An overview of state-of-the-art partial discharge analysis techniques for condition monitoring M Wu, H Cao, J Cao, HL Nguyen, JB Gomes, SP Krishnaswamy IEEE electrical insulation magazine 31 (6), 22-35, 2015 | 286 | 2015 |
Privbasis: Frequent itemset mining with differential privacy N Li, W Qardaji, D Su, J Cao arXiv preprint arXiv:1208.0093, 2012 | 220 | 2012 |
Differentially private k-means clustering D Su, J Cao, N Li, E Bertino, H Jin Proceedings of the sixth ACM conference on data and application security and …, 2016 | 189 | 2016 |
Castle: Continuously anonymizing data streams J Cao, B Carminati, E Ferrari, KL Tan IEEE Transactions on Dependable and Secure Computing 8 (3), 337-352, 2010 | 182 | 2010 |
Publishing microdata with a robust privacy guarantee J Cao, P Karras arXiv preprint arXiv:1208.0220, 2012 | 134 | 2012 |
ρ-uncertainty: inference-proof transaction anonymization J Cao, P Karras, C Raïssi, KL Tan Proceedings of the VLDB Endowment (PVLDB) 3 (1), 1033-1044, 2010 | 120 | 2010 |
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness J Cao, P Karras, P Kalnis, KL Tan The VLDB Journal 20, 59-81, 2011 | 114 | 2011 |
Repeat buyer prediction for e-commerce G Liu, TT Nguyen, G Zhao, W Zha, J Yang, J Cao, M Wu, P Zhao, W Chen Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge …, 2016 | 106 | 2016 |
A framework to enforce access control over data streams B Carminati, E Ferrari, J Cao, KL Tan ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010 | 88 | 2010 |
Differentially private k-means clustering and a hybrid approach to private optimization D Su, J Cao, N Li, E Bertino, M Lyu, H Jin ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017 | 57 | 2017 |
Efficient and accurate strategies for differentially-private sliding window queries J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan Proceedings of the 16th international conference on extending database …, 2013 | 57 | 2013 |
CASTLE: A delay-constrained scheme for ks-anonymizing data streams J Cao, B Carminati, E Ferrari, KL Tan 2008 IEEE 24th International Conference on Data Engineering, 1376-1378, 2008 | 52 | 2008 |
Dbmask: Fine-grained access control on encrypted relational databases MI Sarfraz, M Nabeel, J Cao, E Bertino Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015 | 51 | 2015 |
Acstream: Enforcing access control over data streams J Cao, B Carminati, E Ferrari, KL Tan 2009 IEEE 25th International Conference on Data Engineering, 1495-1498, 2009 | 45 | 2009 |
A hybrid private record linkage scheme: Separating differentially private synopses from matching records J Cao, FY Rao, E Bertino, M Kantarcioglu 2015 IEEE 31st International Conference on Data Engineering, 1011-1022, 2015 | 29 | 2015 |
DAG: a general model for privacy-preserving data mining SG Teo, J Cao, VCS Lee IEEE Transactions on Knowledge and Data Engineering 32 (1), 40-53, 2018 | 28 | 2018 |
Integrative dynamic reconfiguration in a parallel stream processing engine KGS Madsen, Y Zhou, J Cao 2017 IEEE 33rd International Conference on Data Engineering (ICDE), 227-230, 2017 | 28 | 2017 |
Hybrid private record linkage: Separating differentially private synopses from matching records FY Rao, J Cao, E Bertino, M Kantarcioglu ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-36, 2019 | 21 | 2019 |
Efficient tree pattern queries on encrypted xml documents J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu Proceedings of the Joint EDBT/ICDT 2013 workshops, 111-120, 2013 | 20 | 2013 |
Discrete particle swarm optimization routing protocol for wireless sensor networks with multiple mobile sinks J Yang, F Liu, J Cao, L Wang Sensors 16 (7), 1081, 2016 | 19 | 2016 |