Jianneng Cao

According to our database1, Jianneng Cao authored at least 35 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Greedy discrete particle swarm optimization based routing protocol for cluster-based wireless sensor networks.
J. Ambient Intell. Humaniz. Comput., February, 2024

2022
One-off Disclosure Control by Heterogeneous Generalization.
Proceedings of the 31st USENIX Security Symposium, 2022

2020
DAG: A General Model for Privacy-Preserving Data Mining.
IEEE Trans. Knowl. Data Eng., 2020

DAG: A General Model for Privacy-Preserving Data Mining : (Extended Abstract).
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

2019
Hybrid Private Record Linkage: Separating Differentially Private Synopses from Matching Records.
ACM Trans. Priv. Secur., 2019

2018
PrivPfC: differentially private data publication for classification.
VLDB J., 2018

Privacy-preserving survey by crowdsourcing with smartphones.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

2017
Differentially Private K-Means Clustering and a Hybrid Approach to Private Optimization.
ACM Trans. Priv. Secur., 2017

Integrative Dynamic Reconfiguration in a Parallel Stream Processing Engine.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
DBMask: Fine-Grained Access Control on Encrypted Relational Databases.
Trans. Data Priv., 2016

Discrete Particle Swarm Optimization Routing Protocol for Wireless Sensor Networks with Multiple Mobile Sinks.
Sensors, 2016

Active Learning for On-Line Partial Discharge Monitoring in Noisy Environments.
Proceedings of the IEEE 17th International Conference on Mobile Data Management, 2016

Repeat Buyer Prediction for E-Commerce.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Matrix Eigen-decomposition via Doubly Stochastic Riemannian Optimization.
Proceedings of the 33nd International Conference on Machine Learning, 2016

Fuzzy trajectory linking.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

Differentially Private K-Means Clustering.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

2015
Differentially Private Projected Histograms of Multi-Attribute Data for Classification.
CoRR, 2015

DAG: A Model for Privacy Preserving Computation.
Proceedings of the 2015 IEEE International Conference on Web Services, 2015

Active learning for accurate analysis of streaming partial discharge data.
Proceedings of the 2015 IEEE Conference on Prognostics and Health Management, 2015

A hybrid private record linkage scheme: Separating differentially private synopses from matching records.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

Adaptive Grid-Based k-median Clustering of Streaming Data with Accuracy Guarantee.
Proceedings of the Database Systems for Advanced Applications, 2015

Distributed Sequence Pattern Detection Over Multiple Data Streams.
Proceedings of the Advances in Databases and Information Systems, 2015

Feedback Based Continuous Skyline Queries Over a Distributed Framework.
Proceedings of the Advances in Databases and Information Systems, 2015

2013
ASSIST: Access Controlled Ship Identification Streams.
Trans. Large Scale Data Knowl. Centered Syst., 2013

Efficient Tree Pattern Queries On Encrypted XML Documents.
Trans. Data Priv., 2013

Efficient and accurate strategies for differentially-private sliding window queries.
Proceedings of the Joint 2013 EDBT/ICDT Conferences, 2013

2012
PrivBasis: Frequent Itemset Mining with Differential Privacy.
Proc. VLDB Endow., 2012

Publishing Microdata with a Robust Privacy Guarantee.
Proc. VLDB Endow., 2012

2011
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for <i>t</i>-closeness.
VLDB J., 2011

CASTLE: Continuously Anonymizing Data Streams.
IEEE Trans. Dependable Secur. Comput., 2011

ASSIST: access controlled ship identification streams.
Proceedings of the 19th ACM SIGSPATIAL International Symposium on Advances in Geographic Information Systems, 2011

2010
A framework to enforce access control over data streams.
ACM Trans. Inf. Syst. Secur., 2010

rho-uncertainty: Inference-Proof Transaction Anonymization.
Proc. VLDB Endow., 2010

2009
ACStream: Enforcing Access Control over Data Streams.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
CASTLE: A delay-constrained scheme for ks-anonymizing data streams.
Proceedings of the 24th International Conference on Data Engineering, 2008


  Loading...