Jianfeng Lu

According to our database1, Jianfeng Lu authored at least 19 papers between 2012 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing.
IEEE Access, 2019

2018
Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing.
IEEE Trans. Information Forensics and Security, 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Transactions, 2018

Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Generation Comp. Syst., 2018

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma.
IEEE Trans. Information Forensics and Security, 2017

Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Transactions, 2017

Zero-Determinant Strategy for Cooperation Enforcement in Crowdsourcing.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
Towards understanding the gamification upon users' scores in a location-based social network.
Multimedia Tools Appl., 2016

An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
IJHPCN, 2016

2015
Towards complexity analysis of User Authorization Query problem in RBAC.
Computers & Security, 2015

(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl.-Based Syst., 2014

On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
JSW, 2013

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012


  Loading...