyu, Kanoksri Sarinnapakorn, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang, Thomas Goldring
    Handling Nominal Features in Anomaly Intrusion Detection Problems. [Citation Graph (0, 0)][DBLP]
    RIDE, 2005, pp:55-62 [Conf]
  19. Zongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang
    A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. [Citation Graph (0, 0)][DBLP]
    SUTC (1), 2006, pp:446-453 [Conf]
  20. Emmanuel D. Pontikakis, Yannis Theodoridis, Achilleas A. Tsitsonis, LiWu Chang, Vassilios S. Verykios
    A quantitative and qualitative ANALYSIS of blocking in association rule hiding. [Citation Graph (0, 0)][DBLP]
    WPES, 2004, pp:29-30 [Conf]
  21. Justin Z. Zhan, LiWu Chang, Stan Matwin
    Building k-nearest neighbor classifiers on vertically partitioned private data. [Citation Graph (0, 0)][DBLP]
    GrC, 2005, pp:708-711 [Conf]
  22. James Tracy, LiWu Chang, Ira S. Moskowitz
    An Agent-Based Approach to Inference Prevention in Distributed Database Systems. [Citation Graph (0, 0)][DBLP]
    International Journal on Artificial Intelligence Tools, 2003, v:12, n:3, pp:297-313 [Journal]
  23. Vassilios S. Verykios, Emmanuel D. Pontikakis, Yannis Theodoridis, LiWu Chang
    Efficient algorithms for distortion and blocking techniques in association rule hiding. [Citation Graph (0, 0)][DBLP]
    Distributed and Parallel Databases, 2007, v:22, n:1, pp:85-104 [Journal]
  24. Mei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang
    Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. [Citation Graph (0, 0)][DBLP]
    TAAS, 2007, v:2, n:3, pp:- [Journal]
  25. Justin Zhan, Stan Matwin, LiWu Chang
    Privacy-preserving collaborative association rule mining. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1216-1227 [Journal]

Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002