The SCEAS System
Navigation Menu

Search the dblp DataBase


Nan Zhang 0004: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Nan Zhang 0004, Wei Zhao, Jianer Chen
    Cardinality-based inference control in OLAP systems: an information theoretic approach. [Citation Graph (0, 0)][DBLP]
    DOLAP, 2004, pp:59-64 [Conf]
  2. Nan Zhang 0004, Shengquan Wang, Wei Zhao
    A new scheme on privacy-preserving data classification. [Citation Graph (0, 0)][DBLP]
    KDD, 2005, pp:374-383 [Conf]
  3. Nan Zhang 0004, Wei Zhao, Jianer Chen
    Performance Measurements for Privacy Preserving Data Mining. [Citation Graph (0, 0)][DBLP]
    PAKDD, 2005, pp:43-49 [Conf]
  4. Nan Zhang 0004, Shengquan Wang, Wei Zhao
    A New Scheme on Privacy Preserving Association Rule Mining. [Citation Graph (0, 0)][DBLP]
    PKDD, 2004, pp:484-495 [Conf]
  5. Nan Zhang 0004, Wei Zhao
    Distributed Privacy Preserving Information Sharing. [Citation Graph (0, 0)][DBLP]
    VLDB, 2005, pp:889-900 [Conf]
  6. Wei Yu, Nan Zhang 0004, Wei Zhao
    Self-adaptive Worms and Countermeasures. [Citation Graph (0, 0)][DBLP]
    SSS, 2006, pp:548-562 [Conf]

  7. On localization attacks to Internet Threat Monitors: An information-theoretic framework. [Citation Graph (, )][DBLP]

  8. Turbo-charging hidden database samplers with overflowing queries and skew reduction. [Citation Graph (, )][DBLP]

  9. Algorithm-safe privacy-preserving data publishing. [Citation Graph (, )][DBLP]

  10. The Digital Marauder's Map: A New Threat to Location Privacy. [Citation Graph (, )][DBLP]

  11. CAP: A Context-Aware Privacy Protection System for Location-Based Services. [Citation Graph (, )][DBLP]

  12. 3DLoc: Three Dimensional Wireless Localization Toolkit. [Citation Graph (, )][DBLP]

  13. Leveraging COUNT Information in Sampling Hidden Databases. [Citation Graph (, )][DBLP]

  14. Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. [Citation Graph (, )][DBLP]

  15. Versatile publishing for privacy preservation. [Citation Graph (, )][DBLP]

  16. Privacy preservation of aggregates in hidden databases: why and how? [Citation Graph (, )][DBLP]

  17. HDSampler: revealing data behind web form interfaces. [Citation Graph (, )][DBLP]

  18. Unbiased estimation of size and other aggregates over hidden web databases. [Citation Graph (, )][DBLP]

  19. Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services. [Citation Graph (, )][DBLP]

  20. Privacy risks in health databases from aggregate disclosure. [Citation Graph (, )][DBLP]

  21. Time-Bounded Essential Localization for Wireless Sensor Networks. [Citation Graph (, )][DBLP]

  22. Privacy preservation in wireless sensor networks: A state-of-the-art survey. [Citation Graph (, )][DBLP]

  23. Privacy-Preserving Data Mining Systems. [Citation Graph (, )][DBLP]

Search in 0.002secs, Finished in 0.003secs
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
System created by [] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002