Jianneng Cao

According to our database1, Jianneng Cao authored at least 36 papers between 2008 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
PrivPfC: differentially private data publication for classification.
VLDB J., 2018

Privacy-preserving survey by crowdsourcing with smartphones.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Integrative Dynamic Reconfiguration in a Parallel Stream Processing Engine.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Transactions on Data Privacy, 2016

Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks.
Sensors, 2016

Integrative Dynamic Reconfiguration in a Parallel Stream Processing Engine.
CoRR, 2016

Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Repeat Buyer Prediction for E-Commerce.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Matrix Eigen-decomposition via Doubly Stochastic Riemannian Optimization.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Fuzzy trajectory linking.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Differentially Private $k$-Means Clustering.
CoRR, 2015

Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
CoRR, 2015

DAG: A Model for Privacy Preserving Computation.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Active learning for accurate analysis of streaming partial discharge data.
Proceedings of the 2015 IEEE Conference on Prognostics and Health Management, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Adaptive Grid-Based k-median Clustering of Streaming Data with Accuracy Guarantee.
Proceedings of the Database Systems for Advanced Applications, 2015

DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Proceedings of the 5th ACM Conference on Data and Application Security and Privacy, 2015

Distributed Sequence Pattern Detection Over Multiple Data Streams.
Proceedings of the Advances in Databases and Information Systems, 2015

Feedback Based Continuous Skyline Queries Over a Distributed Framework.
Proceedings of the Advances in Databases and Information Systems, 2015

2013
ASSIST: Access Controlled Ship Identification Streams.
Trans. Large-Scale Data- and Knowledge-Centered Systems, 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Privacy, 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

Efficient tree pattern queries on encrypted XML documents.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
PrivBasis: Frequent Itemset Mining with Differential Privacy.
PVLDB, 2012

Publishing Microdata with a Robust Privacy Guarantee.
PVLDB, 2012

Publishing Microdata with a Robust Privacy Guarantee
CoRR, 2012

PrivBasis: Frequent Itemset Mining with Differential Privacy
CoRR, 2012

2011
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness.
VLDB J., 2011

CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Sec. Comput., 2011

ASSIST: access controlled ship identification streams.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

2010
A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

rho-uncertainty: Inference-Proof Transaction Anonymization.
PVLDB, 2010

2009
ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008


  Loading...