关注
Jianneng Cao (曹健能)
Jianneng Cao (曹健能)
Bank Jago
在 tech.jago.com 的电子邮件经过验证
标题
引用次数
引用次数
年份
An overview of state-of-the-art partial discharge analysis techniques for condition monitoring
M Wu, H Cao, J Cao, HL Nguyen, JB Gomes, SP Krishnaswamy
IEEE electrical insulation magazine 31 (6), 22-35, 2015
2862015
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
arXiv preprint arXiv:1208.0093, 2012
2202012
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
1892016
Castle: Continuously anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
IEEE Transactions on Dependable and Secure Computing 8 (3), 337-352, 2010
1822010
Publishing microdata with a robust privacy guarantee
J Cao, P Karras
arXiv preprint arXiv:1208.0220, 2012
1342012
ρ-uncertainty: inference-proof transaction anonymization
J Cao, P Karras, C Raïssi, KL Tan
Proceedings of the VLDB Endowment (PVLDB) 3 (1), 1033-1044, 2010
1202010
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
J Cao, P Karras, P Kalnis, KL Tan
The VLDB Journal 20, 59-81, 2011
1142011
Repeat buyer prediction for e-commerce
G Liu, TT Nguyen, G Zhao, W Zha, J Yang, J Cao, M Wu, P Zhao, W Chen
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016
1062016
A framework to enforce access control over data streams
B Carminati, E Ferrari, J Cao, KL Tan
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
882010
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017
572017
Efficient and accurate strategies for differentially-private sliding window queries
J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan
Proceedings of the 16th international conference on extending database …, 2013
572013
CASTLE: A delay-constrained scheme for ks-anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
2008 IEEE 24th International Conference on Data Engineering, 1376-1378, 2008
522008
Dbmask: Fine-grained access control on encrypted relational databases
MI Sarfraz, M Nabeel, J Cao, E Bertino
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
512015
Acstream: Enforcing access control over data streams
J Cao, B Carminati, E Ferrari, KL Tan
2009 IEEE 25th International Conference on Data Engineering, 1495-1498, 2009
452009
A hybrid private record linkage scheme: Separating differentially private synopses from matching records
J Cao, FY Rao, E Bertino, M Kantarcioglu
2015 IEEE 31st International Conference on Data Engineering, 1011-1022, 2015
292015
DAG: a general model for privacy-preserving data mining
SG Teo, J Cao, VCS Lee
IEEE Transactions on Knowledge and Data Engineering 32 (1), 40-53, 2018
282018
Integrative dynamic reconfiguration in a parallel stream processing engine
KGS Madsen, Y Zhou, J Cao
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 227-230, 2017
282017
Hybrid private record linkage: Separating differentially private synopses from matching records
FY Rao, J Cao, E Bertino, M Kantarcioglu
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-36, 2019
212019
Efficient tree pattern queries on encrypted xml documents
J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu
Proceedings of the Joint EDBT/ICDT 2013 workshops, 111-120, 2013
202013
Discrete particle swarm optimization routing protocol for wireless sensor networks with multiple mobile sinks
J Yang, F Liu, J Cao, L Wang
Sensors 16 (7), 1081, 2016
192016
系统目前无法执行此操作,请稍后再试。
文章 1–20