Collective data-sanitization for preventing sensitive information inference attacks in social networks Z Cai, Z He, X Guan, Y Li IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016 | 266 | 2016 |
Cost-efficient strategies for restraining rumor spreading in mobile social networks Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016 | 179 | 2016 |
Approximate aggregation for tracking quantiles and range countings in wireless sensor networks Z He, Z Cai, S Cheng, X Wang Theoretical Computer Science 607, 381-390, 2015 | 122 | 2015 |
Latent-data privacy preserving with customized data utility for social network data Z He, Z Cai, J Yu IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017 | 120 | 2017 |
Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks Z He, Z Cai, X Wang 2015 IEEE 35Th international conference on distributed computing systems …, 2015 | 97 | 2015 |
Trading private range counting over big IoT data Z Cai, Z He 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 62 | 2019 |
An energy efficient privacy-preserving content sharing scheme in mobile social networks Z He, Z Cai, Q Han, W Tong, L Sun, Y Li Personal and Ubiquitous Computing 20 (5), 833-846, 2016 | 60 | 2016 |
Customized privacy preserving for inherent data and latent data Z He, Z Cai, Y Sun, Y Li, X Cheng Personal and Ubiquitous Computing 21 (1), 43-54, 2017 | 30 | 2017 |
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks XM Wang, ZB He, XQ Zhao, C Lin, Y Pan, ZP Cai Science China Information Sciences 56 (9), 1-18, 2013 | 26 | 2013 |
Approximate aggregation for tracking quantiles in wireless sensor networks Z He, Z Cai, S Cheng, X Wang International Conference on Combinatorial Optimization and Applications, 161-172, 2014 | 22 | 2014 |
User social activity-based routing for cognitive radio networks J Lu, Z Cai, X Wang, L Zhang, P Li, Z He Personal and Ubiquitous Computing 22 (3), 471-487, 2018 | 19 | 2018 |
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks X Wang, Z He, L Zhang Chin. J. Electron 23 (4), 810-815, 2014 | 13 | 2014 |
Customized privacy preserving for classification based applications Z He, Z Cai, Y Li Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 37-42, 2016 | 11 | 2016 |
Inference attacks and controls on genotypes and phenotypes for individual genomic data Z He, J Yu, J Li, Q Han, G Luo, Y Li IEEE/ACM transactions on computational biology and bioinformatics, 2018 | 9 | 2018 |
Differentially private recommendation system based on community detection in social network applications G Li, Z Cai, G Yin, Z He, M Siddula Security and Communication Networks 2018, 2018 | 8 | 2018 |
Primary and secondary social activity aware routing for cognitive radio networks J Lu, Z Cai, X Wang, L Zhang, P Li, Z He 2016 international conference on identification, information and knowledge …, 2016 | 6 | 2016 |
A task recommendation model for mobile crowdsourcing systems based on dwell-time Y Wang, X Tong, Z He, Y Gao, K Wang 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud …, 2016 | 6 | 2016 |
Differential privacy preserving genomic data releasing via factor graph Z He, Y Li, J Wang International Symposium on Bioinformatics Research and Applications, 350-355, 2017 | 5 | 2017 |
Addressing the threats of inference attacks on traits and genotypes from individual genomic data Z He, Y Li, J Li, J Yu, H Gao, J Wang International Symposium on Bioinformatics Research and Applications, 223-233, 2017 | 5 | 2017 |
A spatial-temporal model for the malware propagation in MWSNs based on the reaction-diffusion equations Z He, X Wang International Conference on Web-Age Information Management, 45-56, 2012 | 4 | 2012 |