Zaobo He
Zaobo He
Jinan University (暨南大学)
Geverifieerd e-mailadres voor jnu.edu.cn - Homepage
Titel
Geciteerd door
Geciteerd door
Jaar
Collective data-sanitization for preventing sensitive information inference attacks in social networks
Z Cai, Z He, X Guan, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016
3212016
Cost-efficient strategies for restraining rumor spreading in mobile social networks
Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li
IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016
1982016
Latent-data privacy preserving with customized data utility for social network data
Z He, Z Cai, J Yu
IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017
1382017
Approximate aggregation for tracking quantiles and range countings in wireless sensor networks
Z He, Z Cai, S Cheng, X Wang
Theoretical Computer Science 607, 381-390, 2015
1292015
Trading private range counting over big IoT data
Z Cai, Z He
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
1072019
Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks
Z He, Z Cai, X Wang
2015 IEEE 35Th international conference on distributed computing systems …, 2015
1002015
An energy efficient privacy-preserving content sharing scheme in mobile social networks
Z He, Z Cai, Q Han, W Tong, L Sun, Y Li
Personal and Ubiquitous Computing 20 (5), 833-846, 2016
682016
Customized privacy preserving for inherent data and latent data
Z He, Z Cai, Y Sun, Y Li, X Cheng
Personal and Ubiquitous Computing 21 (1), 43-54, 2017
312017
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks
XM Wang, ZB He, XQ Zhao, C Lin, Y Pan, ZP Cai
Science China Information Sciences 56 (9), 1-18, 2013
272013
Approximate aggregation for tracking quantiles in wireless sensor networks
Z He, Z Cai, S Cheng, X Wang
International Conference on Combinatorial Optimization and Applications, 161-172, 2014
222014
User social activity-based routing for cognitive radio networks
J Lu, Z Cai, X Wang, L Zhang, P Li, Z He
Personal and Ubiquitous Computing 22 (3), 471-487, 2018
202018
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks
X Wang, Z He, L Zhang
Chin. J. Electron 23 (4), 810-815, 2014
132014
Customized privacy preserving for classification based applications
Z He, Z Cai, Y Li
Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 37-42, 2016
112016
Differentially private recommendation system based on community detection in social network applications
G Li, Z Cai, G Yin, Z He, M Siddula
Security and Communication Networks 2018, 2018
92018
Inference attacks and controls on genotypes and phenotypes for individual genomic data
Z He, J Yu, J Li, Q Han, G Luo, Y Li
IEEE/ACM transactions on computational biology and bioinformatics 17 (3 …, 2018
92018
Primary and secondary social activity aware routing for cognitive radio networks
J Lu, Z Cai, X Wang, L Zhang, P Li, Z He
2016 international conference on identification, information and knowledge …, 2016
62016
A task recommendation model for mobile crowdsourcing systems based on dwell-time
Y Wang, X Tong, Z He, Y Gao, K Wang
2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016
62016
Addressing the threats of inference attacks on traits and genotypes from individual genomic data
Z He, Y Li, J Li, J Yu, H Gao, J Wang
International Symposium on Bioinformatics Research and Applications, 223-233, 2017
52017
Differential privacy preserving genomic data releasing via factor graph
Z He, Y Li, J Wang
International Symposium on Bioinformatics Research and Applications, 350-355, 2017
52017
Achieving differential privacy of genomic data releasing via belief propagation
Z He, Y Li, J Li, K Li, Q Cai, Y Liang
Tsinghua Science and Technology 23 (4), 389-395, 2018
42018
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20