Jianmin Han

Orcid: 0000-0003-1345-6798

According to our database1, Jianmin Han authored at least 40 papers between 2005 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Towards energy-efficient and time-sensitive task assignment in cross-silo federated learning.
J. King Saud Univ. Comput. Inf. Sci., 2023

PGAN-KD:Member Privacy Protection of GANs Based on Knowledge Distillation.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
DP-CSM: Efficient Differentially Private Synthesis for Human Mobility Trajectory with Coresets and Staircase Mechanism.
ISPRS Int. J. Geo Inf., December, 2022

Locating Sources in Multiplex Networks for Linear Diffusion Systems.
IEEE Trans. Netw. Sci. Eng., 2022

A Transformer decoder-based Generative Adversarial Model with TrajLoss Function for Privacy-Preserving Trajectory Publishing.
Proceedings of the 5th International Conference on Machine Learning and Natural Language Processing, 2022

2021
A Security Scheme Based on Intranal-Adding Links for Integrated Industrial Cyber-Physical Systems.
Sensors, 2021

Security Assessment for Interdependent Heterogeneous Cyber Physical Systems.
Mob. Networks Appl., 2021

Differentially private and utility-aware publication of trajectory data.
Expert Syst. Appl., 2021

An Improved Genetic Algorithm for Safety and Availability Checking in Cyber-Physical Systems.
IEEE Access, 2021

Location Differential Privacy Protection in Task Allocation for Mobile Crowdsensing Over Road Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2021

2020
Online Rating Protocol Using Endogenous and Incremental Learning Design for Mobile Crowdsensing.
IEEE Trans. Veh. Technol., 2020

Security Evaluation under Different Exchange Strategies Based on Heterogeneous CPS Model in Interdependent Sensor Networks.
Sensors, 2020

Reliability Analysis of Heterogeneous CPS Under Different Swapping Inter-links Strategies.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Risk Assessment of Heterogeneous CPS Systems Under Different Proportions of Links.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Robustness Enhancement Analysis of CPS Systems Under the Swapping Strategies Between Different Networks.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Invulnerability of Heterogeneous CPFS Under Different Intranal Border-adding Strategies.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Differentially Private Location Preservation with Staircase Mechanism Under Temporal Correlations.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Multi-Level Two-Sided Rating Protocol Design for Service Exchange Contest Dilemma in Crowdsensing.
IEEE Access, 2019

2018
Regularized partial least squares for multi-label learning.
Int. J. Mach. Learn. Cybern., 2018

Detecting Regularities of Traffic Signal Timing Using GPS Trajectories.
IEICE Trans. Inf. Syst., 2018

Supporting user authorization queries in RBAC systems by role-permission reassignment.
Future Gener. Comput. Syst., 2018

Incentive Mechanism for User Collaboration on Trajectory Privacy Preservation.
Proceedings of the 2018 IEEE SmartWorld, 2018

A Two-Step Choice Privacy-Preservation Method for Check-in Data Publishing.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

2017
Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.
IEICE Trans. Inf. Syst., 2017

Cooperation and distributed optimization for the unreliable wireless game with indirect reciprocity.
Sci. China Inf. Sci., 2017

An anonymization method combining anatomy and permutation for protecting privacy in microdata with multiple sensitive attributes.
Proceedings of the 2017 International Conference on Machine Learning and Cybernetics, 2017

Supporting User Authorization Queries in RBAC Systems by Role-Permission Reassignment.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

An Anonymization Method to Improve Data Utility for Classification.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
An anonymity mechanism with reduced server-side cost in peer-to-peer networks.
Int. J. High Perform. Comput. Netw., 2016

2015
(C, K)m-Anonymity: A Model to Resist Sub-trajectory Linkage Attacks.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
MAGE: A semantics retaining K-anonymization method for mixed data.
Knowl. Based Syst., 2014

Approximate Reliability Evaluation of Large-Scale Distributed Systems.
J. Inf. Sci. Eng., 2014

(l, e)-Diversity - A Privacy Preserving Model to Resist Semantic Similarity Attack.
J. Comput., 2014

On the complexity of role updating feasibility problem in RBAC.
Inf. Process. Lett., 2014

2013
SLOMS: A Privacy Preserving Data Publishing Method for Multiple Sensitive Attributes Microdata.
J. Softw., 2013

(k, ε)-Anonymity: An anonymity model for thwarting similarity attack.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

GN: A privacy preserving data publishing method based on generalization and noise techniques.
Proceedings of the 2013 IEEE International Conference on Granular Computing, 2013

2012
Safety and Availability Checking for User Authorization Queries in RBAC.
Int. J. Comput. Intell. Syst., 2012

2009
TopDown-KACA: An efficient local-recoding algorithm for k-anonymity.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

2005
Complex Number Procedure Neural Networks.
Proceedings of the Advances in Natural Computation, First International Conference, 2005


  Loading...