2008 |
30 | EE | Justin Z. Zhan,
LiWu Chang,
Stan Matwin:
How to Prevent Private Data from being Disclosed to a Malicious Attacker.
Data Mining: Foundations and Practice 2008: 517-528 |
29 | EE | Justin Z. Zhan,
Stan Matwin,
LiWu Chang:
Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data.
Data Mining: Foundations and Practice 2008: 529-538 |
2007 |
28 | EE | Vassilios S. Verykios,
Emmanuel D. Pontikakis,
Yannis Theodoridis,
LiWu Chang:
Efficient algorithms for distortion and blocking techniques in association rule hiding.
Distributed and Parallel Databases 22(1): 85-104 (2007) |
27 | EE | Justin Z. Zhan,
Stan Matwin,
LiWu Chang:
Privacy-preserving multi-party decision tree induction.
IJBIDM 2(2): 197-212 (2007) |
26 | EE | Justin Z. Zhan,
Stan Matwin,
LiWu Chang:
Privacy-preserving collaborative association rule mining.
J. Network and Computer Applications 30(3): 1216-1227 (2007) |
25 | EE | Mei-Ling Shyu,
Thiago Quirino,
Zongxing Xie,
Shu-Ching Chen,
LiWu Chang:
Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems.
TAAS 2(3): (2007) |
2006 |
24 | EE | Zongxing Xie,
Thiago Quirino,
Mei-Ling Shyu,
Shu-Ching Chen,
LiWu Chang:
UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion Detection.
ICTAI 2006: 743-750 |
23 | EE | Thiago Quirino,
Zongxing Xie,
Mei-Ling Shyu,
Shu-Ching Chen,
LiWu Chang:
Collateral Representative Subspace Projection Modeling for Supervised Classification.
ICTAI 2006: 98-105 |
22 | EE | Zongxing Xie,
Thiago Quirino,
Mei-Ling Shyu,
Shu-Ching Chen,
LiWu Chang:
A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier.
SUTC (1) 2006: 446-453 |
21 | EE | Justin Z. Zhan,
LiWu Chang,
Stan Matwin:
Privacy-Preserving Collaborative Data Mining.
Foundations and Novel Approaches in Data Mining 2006: 213-227 |
20 | EE | Mei-Ling Shyu,
Shu-Ching Chen,
Kanoksri Sarinnapakorn,
LiWu Chang:
Principal Component-based Anomaly Detection Scheme.
Foundations and Novel Approaches in Data Mining 2006: 311-329 |
2005 |
19 | EE | Justin Z. Zhan,
Stan Matwin,
LiWu Chang:
Privacy-Preserving Collaborative Association Rule Mining.
DBSec 2005: 153-165 |
18 | EE | Justin Z. Zhan,
LiWu Chang,
Stan Matwin:
Building k-nearest neighbor classifiers on vertically partitioned private data.
GrC 2005: 708-711 |
17 | EE | Mei-Ling Shyu,
Indika Kuruppu-Appuhamilage,
Shu-Ching Chen,
LiWu Chang:
Handling missing values via decomposition of the conditioned set.
IRI 2005: 199-204 |
16 | EE | Justin Z. Zhan,
Stan Matwin,
LiWu Chang:
Private Mining of Association Rules.
ISI 2005: 72-80 |
15 | EE | Mei-Ling Shyu,
Kanoksri Sarinnapakorn,
Indika Kuruppu-Appuhamilage,
Shu-Ching Chen,
LiWu Chang,
Thomas Goldring:
Handling Nominal Features in Anomaly Intrusion Detection Problems.
RIDE 2005: 55-62 |
2004 |
14 | | Justin Z. Zhan,
LiWu Chang,
Stan Matwin:
Privacy-Preserving Multi-Party Decision Tree Induction.
DBSec 2004: 341-355 |
13 | | Justin Z. Zhan,
LiWu Chang,
Stan Matwin:
Bayesian Network Induction With Incomplete Private Data.
ICEB 2004: 1119-1124 |
12 | | Justin Z. Zhan,
Stan Matwin,
Nathalie Japkowicz,
LiWu Chang:
Privacy-Preserving Collaborative Association Rule Mining.
ICEB 2004: 1172-1178 |
11 | EE | Emmanuel D. Pontikakis,
Yannis Theodoridis,
Achilleas A. Tsitsonis,
LiWu Chang,
Vassilios S. Verykios:
A quantitative and qualitative ANALYSIS of blocking in association rule hiding.
WPES 2004: 29-30 |
2003 |
10 | EE | James Tracy,
LiWu Chang,
Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
International Journal on Artificial Intelligence Tools 12(3): 297-313 (2003) |
2002 |
9 | | LiWu Chang,
Ira S. Moskowitz:
A Study of Inference Problems in Distributed Databases.
DBSec 2002: 191-204 |
8 | EE | James Tracy,
LiWu Chang,
Ira S. Moskowitz:
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
ICTAI 2002: 413- |
7 | EE | Richard E. Newman,
Ira S. Moskowitz,
LiWu Chang,
Murali M. Brahmadesam:
A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.
Information Hiding 2002: 258-277 |
2001 |
6 | | Ira S. Moskowitz,
Myong H. Kang,
LiWu Chang,
Garth E. Longdon:
Randomly roving agents for intrusion detection.
DBSec 2001: 135-149 |
2000 |
5 | | LiWu Chang,
Ira S. Moskowitz:
An Integrated Framework for Database Privacy Protection.
DBSec 2000: 161-172 |
1999 |
4 | | Ira S. Moskowitz,
LiWu Chang:
An Entropy-Based Framework for Database Inference.
Information Hiding 1999: 405-418 |
1998 |
3 | | LiWu Chang,
Ira S. Moskowitz:
Bayesian Methods to the Database Inference Problem.
DBSec 1998: 237-251 |
2 | EE | LiWu Chang,
Ira S. Moskowitz:
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Workshop on New Security Paradigms 1998: 82-89 |
1997 |
1 | | LiWu Chang,
Ira S. Moskowitz:
Critical analysis of security in voice hiding techniques.
ICICS 1997: 203-216 |