Texas A&M University
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2008 | ||
---|---|---|
10 | EE | Wei Yu, Nan Zhang, Xinwen Fu, Riccardo Bettati, Wei Zhao: On localization attacks to Internet Threat Monitors: An information-theoretic framework. DSN 2008: 356-365 |
9 | EE | Nan Zhang, Wei Yu, Xinwen Fu, Sajal K. Das: Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation. ICPADS 2008: 501-508 |
8 | EE | Nan Zhang, Wei Zhao: Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems. IEEE Trans. Knowl. Data Eng. 20(8): 1028-1033 (2008) |
2007 | ||
7 | EE | Nan Zhang, Wei Zhao: Privacy-Preserving Data Mining Systems. IEEE Computer 40(4): 52-58 (2007) |
2006 | ||
6 | EE | Wei Yu, Nan Zhang, Wei Zhao: Self-adaptive Worms and Countermeasures. SSS 2006: 548-562 |
2005 | ||
5 | EE | Nan Zhang, Shengquan Wang, Wei Zhao: A new scheme on privacy-preserving data classification. KDD 2005: 374-383 |
4 | EE | Nan Zhang, Wei Zhao, Jianer Chen: Performance Measurements for Privacy Preserving Data Mining. PAKDD 2005: 43-49 |
3 | EE | Nan Zhang, Wei Zhao: Distributed Privacy Preserving Information Sharing. VLDB 2005: 889-900 |
2004 | ||
2 | EE | Nan Zhang, Wei Zhao, Jianer Chen: Cardinality-based inference control in OLAP systems: an information theoretic approach. DOLAP 2004: 59-64 |
1 | EE | Nan Zhang, Shengquan Wang, Wei Zhao: A New Scheme on Privacy Preserving Association Rule Mining. PKDD 2004: 484-495 |
1 | Riccardo Bettati | [10] |
2 | Jianer Chen | [2] [4] |
3 | Sajal K. Das | [9] |
4 | Xinwen Fu | [9] [10] |
5 | Shengquan Wang | [1] [5] |
6 | Wei Yu | [6] [9] [10] |
7 | Wei Zhao | [1] [2] [3] [4] [5] [6] [7] [8] [10] |