The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Xiaodong Lin: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Alan F. Karr, Xiaodong Lin, Ashish P. Sanil, Jerome P. Reiter
    Regression on Distributed Databases via Secure Multi-Party Computation. [Citation Graph (0, 0)][DBLP]
    DG.O, 2004, pp:- [Conf]
  2. Zonghua Zhang, Pin-Han Ho, Xiaodong Lin, Hong Shen
    Janus: A Two-Sided Analytical Model for Multi-Stage Coordinated Attacks. [Citation Graph (0, 0)][DBLP]
    ICISC, 2006, pp:136-154 [Conf]
  3. Xiaodong Lin, Johnny W. Wong, Weidong Kou
    Performance Analysis of Secure Web Server Based on SSL. [Citation Graph (0, 0)][DBLP]
    ISW, 2000, pp:249-261 [Conf]
  4. Ashish P. Sanil, Alan F. Karr, Xiaodong Lin, Jerome P. Reiter
    Privacy preserving regression modelling via distributed computation. [Citation Graph (0, 0)][DBLP]
    KDD, 2004, pp:677-682 [Conf]
  5. Young Truong, Xiaodong Lin, Chris Beecher
    Learning a complex metabolomic dataset using random forests and support vector machines. [Citation Graph (0, 0)][DBLP]
    KDD, 2004, pp:835-840 [Conf]
  6. Jianping Fan, Hangzai Luo, Xiaodong Lin
    Semantic video classification by integrating flexible mixture model with adaptive EM algorithm. [Citation Graph (0, 0)][DBLP]
    Multimedia Information Retrieval, 2003, pp:9-16 [Conf]
  7. Hao Helen Zhang, Jeongyoun Ahn, Xiaodong Lin, Cheolwoo Park
    Gene selection using support vector machines with non-convex penalty. [Citation Graph (0, 0)][DBLP]
    Bioinformatics, 2006, v:22, n:1, pp:88-95 [Journal]
  8. Xiaodong Lin, Chris Clifton, Michael Y. Zhu
    Privacy-preserving clustering with distributed EM mixture modeling. [Citation Graph (0, 0)][DBLP]
    Knowl. Inf. Syst., 2005, v:8, n:1, pp:68-81 [Journal]
  9. Chris Clifton, Murat Kantarcioglu, Jaideep Vaidya, Xiaodong Lin, Michael Y. Zhu
    Tools for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    SIGKDD Explorations, 2002, v:4, n:2, pp:28-34 [Journal]
  10. Xiaodong Lin, Haojin Zhu, Bin Lin, Pin-Han Ho, Xuemin Shen
    A Novel Voting Mechanism for Compromised Node Revocation in Wireless Ad Hoc Networks. [Citation Graph (0, 0)][DBLP]
    GLOBECOM, 2006, pp:- [Conf]

  11. Secure provenance: the essential of bread and butter of data forensics in cloud computing. [Citation Graph (, )][DBLP]


  12. AEMA: An Aggregated Emergency Message Authentication Scheme for Enhancing the Security of Vehicular Ad Hoc Networks. [Citation Graph (, )][DBLP]


  13. Provably Secure Self-Certified Partially Blind Signature Scheme from Bilinear Pairings. [Citation Graph (, )][DBLP]


  14. AICN: An Efficient Algorithm to Identify Compromised Nodes in Wireless Sensor Network. [Citation Graph (, )][DBLP]


  15. RAISE: An Efficient RSU-Aided Message Authentication Scheme in Vehicular Communication Networks. [Citation Graph (, )][DBLP]


  16. ASRPAKE: An Anonymous Secure Routing Protocol with Authenticated Key Exchange for Wireless Ad Hoc Networks. [Citation Graph (, )][DBLP]


  17. Secure Vehicular Communications Based on Group Signature and ID-Based Signature Scheme. [Citation Graph (, )][DBLP]


  18. Two-Factor Localized Authentication Scheme for WLAN Roaming. [Citation Graph (, )][DBLP]


  19. Active Learning from Data Streams. [Citation Graph (, )][DBLP]


  20. An Efficient Identity-Based Batch Verification Scheme for Vehicular Sensor Networks. [Citation Graph (, )][DBLP]


  21. ECPP: Efficient Conditional Privacy Preservation Protocol for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  22. SPARK: A New VANET-Based Smart Parking Scheme for Large Parking Lots. [Citation Graph (, )][DBLP]


  23. An Opportunistic Batch Bundle Authentication Scheme for Energy Constrained DTNs. [Citation Graph (, )][DBLP]


  24. SPRING: A Social-based Privacy-preserving Packet Forwarding Protocol for Vehicular Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  25. A model-based semi-quantitative approach for evaluating security of enterprise networks. [Citation Graph (, )][DBLP]


  26. Performance Enhancement for Secure Vehicular Communications. [Citation Graph (, )][DBLP]


  27. Secure Localized Authentication and Billing for Wireless Mesh Networks. [Citation Graph (, )][DBLP]


  28. BBA: An Efficient Batch Bundle Authentication Scheme for Delay Tolerant Networks. [Citation Graph (, )][DBLP]


  29. CAT: Building Couples to Early Detect Node Compromise Attack in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  30. A Group-Based Key Management Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


  31. A New Dynamic Group Key Management Scheme with Low Rekeying Cost. [Citation Graph (, )][DBLP]


  32. RADAR: A ReputAtion-Based Scheme for Detecting Anomalous Nodes in WiReless Mesh Networks. [Citation Graph (, )][DBLP]


  33. A Novel Fair Incentive Protocol for Mobile Ad Hoc Networks. [Citation Graph (, )][DBLP]


Search in 0.002secs, Finished in 0.003secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002