|
Search the dblp DataBase
Xiaojun Ye:
[Publications]
[Author Rank by year]
[Co-authors]
[Prefers]
[Cites]
[Cited by]
Publications of Author
- Zude Li, Guoqiang Zhan, Xiaojun Ye
Resource Management Continuity With Constraint Inheritance Relation. [Citation Graph (0, 0)][DBLP] ARES, 2006, pp:609-616 [Conf]
- Zude Li, Guoqiang Zhan, Xiaojun Ye
Towards a More Reasonable Generalization Cost Metric for K-Anonymization. [Citation Graph (0, 0)][DBLP] BNCOD, 2006, pp:258-261 [Conf]
- Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
Privacy Preservation and Protection by Extending Generalized Partial Indices. [Citation Graph (0, 0)][DBLP] BNCOD, 2006, pp:102-114 [Conf]
- Zude Li, Guoqiang Zhan, Xiaojun Ye
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules. [Citation Graph (0, 0)][DBLP] DEXA, 2006, pp:883-893 [Conf]
- Min Wu, Xiaojun Ye
Towards the Diversity of Sensitive Attributes in k-Anonymity. [Citation Graph (0, 0)][DBLP] IAT Workshops, 2006, pp:98-104 [Conf]
- Guoqiang Zhan, Zude Li, Xiaojun Ye, Jianmin Wang
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy. [Citation Graph (0, 0)][DBLP] TrustBus, 2006, pp:132-141 [Conf]
- Zude Li, Guoqiang Zhan, Xiaojun Ye
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection. [Citation Graph (0, 0)][DBLP] WAIM, 2006, pp:193-204 [Conf]
- Fei Guo, Jianmin Wang, Zhihao Zhang, Xiaojun Ye, Deyi Li
An Improved Algorithm to Watermark Numeric Relational Data. [Citation Graph (0, 0)][DBLP] WISA, 2005, pp:138-149 [Conf]
- Zude Li, Xiaojun Ye
Towards a dynamic multi-policy dissemination control model: (DMDCON). [Citation Graph (0, 0)][DBLP] SIGMOD Record, 2006, v:35, n:1, pp:33-38 [Journal]
- Xiaojun Ye, Zude Li, Yongnian Li
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic. [Citation Graph (0, 0)][DBLP] DASFAA, 2007, pp:676-687 [Conf]
- Zhen Li, Xiaojun Ye
Privacy Protection on Multiple Sensitive Attributes. [Citation Graph (0, 0)][DBLP] ICICS, 2007, pp:141-152 [Conf]
- Hua Zhu, Xiaojun Ye
Achieving k -Anonymity Via a Density-Based Clustering Method. [Citation Graph (0, 0)][DBLP] APWeb/WAIM, 2007, pp:745-752 [Conf]
A Practical Database Intrusion Detection System Framework. [Citation Graph (, )][DBLP]
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets. [Citation Graph (, )][DBLP]
Synthesizing: Art of Anonymization. [Citation Graph (, )][DBLP]
A Configurable Web Service Performance Testing Framework. [Citation Graph (, )][DBLP]
An Extensible Data Model with Security Support for Dataspace Management. [Citation Graph (, )][DBLP]
Trust and Privacy in Dissemination Control. [Citation Graph (, )][DBLP]
Secure Dataspace with Access Policies. [Citation Graph (, )][DBLP]
Dynamic Purpose-Based Access Control. [Citation Graph (, )][DBLP]
Towards workflow-driven database system workload modeling. [Citation Graph (, )][DBLP]
A Personalized (a, k)-Anonymity Model. [Citation Graph (, )][DBLP]
Risk & Distortion Based K-Anonymity. [Citation Graph (, )][DBLP]
An Improved Weighted-Feature Clustering Algorithm for K-anonymity. [Citation Graph (, )][DBLP]
A Multi-Dimensional K-Anonymity Model for Hierarchical Data. [Citation Graph (, )][DBLP]
An Approach of Performance Evaluation in Authentic Database Applications. [Citation Graph (, )][DBLP]
Search in 0.002secs, Finished in 0.002secs
|