Feng Tian

Orcid: 0000-0002-5055-2511

Affiliations:
  • Shaanxi Normal University, College of Computer Science, Xi'an, China
  • Xi'an Jiaotong University, School of Electronic and Information Engineering, China (PhD 2015)


According to our database1, Feng Tian authored at least 24 papers between 2013 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
A Deep Model Intellectual Property Protection Method Supporting Public Verification.
Proceedings of the International Conference on Networking and Network Applications, 2023

2022
Fine-Grained Query Authorization With Integrity Verification Over Encrypted Spatial Data in Cloud Storage.
IEEE Trans. Cloud Comput., 2022

GDP vs. LDP: A Survey from the Perspective of Information-Theoretic Channel.
Entropy, 2022

2021
A Reconstruction Attack Scheme on Secure Outsourced Spatial Dataset in Vehicular Ad-Hoc Networks.
Secur. Commun. Networks, 2021

A Fine-tuning-based Adversarial Network for Member Privacy Preserving.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Privacy-Preserving Data Aggregation Framework for Mobile Service Based Multiuser Collaboration.
Int. Arab J. Inf. Technol., July, 2020

Bounded privacy-utility monotonicity indicating bounded tradeoff of differential privacy mechanisms.
Theor. Comput. Sci., 2020

Secure Spatial Query Scheme with Access Pattern Obfuscation.
Proceedings of the International Conference on Networking and Network Applications, 2020

2019
Adaptive Differential Privacy of Character and Its Application for Genome Data Sharing.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Secure Spatial Query with Differentially Private Access Pattern.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2018
Adaptive Gaussian Mechanism Based on Expected Data Utility under Conditional Filtering Noise.
KSII Trans. Internet Inf. Syst., 2018

Adaptive Differential Privacy Interactive Publishing Model Based on Dynamic Feedback.
Proceedings of the International Conference on Networking and Network Applications, 2018

2017
An Efficient Secret Key Homomorphic Encryption Used in Image Processing Service.
Secur. Commun. Networks, 2017

A New Method of Identifying Influential Users in the Micro-Blog Networks.
IEEE Access, 2017

A Novel Personalized Differential Privacy Mechanism for Trajectory Data Publication.
Proceedings of the International Conference on Networking and Network Applications, 2017

Perturbation Paradigms of Maintaining Privacy-Preserving Monotonicity for Differential Privacy.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2015
A DCT-based privacy-preserving approach for efficient data mining.
Secur. Commun. Networks, 2015

A Framework for Measuring Query Privacy in Location-based Service.
KSII Trans. Internet Inf. Syst., 2015

An encrypted image editing scheme based on homomorphic encryption.
Proceedings of the 2015 IEEE Conference on Computer Communications Workshops, 2015

2014
A Density-Based Space Filling Curve for Location Privacy-Preserving.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
A Security-Awareness Virtual Machine Placement Scheme in the Cloud.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Privacy-Preserving Data Obfuscation Scheme Used in Data Statistics and Data Mining.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Security Analysis for Hilbert Curve Based Spatial Data Privacy-Preserving Method.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

ICDM: An Encryption That Supports Unlimited Times Homomorphic Arithmetic Operations on Encrypted Data.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013


  Loading...