2009 | ||
---|---|---|
50 | EE | Yubao Liu, Xiuwei Chen, Fei Wang, Jian Yin: Efficient Detection of Discords for Time Series Stream. APWeb/WAIM 2009: 629-634 |
2008 | ||
49 | EE | Wenxin Yang, Shuqin Rao, Jina Wang, Jian Yin, Jian Chen: Face Recognition Using Clustering Based Optimal Linear Discriminant Analysis. ADMA 2008: 241-249 |
48 | EE | Haixun Wang, Jian Yin, Chang-Shing Perng, Philip S. Yu: Dual encryption for query integrity assurance. CIKM 2008: 863-872 |
47 | EE | Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng: Providing freshness guarantees for outsourced databases. EDBT 2008: 323-332 |
46 | EE | Jina Wang, Jian Huang, Shuqin Rao, Shaoe Xue, Jian Yin: An Adaptive Genetic Algorithm for Solving Traveling Salesman Problem. ICIC (2) 2008: 182-189 |
45 | EE | Yalan Zhou, Jiahai Wang, Jian Yin: Genetic Particle Swarm Optimization Based on Multiagent Model for Combinatorial Optimization Problem. ICNSC 2008: 293-297 |
44 | EE | Jiahai Wang, Yunong Zhang, Yalan Zhou, Jian Yin: Discrete quantum-behaved particle swarm optimization based on estimation of distribution for combinatorial optimization. IEEE Congress on Evolutionary Computation 2008: 897-904 |
43 | EE | Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Scalable Method for Access Control in Location-Based Broadcast Services. INFOCOM 2008: 256-260 |
42 | EE | Jian Yin, Sanjay Kumar Madria: ESecRout: An Energy Efficient Secure Routing for Sensor Networks. IJDSN 4(2): 67-82 (2008) |
41 | EE | Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu: Clustering Text Data Streams. J. Comput. Sci. Technol. 23(1): 112-128 (2008) |
40 | EE | Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: Mitigating application-level denial of service attacks on Web servers: A client-transparent approach. TWEB 2(3): (2008) |
2007 | ||
39 | EE | Yubao Liu, Jiarong Cai, Jian Yin, Ada Wai-Chee Fu: Clustering Massive Text Data Streams by Semantic Smoothing Model. ADMA 2007: 389-400 |
38 | EE | Raymond Chi-Wing Wong, Yubao Liu, Jian Yin, Zhilan Huang, Ada Wai-Chee Fu, Jian Pei: (alpha, k)-anonymity Based Privacy Preservation by Lossy Join. APWeb/WAIM 2007: 733-744 |
37 | EE | Yubao Liu, Jiarong Cai, Jian Yin, Zhilan Huang: Document Clustering Based on Semantic Smoothing Approach. AWIC 2007: 217-222 |
36 | EE | Jian Yin, Zhilan Huang, Yubao Liu, Jiarong Cai, Jian Chen: An Effective Maximal Subspace Clustering Algorithm Based on Enumeration Tree. FSKD (1) 2007: 572-576 |
35 | EE | Mudhakar Srivatsa, Arun Iyengar, Thomas A. Mikalsen, Isabelle Rouvellou, Jian Yin: An Access Control System for Web Service Compositions. ICWS 2007: 1-8 |
34 | EE | Yubao Liu, Jiarong Cai, Zhilan Huang, Jingwen Yu, Jian Yin: Fast detection of database system abuse behaviors based on data mining approach. Infoscale 2007: 37 |
33 | EE | Jiarong Cai, Yubao Liu, Jian Yin: An Improved Semantic Smoothing Model for Model-Based Document Clustering. SNPD (3) 2007: 670-675 |
32 | EE | Min Xie, Haixun Wang, Jian Yin, Xiaofeng Meng: Integrity Auditing of Outsourced Data. VLDB 2007: 782-793 |
31 | EE | Yubao Liu, Jianlin Feng, Jian Yin: The Incremental Mining of Constrained Cube Gradients. International Journal of Information Technology and Decision Making 6(2): 253-278 (2007) |
2006 | ||
30 | EE | Jian Yin, Sanjay Kumar Madria: SecRout: A Secure Routing Protocol for Sensor Networks. AINA (1) 2006: 393-398 |
29 | EE | Weiheng Zhu, Jian Pei, Jian Yin, Yihuang Xie: Granularity Adaptive Density Estimation and on Demand Clustering of Concept-Drifting Data Streams. DaWaK 2006: 322-331 |
28 | EE | Jian Yin, Fang Mei, Gang Zhang: Intrusion Detection Based on Data Mining. ICIC (2) 2006: 724-729 |
27 | EE | Haixun Wang, Jian Yin, Jian Pei, Philip S. Yu, Jeffrey Xu Yu: Suppressing model overfitting in mining concept-drifting data streams. KDD 2006: 736-741 |
26 | EE | Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Middleware System for Protecting Against Application Level Denial of Service Attacks. Middleware 2006: 260-280 |
25 | EE | Jian Yin, Duanning Zhou, Qiong-Qiong Xie: A Clustering Algorithm for Time Series Data. PDCAT 2006: 119-122 |
24 | EE | Mudhakar Srivatsa, Arun Iyengar, Jian Yin, Ling Liu: A Client-Transparent Approach to Defend Against Denial of Service Attacks. SRDS 2006: 61-70 |
23 | EE | Jian Yin, Sanjay Kumar Madria: A Hierarchical Secure Routing Protocol against Black Hole Attacks in Sensor Networks. SUTC (1) 2006: 376-383 |
2005 | ||
22 | EE | Jian Chen, Jian Yin, Jin Huang: Mining Correlated Rules for Associative Classification. ADMA 2005: 130-140 |
21 | EE | Yubao Liu, Jian Yin: The mining of fuzzy gradient in the case of materialized cube. CIT 2005: 93-97 |
20 | EE | Jian Chen, Jian Yin, Jin Huang, Ming Feng: Associative Classification Based on Correlation Analysis. FSKD (1) 2005: 59-68 |
19 | EE | Jian Yin, Xianli Fan, Yiqun Chen, Jiangtao Ren: High-Dimensional Shared Nearest Neighbor Clustering Algorithm. FSKD (2) 2005: 494-502 |
18 | EE | Yiqun Chen, Jian Yin: Sense Rank AALesk: A Semantic Solution for Word Sense Disambiguation. FSKD (2) 2005: 710-717 |
17 | EE | Yubao Liu, Jian Yin: The Computation of Semantic Data Cube. GCC 2005: 573-578 |
16 | EE | Jian Chen, Liangyi Ou, Jian Yin, Jin Huang: Efficient Mining of Cross-Transaction Web Usage Patterns in Large Database. ICCNMC 2005: 519-528 |
15 | EE | Jian Chen, Jian Yin, Jun Zhang, Jin Huang: Associative Classification in Text Categorization. ICIC (1) 2005: 1035-1044 |
14 | EE | Jian Yin, Zhifang Tan: Clustering Mixed Type Attributes in Large Dataset. ISPA 2005: 655-661 |
2004 | ||
13 | EE | Fred Douglis, John Palmer, Elizabeth S. Richards, David Tao, William H. Tetzlaff, John M. Tracey, Jian Yin: Position: short object lifetimes require a delete-optimized storage system. ACM SIGOPS European Workshop 2004: 6 |
12 | EE | Yiqun Chen, Chi-Hung Chi, Jian Yin: Data Mining Service Based on MDA. AWCC 2004: 297-302 |
11 | EE | Christopher Stewart, Kai Shen, Sandhya Dwarkadas, Michael L. Scott, Jian Yin: Profile-Driven Component Placement for Cluster-Based Online Services. IEEE Distributed Systems Online 5(10): (2004) |
10 | EE | Malik Ayed Tubaishat, Jian Yin, Biswajit Panja, Sanjay Kumar Madria: A secure hierarchical model for sensor network. SIGMOD Record 33(1): 7-13 (2004) |
2003 | ||
9 | EE | Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin: Towards a Practical Approach to Confidential Byzantine Fault Tolerance. Future Directions in Distributed Computing 2003: 51-56 |
8 | EE | Jian Yin, Jean-Philippe Martin, Arun Venkataramani, Lorenzo Alvisi, Michael Dahlin: Separating agreement from execution for byzantine fault tolerant services. SOSP 2003: 253-267 |
2002 | ||
7 | EE | Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar: Engineering web cache consistency. ACM Trans. Internet Techn. 2(3): 224-259 (2002) |
2001 | ||
6 | EE | Jiming Liu, Jian Yin: Towards Efficient Data Re-mining (DRM). PAKDD 2001: 406-412 |
5 | EE | Jian Yin, Lorenzo Alvisi, Michael Dahlin, Arun Iyengar: Engineering server-driven consistency for large scale dynamic Web services. WWW 2001: 45-57 |
2000 | ||
4 | EE | Jiming Liu, Jian Yin: Multi-agent Integer Programming. IDEAL 2000: 301-307 |
1999 | ||
3 | EE | Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Hierarchical Cache Consistency in a WAN. USENIX Symposium on Internet Technologies and Systems 1999 |
2 | EE | Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Volume Leases for Consistency in Large-Scale Systems. IEEE Trans. Knowl. Data Eng. 11(4): 563-576 (1999) |
1998 | ||
1 | EE | Jian Yin, Lorenzo Alvisi, Michael Dahlin, Calvin Lin: Using Leases to Support Server-Driven Consistency in Large-Scale Systems. ICDCS 1998: 285-294 |