Dan Lin

Orcid: 0000-0003-1521-1452

Affiliations:
  • Vanderbilt University, Nashville, TN, USA
  • Missouri University of Science and Technology, Rolla, MO, USA (former)
  • Purdue University, West Lafayette, IN, USA (former)
  • National University of Singapore, Singapore (PhD 2007)


According to our database1, Dan Lin authored at least 117 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Find Another me Across the World - Large-Scale Semantic Trajectory Analysis Using Spark.
IEEE Trans. Knowl. Data Eng., September, 2023

Highly Efficient Traffic Planning for Autonomous Vehicles to Cross Intersections Without a Stop.
ACM Trans. Intell. Syst. Technol., April, 2023

"Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection.
IEEE Trans. Dependable Secur. Comput., 2023

Preserving Location Privacy in the Modern Era of Pervasive Environments.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning.
Proceedings of the 18th International Symposium on Spatial and Temporal Data, 2023

FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services.
Proceedings of the IEEE International Conference on Pervasive Computing and Communications Workshops and other Affiliated Events, 2023

2022
A New Facial Authentication Pitfall and Remedy in Web Services.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient parallel processing of high-dimensional spatial kNN queries.
Soft Comput., 2022

Developing Self-evolving Deepfake Detectors Against AI Attacks.
Proceedings of the 4th IEEE International Conference on Trust, 2022

NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Detecting Suspicious File Migration or Replication in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2021

Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware.
CoRR, 2021

"Do You Know You Are Tracked by Photos That You Didn't Take": Location-Aware Multi-Party Image Privacy Protection.
CoRR, 2021

2020
MoveWithMe: Location Privacy Preservation for Smartphone Users.
IEEE Trans. Inf. Forensics Secur., 2020

REMIND: Risk Estimation Mechanism for Images in Network Distribution.
IEEE Trans. Inf. Forensics Secur., 2020

A Parallel Algorithm For Anonymizing Large-scale Trajectory Data.
Trans. Data Sci., 2020

Efficient column-oriented processing for mutual subspace skyline queries.
Soft Comput., 2020

Effective social-context based message delivery using ChitChat in sparse delay tolerant networks.
Distributed Parallel Databases, 2020

Privacy-Preserving Friend Recommendation in an Integrated Social Environment.
Proceedings of the Information Systems Security - 16th International Conference, 2020

DASH: A Universal Intersection Traffic Management System for Autonomous Vehicles.
Proceedings of the 40th IEEE International Conference on Distributed Computing Systems, 2020

2019
A Cloud Brokerage Architecture for Efficient Cloud Service Selection.
IEEE Trans. Serv. Comput., 2019

Simple and Efficient Approach for Achieving End-to-End Anonymous Communication.
IACR Cryptol. ePrint Arch., 2019

Hiding in the Clouds and Building a Stealth Communication Network.
CoRR, 2019

FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Message from EATA Symposium Chairs.
Proceedings of the 43rd IEEE Annual Computer Software and Applications Conference, 2019

2018
Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs.
ACM Trans. Intell. Syst. Technol., 2018

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing.
IEEE Trans. Inf. Forensics Secur., 2018

Highly efficient randomized authentication in VANETs.
Pervasive Mob. Comput., 2018

UFace: Your universal password that no one can see.
Comput. Secur., 2018

RIPA: Real-Time Image Privacy Alert System.
Proceedings of the 4th IEEE International Conference on Collaboration and Internet Computing, 2018

2017
Maximum Update Interval in Moving Objects Databases.
Proceedings of the Encyclopedia of GIS., 2017

Indexing of Moving Objects, B<sup>x</sup>-Tree.
Proceedings of the Encyclopedia of GIS., 2017

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs.
IEEE Trans. Mob. Comput., 2017

iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning.
IEEE Trans. Inf. Forensics Secur., 2017

MMB<sup>cloud</sup>-Tree: Authenticated Index for Verifiable Cloud Service Selection.
IEEE Trans. Dependable Secur. Comput., 2017

Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds.
IEEE Trans. Cloud Comput., 2017

UFace: Your Universal Password That No One Can See.
IACR Cryptol. ePrint Arch., 2017

PAS: policy-based assistance in sensor networks.
Computing, 2017

MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization.
Proceedings of the 29th International Conference on Scientific and Statistical Database Management, 2017

SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance.
Proceedings of the Security and Privacy in Communication Networks, 2017

Poster: A Location-Privacy Approach for Continuous Queries.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing.
Proceedings of the 15th Annual Conference on Privacy, Security and Trust, 2017

No one can track you: Randomized authentication in Vehicular Ad-hoc Networks.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Privacy Setting Recommendation for Image Sharing.
Proceedings of the 16th IEEE International Conference on Machine Learning and Applications, 2017

Real-Time Detection of Illegal File Transfers in the Cloud.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Automatic Privacy Prediction to Accelerate Social Image Sharing.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

2016
Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network.
Adv. Comput., 2016

ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System.
Proceedings of the 9th IEEE International Conference on Cloud Computing, 2016

2015
Continuous Predictive Line Queries for On-the-Go Traffic Estimation.
Trans. Large Scale Data Knowl. Centered Syst., 2015

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites.
IEEE Trans. Knowl. Data Eng., 2015

Privacy-aware access control for message exchange in vehicular ad hoc networks.
Telecommun. Syst., 2015

Incremental evaluation of top-k combinatorial metric skyline query.
Knowl. Based Syst., 2015

MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection.
IACR Cryptol. ePrint Arch., 2015

Influence-Aware Predictive Density Queries Under Road-Network Constraints.
Proceedings of the Advances in Spatial and Temporal Databases, 2015

SecLoc: Securing Location-Sensitive Storage in the Cloud.
Proceedings of the 20th ACM Symposium on Access Control Models and Technologies, 2015

2014
Traffic Information Publication with Privacy Preservation.
ACM Trans. Intell. Syst. Technol., 2014

Randomized and Efficient Authentication in Mobile Environments.
IACR Cryptol. ePrint Arch., 2014

Monochromatic and bichromatic mutual skyline queries.
Expert Syst. Appl., 2014

Identifying hidden social circles for advanced privacy configuration.
Comput. Secur., 2014

Policy Driven Node Selection in MapReduce.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
A Similarity Measure for Comparing XACML Policies.
IEEE Trans. Knowl. Data Eng., 2013

Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Continuous Predictive Line Queries under Road-Network Constraints.
Proceedings of the Database and Expert Systems Applications, 2013

2012
A highly optimized algorithm for continuous intersection join queries over moving objects.
VLDB J., 2012

Predictive Line Queries for Traffic Prediction.
Trans. Large Scale Data Knowl. Centered Syst., 2012

Ensuring Distributed Accountability for Data Sharing in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2012

Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks.
Proceedings of the Network and System Security - 6th International Conference, 2012

Location Privacy Policy Management System.
Proceedings of the Information and Communications Security - 14th International Conference, 2012

The Min-dist Location Selection Query.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Automatic social group organization and privacy management.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

A moving zone based architecture for message dissemination in VANETs.
Proceedings of the 8th International Conference on Network and Service Management, 2012

A Brokerage-Based Approach for Cloud Service Selection.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012

2011
Clustering Web video search results based on integration of multiple features.
World Wide Web, 2011

A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy.
Proc. VLDB Endow., 2011

Fine-grained integration of access control policies.
Comput. Secur., 2011

A3P: adaptive policy prediction for shared images over popular content sharing sites.
Proceedings of the HT'11, 2011

Optimizing Predictive Queries on Moving Objects under Road-Network Constraints.
Proceedings of the Database and Expert Systems Applications, 2011

PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Promoting Distributed Accountability in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
EXAM: a comprehensive environment for the analysis of access control policies.
Int. J. Inf. Sec., 2010

Data protection models for service provisioning in the cloud.
Proceedings of the 15th ACM Symposium on Access Control Models and Technologies, 2010

Privacy-Preserving Location Publishing under Road-Network Constraints.
Proceedings of the Database Systems for Advanced Applications, 2010

Preventing Information Leakage from Indexing in the Cloud.
Proceedings of the IEEE International Conference on Cloud Computing, 2010

2009
Location Privacy in Moving-Object Environments.
Trans. Data Priv., 2009

Analysis of privacy and security policies.
IBM J. Res. Dev., 2009

Query Processing Techniques for Compliance with Data Confidence Policies.
Proceedings of the Secure Data Management, 6th VLDB Workshop, 2009

An algebra for fine-grained integration of XACML policies.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

Access control policy combining: theory meets practice.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
A Survey of Quantification of Privacy Preserving Data Mining Algorithms.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Maximum Update Interval in Moving Objects Databases.
Proceedings of the Encyclopedia of GIS., 2008

Indexing of Moving Objects, Bx-Tree.
Proceedings of the Encyclopedia of GIS., 2008

A benchmark for evaluating moving object indexes.
Proc. VLDB Endow., 2008

An Approach to Evaluate Data Trustworthiness Based on Data Provenance.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Policy decomposition for collaborative access control.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

EXAM: An Environment for Access Control Policy Analysis and Management.
Proceedings of the 9th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2008), 2008

Multi-domain and privacy-aware role based access control in eHealth.
Proceedings of the 2nd International ICST Conference on Pervasive Computing Technologies for Healthcare, 2008

Continuous Intersection Joins Over Moving Objects.
Proceedings of the 24th International Conference on Data Engineering, 2008

Position transformation: a location privacy protection method for moving objects.
Proceedings of the SIGSPATIAL ACM GIS 2008 International Workshop on Security and Privacy in GIS and LBS, 2008

High-Assurance Integrity Techniques for Databases.
Proceedings of the Sharing Data, 2008

2007
Continuous Clustering of Moving Objects.
IEEE Trans. Knowl. Data Eng., 2007

An approach to evaluate policy similarity.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

XACML Function Annotations.
Proceedings of the 8th IEEE International Workshop on Policies for Distributed Systems and Networks (POLICY 2007), 2007

Adapting Relational Database Engine to Accommodate Moving Objects in SpADE.
Proceedings of the 23rd International Conference on Data Engineering, 2007

Conditional Privacy-Aware Role Based Access Control.
Proceedings of the Computer Security, 2007

Data Management in RFID Applications.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Optimizing Moving Queries over Moving Object Data Streams.
Proceedings of the Advances in Databases: Concepts, 2007

2006
Indexing Fast Moving Objects for kNN Queries Based on Nearest Landmarks.
GeoInformatica, 2006

IMPACT: A twin-index framework for efficient moving object query processing.
Data Knowl. Eng., 2006

Effective Density Queries on ContinuouslyMoving Objects.
Proceedings of the 22nd International Conference on Data Engineering, 2006

2005
Efficient indexing of the historical, present, and future positions of moving objects.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

Towards Optimal Utilization of Main Memory for Moving Object Indexing.
Proceedings of the Database Systems for Advanced Applications, 2005

2004
Query and Update Efficient B+-Tree Based Indexing of Moving Objects.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004

ITQS: An Integrated Transport Query System.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2004


  Loading...