Jianmin Han

According to our database1, Jianmin Han authored at least 22 papers between 2005 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Regularized partial least squares for multi-label learning.
Int. J. Machine Learning & Cybernetics, 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Transactions, 2018

Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Generation Comp. Syst., 2018

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Transactions, 2017

Cooperation and distributed optimization for the unreliable wireless game with indirect reciprocity.
SCIENCE CHINA Information Sciences, 2017

An anonymization method combining anatomy and permutation for protecting privacy in microdata with multiple sensitive attributes.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
IJHPCN, 2016

2015
(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl.-Based Syst., 2014

Approximate Reliability Evaluation of Large-Scale Distributed Systems.
J. Inf. Sci. Eng., 2014

(l, e)-Diversity - A Privacy Preserving Model to Resist Semantic Similarity Attack.
JCP, 2014

On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
JSW, 2013

(k, ε)-Anonymity: An anonymity model for thwarting similarity attack.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

GN: A privacy preserving data publishing method based on generalization and noise techniques.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

2009
TopDown-KACA: An efficient local-recoding algorithm for k-anonymity.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2005
Complex Number Procedure Neural Networks.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...