dblp.uni-trier.dewww.uni-trier.de

LiWu Chang

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2008
30EEJustin Z. Zhan, LiWu Chang, Stan Matwin: How to Prevent Private Data from being Disclosed to a Malicious Attacker. Data Mining: Foundations and Practice 2008: 517-528
29EEJustin Z. Zhan, Stan Matwin, LiWu Chang: Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data. Data Mining: Foundations and Practice 2008: 529-538
2007
28EEVassilios S. Verykios, Emmanuel D. Pontikakis, Yannis Theodoridis, LiWu Chang: Efficient algorithms for distortion and blocking techniques in association rule hiding. Distributed and Parallel Databases 22(1): 85-104 (2007)
27EEJustin Z. Zhan, Stan Matwin, LiWu Chang: Privacy-preserving multi-party decision tree induction. IJBIDM 2(2): 197-212 (2007)
26EEJustin Z. Zhan, Stan Matwin, LiWu Chang: Privacy-preserving collaborative association rule mining. J. Network and Computer Applications 30(3): 1216-1227 (2007)
25EEMei-Ling Shyu, Thiago Quirino, Zongxing Xie, Shu-Ching Chen, LiWu Chang: Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems. TAAS 2(3): (2007)
2006
24EEZongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang: UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion Detection. ICTAI 2006: 743-750
23EEThiago Quirino, Zongxing Xie, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang: Collateral Representative Subspace Projection Modeling for Supervised Classification. ICTAI 2006: 98-105
22EEZongxing Xie, Thiago Quirino, Mei-Ling Shyu, Shu-Ching Chen, LiWu Chang: A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier. SUTC (1) 2006: 446-453
21EEJustin Z. Zhan, LiWu Chang, Stan Matwin: Privacy-Preserving Collaborative Data Mining. Foundations and Novel Approaches in Data Mining 2006: 213-227
20EEMei-Ling Shyu, Shu-Ching Chen, Kanoksri Sarinnapakorn, LiWu Chang: Principal Component-based Anomaly Detection Scheme. Foundations and Novel Approaches in Data Mining 2006: 311-329
2005
19EEJustin Z. Zhan, Stan Matwin, LiWu Chang: Privacy-Preserving Collaborative Association Rule Mining. DBSec 2005: 153-165
18EEJustin Z. Zhan, LiWu Chang, Stan Matwin: Building k-nearest neighbor classifiers on vertically partitioned private data. GrC 2005: 708-711
17EEMei-Ling Shyu, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang: Handling missing values via decomposition of the conditioned set. IRI 2005: 199-204
16EEJustin Z. Zhan, Stan Matwin, LiWu Chang: Private Mining of Association Rules. ISI 2005: 72-80
15EEMei-Ling Shyu, Kanoksri Sarinnapakorn, Indika Kuruppu-Appuhamilage, Shu-Ching Chen, LiWu Chang, Thomas Goldring: Handling Nominal Features in Anomaly Intrusion Detection Problems. RIDE 2005: 55-62
2004
14 Justin Z. Zhan, LiWu Chang, Stan Matwin: Privacy-Preserving Multi-Party Decision Tree Induction. DBSec 2004: 341-355
13 Justin Z. Zhan, LiWu Chang, Stan Matwin: Bayesian Network Induction With Incomplete Private Data. ICEB 2004: 1119-1124
12 Justin Z. Zhan, Stan Matwin, Nathalie Japkowicz, LiWu Chang: Privacy-Preserving Collaborative Association Rule Mining. ICEB 2004: 1172-1178
11EEEmmanuel D. Pontikakis, Yannis Theodoridis, Achilleas A. Tsitsonis, LiWu Chang, Vassilios S. Verykios: A quantitative and qualitative ANALYSIS of blocking in association rule hiding. WPES 2004: 29-30
2003
10EEJames Tracy, LiWu Chang, Ira S. Moskowitz: An Agent-Based Approach to Inference Prevention in Distributed Database Systems. International Journal on Artificial Intelligence Tools 12(3): 297-313 (2003)
2002
9 LiWu Chang, Ira S. Moskowitz: A Study of Inference Problems in Distributed Databases. DBSec 2002: 191-204
8EEJames Tracy, LiWu Chang, Ira S. Moskowitz: An Agent-Based Approach to Inference Prevention in Distributed Database Systems. ICTAI 2002: 413-
7EERichard E. Newman, Ira S. Moskowitz, LiWu Chang, Murali M. Brahmadesam: A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis. Information Hiding 2002: 258-277
2001
6 Ira S. Moskowitz, Myong H. Kang, LiWu Chang, Garth E. Longdon: Randomly roving agents for intrusion detection. DBSec 2001: 135-149
2000
5 LiWu Chang, Ira S. Moskowitz: An Integrated Framework for Database Privacy Protection. DBSec 2000: 161-172
1999
4 Ira S. Moskowitz, LiWu Chang: An Entropy-Based Framework for Database Inference. Information Hiding 1999: 405-418
1998
3 LiWu Chang, Ira S. Moskowitz: Bayesian Methods to the Database Inference Problem. DBSec 1998: 237-251
2EELiWu Chang, Ira S. Moskowitz: Parsimonious Downgrading and Decision Trees Applied to the Inference Problem. Workshop on New Security Paradigms 1998: 82-89
1997
1 LiWu Chang, Ira S. Moskowitz: Critical analysis of security in voice hiding techniques. ICICS 1997: 203-216

Coauthor Index

1Murali M. Brahmadesam [7]
2Shu-Ching Chen [15] [17] [20] [22] [23] [24] [25]
3Thomas Goldring [15]
4Nathalie Japkowicz [12]
5Myong H. Kang [6]
6Indika Kuruppu-Appuhamilage [15] [17]
7Garth E. Longdon [6]
8Stan Matwin [12] [13] [14] [16] [18] [19] [21] [26] [27] [29] [30]
9Ira S. Moskowitz [1] [2] [3] [4] [5] [6] [7] [8] [9] [10]
10Richard E. Newman [7]
11Emmanuel D. Pontikakis [11] [28]
12Thiago Quirino [22] [23] [24] [25]
13Kanoksri Sarinnapakorn [15] [20]
14Mei-Ling Shyu [15] [17] [20] [22] [23] [24] [25]
15Yannis Theodoridis [11] [28]
16James Tracy [8] [10]
17Achilleas A. Tsitsonis [11]
18Vassilios S. Verykios [11] [28]
19Zongxing Xie [22] [23] [24] [25]
20Justin Z. Zhan [12] [13] [14] [16] [18] [19] [21] [26] [27] [29] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)