Jianneng Cao (曹健能)
Jianneng Cao (曹健能)
Scientist at Institute for Infocomm Research
Verified email at
Cited by
Cited by
An overview of state-of-the-art partial discharge analysis techniques for condition monitoring
M Wu, H Cao, J Cao, HL Nguyen, JB Gomes, SP Krishnaswamy
IEEE electrical insulation magazine 31 (6), 22-35, 2015
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
arXiv preprint arXiv:1208.0093, 2012
Castle: Continuously anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
IEEE Transactions on Dependable and Secure Computing 8 (3), 337-352, 2010
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
Publishing microdata with a robust privacy guarantee
J Cao, P Karras
arXiv preprint arXiv:1208.0220, 2012
ρ-uncertainty: inference-proof transaction anonymization
J Cao, P Karras, C Raïssi, KL Tan
Proceedings of the VLDB Endowment (PVLDB) 3 (1), 1033-1044, 2010
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
J Cao, P Karras, P Kalnis, KL Tan
The VLDB Journal 20, 59-81, 2011
Repeat buyer prediction for e-commerce
G Liu, TT Nguyen, G Zhao, W Zha, J Yang, J Cao, M Wu, P Zhao, W Chen
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
A framework to enforce access control over data streams
B Carminati, E Ferrari, J Cao, KL Tan
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
Efficient and accurate strategies for differentially-private sliding window queries
J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan
Proceedings of the 16th international conference on extending database …, 2013
CASTLE: A delay-constrained scheme for ks-anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
2008 IEEE 24th International Conference on Data Engineering, 1376-1378, 2008
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017
Dbmask: Fine-grained access control on encrypted relational databases
MI Sarfraz, M Nabeel, J Cao, E Bertino
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
Acstream: Enforcing access control over data streams
J Cao, B Carminati, E Ferrari, KL Tan
2009 IEEE 25th International Conference on Data Engineering, 1495-1498, 2009
A hybrid private record linkage scheme: Separating differentially private synopses from matching records
J Cao, FY Rao, E Bertino, M Kantarcioglu
2015 IEEE 31st International Conference on Data Engineering, 1011-1022, 2015
Integrative dynamic reconfiguration in a parallel stream processing engine
KGS Madsen, Y Zhou, J Cao
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 227-230, 2017
DAG: a general model for privacy-preserving data mining
SG Teo, J Cao, VCS Lee
IEEE Transactions on Knowledge and Data Engineering 32 (1), 40-53, 2018
Efficient tree pattern queries on encrypted xml documents
J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu
Proceedings of the Joint EDBT/ICDT 2013 workshops, 111-120, 2013
PrivPfC: Differentially private data publication for classification
D Su, J Cao, N Li, M Lyu
The VLDB Journal 27, 201-223, 2018
Discrete particle swarm optimization routing protocol for wireless sensor networks with multiple mobile sinks
J Yang, F Liu, J Cao, L Wang
Sensors 16 (7), 1081, 2016
The system can't perform the operation now. Try again later.
Articles 1–20