2009 |
50 | EE | Yubao Liu,
Xiuwei Chen,
Fei Wang,
Jian Yin:
Efficient Detection of Discords for Time Series Stream.
APWeb/WAIM 2009: 629-634 |
2008 |
49 | EE | Wenxin Yang,
Shuqin Rao,
Jina Wang,
Jian Yin,
Jian Chen:
Face Recognition Using Clustering Based Optimal Linear Discriminant Analysis.
ADMA 2008: 241-249 |
48 | EE | Haixun Wang,
Jian Yin,
Chang-Shing Perng,
Philip S. Yu:
Dual encryption for query integrity assurance.
CIKM 2008: 863-872 |
47 | EE | Min Xie,
Haixun Wang,
Jian Yin,
Xiaofeng Meng:
Providing freshness guarantees for outsourced databases.
EDBT 2008: 323-332 |
46 | EE | Jina Wang,
Jian Huang,
Shuqin Rao,
Shaoe Xue,
Jian Yin:
An Adaptive Genetic Algorithm for Solving Traveling Salesman Problem.
ICIC (2) 2008: 182-189 |
45 | EE | Yalan Zhou,
Jiahai Wang,
Jian Yin:
Genetic Particle Swarm Optimization Based on Multiagent Model for Combinatorial Optimization Problem.
ICNSC 2008: 293-297 |
44 | EE | Jiahai Wang,
Yunong Zhang,
Yalan Zhou,
Jian Yin:
Discrete quantum-behaved particle swarm optimization based on estimation of distribution for combinatorial optimization.
IEEE Congress on Evolutionary Computation 2008: 897-904 |
43 | EE | Mudhakar Srivatsa,
Arun Iyengar,
Jian Yin,
Ling Liu:
A Scalable Method for Access Control in Location-Based Broadcast Services.
INFOCOM 2008: 256-260 |
42 | EE | Jian Yin,
Sanjay Kumar Madria:
ESecRout: An Energy Efficient Secure Routing for Sensor Networks.
IJDSN 4(2): 67-82 (2008) |
41 | EE | Yubao Liu,
Jiarong Cai,
Jian Yin,
Ada Wai-Chee Fu:
Clustering Text Data Streams.
J. Comput. Sci. Technol. 23(1): 112-128 (2008) |
40 | EE | Mudhakar Srivatsa,
Arun Iyengar,
Jian Yin,
Ling Liu:
Mitigating application-level denial of service attacks on Web servers: A client-transparent approach.
TWEB 2(3): (2008) |
2007 |
39 | EE | Yubao Liu,
Jiarong Cai,
Jian Yin,
Ada Wai-Chee Fu:
Clustering Massive Text Data Streams by Semantic Smoothing Model.
ADMA 2007: 389-400 |
38 | EE | Raymond Chi-Wing Wong,
Yubao Liu,
Jian Yin,
Zhilan Huang,
Ada Wai-Chee Fu,
Jian Pei:
(alpha, k)-anonymity Based Privacy Preservation by Lossy Join.
APWeb/WAIM 2007: 733-744 |
37 | EE | Yubao Liu,
Jiarong Cai,
Jian Yin,
Zhilan Huang:
Document Clustering Based on Semantic Smoothing Approach.
AWIC 2007: 217-222 |
36 | EE | Jian Yin,
Zhilan Huang,
Yubao Liu,
Jiarong Cai,
Jian Chen:
An Effective Maximal Subspace Clustering Algorithm Based on Enumeration Tree.
FSKD (1) 2007: 572-576 |
35 | EE | Mudhakar Srivatsa,
Arun Iyengar,
Thomas A. Mikalsen,
Isabelle Rouvellou,
Jian Yin:
An Access Control System for Web Service Compositions.
ICWS 2007: 1-8 |
34 | EE | Yubao Liu,
Jiarong Cai,
Zhilan Huang,
Jingwen Yu,
Jian Yin:
Fast detection of database system abuse behaviors based on data mining approach.
Infoscale 2007: 37 |
33 | EE | Jiarong Cai,
Yubao Liu,
Jian Yin:
An Improved Semantic Smoothing Model for Model-Based Document Clustering.
SNPD (3) 2007: 670-675 |
32 | EE | Min Xie,
Haixun Wang,
Jian Yin,
Xiaofeng Meng:
Integrity Auditing of Outsourced Data.
VLDB 2007: 782-793 |
31 | EE | Yubao Liu,
Jianlin Feng,
Jian Yin:
The Incremental Mining of Constrained Cube Gradients.
International Journal of Information Technology and Decision Making 6(2): 253-278 (2007) |
2006 |
30 | EE | Jian Yin,
Sanjay Kumar Madria:
SecRout: A Secure Routing Protocol for Sensor Networks.
AINA (1) 2006: 393-398 |
29 | EE | Weiheng Zhu,
Jian Pei,
Jian Yin,
Yihuang Xie:
Granularity Adaptive Density Estimation and on Demand Clustering of Concept-Drifting Data Streams.
DaWaK 2006: 322-331 |
28 | EE | Jian Yin,
Fang Mei,
Gang Zhang:
Intrusion Detection Based on Data Mining.
ICIC (2) 2006: 724-729 |
27 | EE | Haixun Wang,
Jian Yin,
Jian Pei,
Philip S. Yu,
Jeffrey Xu Yu:
Suppressing model overfitting in mining concept-drifting data streams.
KDD 2006: 736-741 |
26 | EE | Mudhakar Srivatsa,
Arun Iyengar,
Jian Yin,
Ling Liu:
A Middleware System for Protecting Against Application Level Denial of Service Attacks.
Middleware 2006: 260-280 |
25 | EE | Jian Yin,
Duanning Zhou,
Qiong-Qiong Xie:
A Clustering Algorithm for Time Series Data.
PDCAT 2006: 119-122 |
24 | EE | Mudhakar Srivatsa,
Arun Iyengar,
Jian Yin,
Ling Liu:
A Client-Transparent Approach to Defend Against Denial of Service Attacks.
SRDS 2006: 61-70 |
23 | EE | Jian Yin,
Sanjay Kumar Madria:
A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks.
SUTC (1) 2006: 376-383 |
2005 |
22 | EE | Jian Chen,
Jian Yin,
Jin Huang:
Mining Correlated Rules for Associative Classification.
ADMA 2005: 130-140 |
21 | EE | Yubao Liu,
Jian Yin:
The mining of fuzzy gradient in the case of materialized cube.
CIT 2005: 93-97 |
20 | EE | Jian Chen,
Jian Yin,
Jin Huang,
Ming Feng:
Associative Classification Based on Correlation Analysis.
FSKD (1) 2005: 59-68 |
19 | EE | Jian Yin,
Xianli Fan,
Yiqun Chen,
Jiangtao Ren:
High-Dimensional Shared Nearest Neighbor Clustering Algorithm.
FSKD (2) 2005: 494-502 |
18 | EE | Yiqun Chen,
Jian Yin:
Sense Rank AALesk: A Semantic Solution for Word Sense Disambiguation.
FSKD (2) 2005: 710-717 |
17 | EE | Yubao Liu,
Jian Yin:
The Computation of Semantic Data Cube.
GCC 2005: 573-578 |
16 | EE | Jian Chen,
Liangyi Ou,
Jian Yin,
Jin Huang:
Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database.
ICCNMC 2005: 519-528 |
15 | EE | Jian Chen,
Jian Yin,
Jun Zhang,
Jin Huang:
Associative Classification in Text Categorization.
ICIC (1) 2005: 1035-1044 |
14 | EE | Jian Yin,
Zhifang Tan:
Clustering Mixed Type Attributes in Large Dataset.
ISPA 2005: 655-661 |
2004 |
13 | EE | Fred Douglis,
John Palmer,
Elizabeth S. Richards,
David Tao,
William H. Tetzlaff,
John M. Tracey,
Jian Yin:
Position: short object lifetimes require a delete-optimized storage system.
ACM SIGOPS European Workshop 2004: 6 |
12 | EE | Yiqun Chen,
Chi-Hung Chi,
Jian Yin:
Data Mining Service Based on MDA.
AWCC 2004: 297-302 |
11 | EE | Christopher Stewart,
Kai Shen,
Sandhya Dwarkadas,
Michael L. Scott,
Jian Yin:
Profile-Driven Component Placement for Cluster-Based Online Services.
IEEE Distributed Systems Online 5(10): (2004) |
10 | EE | Malik Ayed Tubaishat,
Jian Yin,
Biswajit Panja,
Sanjay Kumar Madria:
A secure hierarchical model for sensor network.
SIGMOD Record 33(1): 7-13 (2004) |
2003 |
9 | EE | Jian Yin,
Jean-Philippe Martin,
Arun Venkataramani,
Lorenzo Alvisi,
Michael Dahlin:
Towards a Practical Approach to Confidential Byzantine Fault Tolerance.
Future Directions in Distributed Computing 2003: 51-56 |
8 | EE | Jian Yin,
Jean-Philippe Martin,
Arun Venkataramani,
Lorenzo Alvisi,
Michael Dahlin:
Separating agreement from execution for byzantine fault tolerant services.
SOSP 2003: 253-267 |
2002 |
7 | EE | Jian Yin,
Lorenzo Alvisi,
Michael Dahlin,
Arun Iyengar:
Engineering web cache consistency.
ACM Trans. Internet Techn. 2(3): 224-259 (2002) |
2001 |
6 | EE | Jiming Liu,
Jian Yin:
Towards Efficient Data Re-mining (DRM).
PAKDD 2001: 406-412 |
5 | EE | Jian Yin,
Lorenzo Alvisi,
Michael Dahlin,
Arun Iyengar:
Engineering server-driven consistency for large scale dynamic Web services.
WWW 2001: 45-57 |
2000 |
4 | EE | Jiming Liu,
Jian Yin:
Multi-agent Integer Programming.
IDEAL 2000: 301-307 |
1999 |
3 | EE | Jian Yin,
Lorenzo Alvisi,
Michael Dahlin,
Calvin Lin:
Hierarchical Cache Consistency in a WAN.
USENIX Symposium on Internet Technologies and Systems 1999 |
2 | EE | Jian Yin,
Lorenzo Alvisi,
Michael Dahlin,
Calvin Lin:
Volume Leases for Consistency in Large-Scale Systems.
IEEE Trans. Knowl. Data Eng. 11(4): 563-576 (1999) |
1998 |
1 | EE | Jian Yin,
Lorenzo Alvisi,
Michael Dahlin,
Calvin Lin:
Using Leases to Support Server-Driven Consistency in Large-Scale Systems.
ICDCS 1998: 285-294 |