Gansen Zhao

According to our database1, Gansen Zhao authored at least 56 papers between 2004 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
A Research and Application Based on Gradient Boosting Decision Tree.
Proceedings of the Web Information Systems and Applications, 2018

2017
Triple-L: Improving CPS Disk I/O Performance in a Virtualized NAS Environment.
IEEE Systems Journal, 2017

A Unified Model for Detecting Privacy Leakage on Android.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

2016
A Two-Phase Space Resection Model for Accurate Topographic Reconstruction from Lunar Imagery with PushbroomScanners.
Sensors, 2016

Constructing authentication web in cloud computing.
Security and Communication Networks, 2016

Fast algorithms to evaluate collaborative filtering recommender systems.
Knowl.-Based Syst., 2016

Special Section on Advanced Technologies for Homeland and Cyber Defense.
Intelligent Automation & Soft Computing, 2016

Secure Access Control of E-Health System with Attribute-Based Encryption.
Intelligent Automation & Soft Computing, 2016

Writeback throttling in a virtualized system with SCM.
Frontiers Comput. Sci., 2016

Queries over Large-Scale Log Data of Hybrid Granularities.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

PARecommender: A Pattern-Based System for Route Recommendation.
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016

Queries over Large-Scale Incremental Data of Hybrid Granularities.
Proceedings of the 7th International Conference on Cloud Computing and Big Data, 2016

Online Prediction for Forex with an Optimized Experts Selection Model.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
A Multilevel Security Model for Search Engine Over Integrated Data.
Trans. Computational Collective Intelligence, 2015

Designing cloud-based electronic health record system with attribute-based encryption.
Multimedia Tools Appl., 2015

Resource Constrained Data Stream Clustering with Concept Drifting for Processing Sensor Data.
IJDWM, 2015

Image retrieval based on multi-concept detector and semantic correlation.
SCIENCE CHINA Information Sciences, 2015

Model and Comparison of Membership Testing Approach for Massive Data.
Proceedings of the International Conference on Cloud Computing and Big Data, 2015

Simple is Beautiful: An Online Collaborative Filtering Recommendation Solution with Higher Accuracy.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

2014
A Network-Friendly Disk I/O Optimization Framework in a Virtualized Cloud System.
Proceedings of the IEEE 8th International Symposium on Embedded Multicore/Manycore SoCs, 2014

A Novel Method in Extracranial Removal of Brain MR Images.
Proceedings of the Second International Conference on Information Technology and Quantitative Management, 2014

An Effective Clustering Algorithm for Auto-Detecting Well-Separated Clusters.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Schema Conversion Model of SQL Database to NoSQL.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

Multiple Nested Schema of HBase for Migration from SQL.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Semantic description of scholar-oriented social network cloud.
The Journal of Supercomputing, 2013

Isolated Word Speech Recognition System Based On FPGA.
JCP, 2013

Efficient integer span program for hierarchical threshold access structure.
Inf. Process. Lett., 2013

A Concept Drifting Based Clustering Framework for Data Streams.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Modeling MongoDB with Relational Model.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

Trust Management for IaaS with Group Signature.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

On the Construction of Trusted Resource Pool in Clouds.
Proceedings of the 2013 10th Web Information System and Application Conference, 2013

Contructing Authentication Web in Cloud Computing.
Proceedings of the 2013 International Conference on Cloud and Service Computing, 2013

Resource Pool Oriented Trust Management for Cloud Infrastructure.
Proceedings of the 2013 International Conference on Availability, Reliability and Security, 2013

2012
Reference deployment models for eliminating user concerns on cloud security.
The Journal of Supercomputing, 2012

The design of a redundant array of independent net-storages for improved confidentiality in cloud computing.
J. Cloud Computing, 2012

Isolated Word Speech Rcogniton Based on HRSF and Improved DTW Algorithm.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, 2012

Social Recommendation Based on Multi-relational Analysis.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Intelligent Agent Technology, 2012

A fast estimation of shortest path distance for power-law network predominant cloud service.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012

Privacy Enhancing Framework on PaaS.
Proceedings of the 2012 International Conference on Cloud and Service Computing, 2012

2011
A Cryptographic Protocol for Communication in a Redundant Array of Independent Net-storages.
Proceedings of the IEEE 3rd International Conference on Cloud Computing Technology and Science, 2011

2010
Deployment models: Towards eliminating security concerns from cloud computing.
Proceedings of the 2010 International Conference on High Performance Computing & Simulation, 2010

Trusted Data Sharing over Untrusted Cloud Storage Providers.
Proceedings of the Cloud Computing, Second International Conference, 2010

Fine-Grained Data Access Control Systems with User Accountability in Cloud Computing.
Proceedings of the Cloud Computing, Second International Conference, 2010

2009
Cloud Computing: A Statistics Aspect of Users.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Strengthen Cloud Computing Security with Federal Identity Management Using Hierarchical Identity-Based Cryptography.
Proceedings of the Cloud Computing, First International Conference, CloudCom 2009, Beijing, 2009

Privacy-Preserving Distributed k-Nearest Neighbor Mining on Horizontally Partitioned Multi-Party Data.
Proceedings of the Advanced Data Mining and Applications, 5th International Conference, 2009

How to Securely Break into RBAC: The BTG-RBAC Model.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009

2008
PERMIS: a modular authorization infrastructure.
Concurrency and Computation: Practice and Experience, 2008

On the Modeling of Bell-LaPadula Security Policies Using RBAC.
Proceedings of the 17th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises, 2008

A Role-Based Access Control Model for Complex Affairs.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
Obligations for Role Based Access Control.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Distributed Key Management for Secure Role based Messaging.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Trust Infrastructure for Policy based Messaging In Open Environments.
Proceedings of the 14th IEEE International Workshops on Enabling Technologies (WETICE 2005), 2005

Evolving Messaging Systems for Secure Role Based Messaging.
Proceedings of the 10th International Conference on Engineering of Complex Computer Systems (ICECCS 2005), 2005

An Agent-Based Model For Web Services Transaction Processing.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
Secure Role Based Messaging.
Proceedings of the Communications and Multimedia Security, 2004


  Loading...