|
Search the dblp DataBase
Xiaodong Lin:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerome P. Reiter
Regression on Distributed Databases via Secure Multi-Party Computation. [Citation Graph (0, 0)][DBLP] DG.O, 2004, pp:- [Conf]
- Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. [Citation Graph (0, 0)][DBLP] ICISC, 2006, pp:136-154 [Conf]
- Xiaodong Lin, Johnny W. Wong, Weidong Kou
Performance Analysis of Secure Web Server Based on SSL. [Citation Graph (0, 0)][DBLP] ISW, 2000, pp:249-261 [Conf]
- Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerome P. Reiter
Privacy preserving regression modelling via distributed computation. [Citation Graph (0, 0)][DBLP] KDD, 2004, pp:677-682 [Conf]
- Young Truong, Xiaodong Lin, Chris Beecher
Learning a complex metabolomic dataset using random forests and support vector machines. [Citation Graph (0, 0)][DBLP] KDD, 2004, pp:835-840 [Conf]
- Jianping Fan, Hangzai Luo, Xiaodong Lin
Semantic video classification by integrating flexible mixture model with adaptive EM algorithm. [Citation Graph (0, 0)][DBLP] Multimedia Information Retrieval, 2003, pp:9-16 [Conf]
- Hao Helen Zhang, Jeongyoun Ahn, Xiaodong Lin, Cheolwoo Park
Gene selection using support vector machines with non-convex penalty. [Citation Graph (0, 0)][DBLP] Bioinformatics, 2006, v:22, n:1, pp:88-95 [Journal]
- Xiaodong Lin, Chris Clifton, Michael Y. Zhu
Privacy-preserving clustering with distributed EM mixture modeling. [Citation Graph (0, 0)][DBLP] Knowl. Inf. Syst., 2005, v:8, n:1, pp:68-81 [Journal]
- Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu
Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP] SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal]
- Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen
A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP] GLOBECOM, 2006, pp:- [Conf]
Secure provenance: the essential of bread and butter of data forensics in cloud computing. [Citation Graph (, )][DBLP]
AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]
Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]
AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]
RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. [Citation Graph (, )][DBLP]
ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]
Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. [Citation Graph (, )][DBLP]
Two-Factor Localized Authentication Scheme for WLAN Roaming. [Citation Graph (, )][DBLP]
Active Learning from Data Streams. [Citation Graph (, )][DBLP]
An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]
ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]
SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. [Citation Graph (, )][DBLP]
An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]
SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]
A model-based semi-quantitative approach for evaluating security of enterprise networks. [Citation Graph (, )][DBLP]
Performance Enhancement for Secure Vehicular Communications. [Citation Graph (, )][DBLP]
Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]
BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]
CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]
A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]
RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. [Citation Graph (, )][DBLP]
A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.003secs
|