Information security in big data: privacy and data mining L Xu, C Jiang, J Wang, J Yuan, Y Ren Ieee Access 2, 1149-1176, 2014 | 812 | 2014 |
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks K Gai, Y Wu, L Zhu, L Xu, Y Zhang IEEE Internet of Things Journal 6 (5), 7992-8004, 2019 | 407 | 2019 |
Privacy or utility in data collection? A contract theoretic approach L Xu, C Jiang, Y Chen, Y Ren, KJR Liu IEEE Journal of Selected Topics in Signal Processing 9 (7), 1256-1269, 2015 | 116 | 2015 |
Energy efficient D2D communications: A perspective of mechanism design L Xu, C Jiang, Y Shen, TQS Quek, Z Han, Y Ren IEEE Transactions on Wireless Communications 15 (11), 7272-7285, 2016 | 70 | 2016 |
A framework for categorizing and applying privacy-preservation techniques in big data mining L Xu, C Jiang, Y Chen, J Wang, Y Ren Computer 49 (2), 54-62, 2016 | 67 | 2016 |
Trust-based collaborative privacy management in online social networks L Xu, C Jiang, N He, Z Han, A Benslimane IEEE Transactions on Information Forensics and Security 14 (1), 48-60, 2018 | 65 | 2018 |
Distributed data privacy preservation in IoT applications J Du, C Jiang, E Gelenbe, L Xu, J Li, Y Ren IEEE Wireless Communications 25 (6), 68-76, 2018 | 64 | 2018 |
Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards L Xu, C Jiang, Y Qian, Y Zhao, J Li, Y Ren IEEE Transactions on Information Forensics and Security 12 (2), 271-285, 2016 | 60 | 2016 |
Blockchain-based multimedia sharing in vehicular social networks with privacy protection K Shi, L Zhu, C Zhang, L Xu, F Gao Multimedia Tools and Applications 79, 8085-8105, 2020 | 43 | 2020 |
User participation in collaborative filtering-based recommendation systems: A game theoretic approach L Xu, C Jiang, Y Chen, Y Ren, KJR Liu IEEE transactions on cybernetics 49 (4), 1339-1352, 2018 | 41 | 2018 |
Trust-based privacy-preserving photo sharing in online social networks L Xu, T Bao, L Zhu, Y Zhang IEEE Transactions on Multimedia 21 (3), 591-602, 2018 | 31 | 2018 |
Microblog dimensionality reduction—a deep learning approach L Xu, C Jiang, Y Ren, HH Chen IEEE Transactions on Knowledge and Data Engineering 28 (7), 1779-1789, 2016 | 30 | 2016 |
Graph-based ajax crawl: Mining data from rich internet applications Z Peng, N He, C Jiang, Z Li, L Xu, Y Li, Y Ren 2012 International Conference on Computer Science and Electronics …, 2012 | 28 | 2012 |
A blockchain based access control scheme with hidden policy and attribute N Wu, L Xu, L Zhu Future Generation Computer Systems 141, 186-196, 2023 | 27 | 2023 |
User association in heterogeneous networks: A social interaction approach Y Meng, C Jiang, L Xu, Y Ren, Z Han IEEE Transactions on Vehicular Technology 65 (12), 9982-9993, 2016 | 27 | 2016 |
Blockchain-enabled data provenance in cloud datacenter reengineering H Li, K Gai, Z Fang, L Zhu, L Xu, P Jiang Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019 | 24 | 2019 |
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system L Xu, C Jiang, N He, Y Qian, Y Ren, J Li IEEE Internet of Things Journal 5 (5), 4178-4190, 2018 | 24 | 2018 |
Game theoretic data privacy preservation: Equilibrium and pricing L Xu, C Jiang, J Wang, Y Ren, J Yuan, M Guizani 2015 IEEE International Conference on Communications (ICC), 7071-7076, 2015 | 20 | 2015 |
Successive point-of-interest recommendation with personalized local differential privacy T Bao, L Xu, L Zhu, L Wang, T Li IEEE Transactions on Vehicular Technology 70 (10), 10477-10488, 2021 | 18 | 2021 |
Privacy-accuracy trade-off in differentially-private distributed classification: A game theoretical approach L Xu, C Jiang, Y Qian, J Li, Y Zhao, Y Ren IEEE Transactions on Big Data 7 (4), 770-783, 2017 | 18 | 2017 |