The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Justin Zhan: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Justin Zhan, Stan Matwin, LiWu Chang
    Privacy-preserving collaborative association rule mining. [Citation Graph (0, 0)][DBLP]
    J. Network and Computer Applications, 2007, v:30, n:3, pp:1216-1227 [Journal]

  2. Importance of Data Standardization in Privacy-Preserving K-Means Clustering. [Citation Graph (, )][DBLP]


  3. Privacy-Preserving Collaborative E-Voting. [Citation Graph (, )][DBLP]


  4. Privacy-Preserving Collaborative Social Networks. [Citation Graph (, )][DBLP]


  5. Privacy-Aware Access Control through Negotiation in Daily Life Service. [Citation Graph (, )][DBLP]


  6. Using Social Networks to Organize Researcher Community. [Citation Graph (, )][DBLP]


  7. Efficient keyword index search over encrypted documents of groups. [Citation Graph (, )][DBLP]


  8. Collaboratively mining sequential patterns over private data. [Citation Graph (, )][DBLP]


  9. Privacy preserving K-Medoids clustering. [Citation Graph (, )][DBLP]


  10. A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing. [Citation Graph (, )][DBLP]


  11. A Verification Scheme for Data Aggregation in Data Mining. [Citation Graph (, )][DBLP]


  12. Secure Similarity Search. [Citation Graph (, )][DBLP]


  13. Measuring Topological Anonymity in Social Networks. [Citation Graph (, )][DBLP]


  14. Improved Customers' Privacy Preference Policy. [Citation Graph (, )][DBLP]


  15. Attribute-based Access Control using Combined Authentication Technologies. [Citation Graph (, )][DBLP]


  16. Towards Real-time Performance of Data Value Hiding for Frequent Data Updates. [Citation Graph (, )][DBLP]


  17. Towards Efficient Privacy-preserving Collaborative Recommender Systems. [Citation Graph (, )][DBLP]


  18. Scalar-product based Secure Two-party Computation. [Citation Graph (, )][DBLP]


  19. Practical Values for Privacy. [Citation Graph (, )][DBLP]


  20. Anomaly Detection in Dynamic Social Systems Using Weak Estimators. [Citation Graph (, )][DBLP]


  21. Computer-Aided Privacy Requirements Elicitation Technique. [Citation Graph (, )][DBLP]


  22. Privacy-Preserving Collaborative Data Mining. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.004secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002