Justin Zhijun Zhan

Orcid: 0000-0001-5458-8282

According to our database1, Justin Zhijun Zhan authored at least 163 papers between 2002 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
BSSAD: Towards A Novel Bayesian State-Space Approach for Anomaly Detection in Multivariate Time Series.
CoRR, 2023

Effect of Dimensionality Reduction on Uncertainty Quantification in Trustworthy Machine Learning.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2023

2022
GHM Wavelet Transform for Deep Image Super Resolution.
CoRR, 2022

WaveNets: Wavelet Channel Attention Networks.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Modeling Cell Communication with Time-Dependent Signaling Hypergraphs.
IEEE ACM Trans. Comput. Biol. Bioinform., 2021

Artificial image objects for classification of schizophrenia with GWAS-selected SNVs and convolutional neural network.
Patterns, 2021

Learning Medical Materials From Radiography Images.
Frontiers Artif. Intell., 2021

A Comparative Study of Transformer-Based Language Models on Extractive Question Answering.
CoRR, 2021

A Physics-Informed Neural Network Framework For Partial Differential Equations on 3D Surfaces: Time-Dependent Problems.
CoRR, 2021

Clustering Hypergraphs via the MapEquation.
IEEE Access, 2021

Neighborhood Random Walk Graph Sampling for Regularized Bayesian Graph Convolutional Neural Networks.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021

2020
Towards a Novel Generalized Chinese Remainder Algorithm for Extended Rabin Cryptosystem.
IEEE Access, 2020

Robust Multimodal Heartbeat Detection Using Hybrid Neural Networks.
IEEE Access, 2020

A Physics-Informed Neural Network Framework for PDEs on 3D Surfaces: Time Independent Problems.
IEEE Access, 2020

Deep Physical Informed Neural Networks for Metamaterial Design.
IEEE Access, 2020

Using Convolutional Neural Networks to Analyze X-Ray Radiographs for Multi-Label Classifications of Thoracic Diseases.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Similarity Metric for Millions of Unlabeled Face Images.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Segregating Hazardous Waste Using Deep Neural Networks in Real-Time Video.
Proceedings of the 10th Annual Computing and Communication Workshop and Conference, 2020

Semi-Supervised Learning and Feature Fusion for Multi-view Data Clustering.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

A Cancelable Multi-Modal Biometric Based Encryption Scheme for Medical Images.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

Effective Mutation and Recombination for Evolving Convolutional Networks.
Proceedings of the APPIS 2020: 3rd International Conference on Applications of Intelligent Systems, 2020

2019
Resolving intravoxel white matter structures in the human brain using regularized regression and clustering.
J. Big Data, 2019

Advancing community detection using Keyword Attribute Search.
J. Big Data, 2019

Beyond Cumulative Sum Charting in Non-Stationarity Detection and Estimation.
IEEE Access, 2019

USRRM: Pairwise Ranking and Scoring Images Using Its Aesthetic Quality.
IEEE Access, 2019

An Evolutionary Approach to Compact DAG Neural Network Optimization.
IEEE Access, 2019

Deep Learning Based Shopping Assistant For The Visually Impaired.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

T-RECSYS: A Novel Music Recommendation System Using Deep Learning.
Proceedings of the IEEE International Conference on Consumer Electronics, 2019

Machine Learning Models for Paraphrase Identification and its Applications on Plagiarism Detection.
Proceedings of the 2019 IEEE International Conference on Big Knowledge, 2019

Highly Parallel Seedless Random Number Generation from Arbitrary Thread Schedule Reconstruction.
Proceedings of the 2019 IEEE International Conference on Big Knowledge, 2019

ScanAlert: Electronic Medication Monitor and Reminder to Improve Medical Adherence.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Towards Tattoo Previewing and Other Augmented/Mixed Reality Applications with Microsoft Kinect.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

Computer Vision for Attendance and Emotion Analysis in School Settings.
Proceedings of the IEEE 9th Annual Computing and Communication Workshop and Conference, 2019

2018
Exploiting highly qualified pattern with frequency and weight occupancy.
Knowl. Inf. Syst., 2018

Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework.
IEEE Access, 2018

Deep Learning for Link Prediction in Dynamic Networks Using Weak Estimators.
IEEE Access, 2018

Using Empirical Recurrence Rates Ratio for Time Series Data Similarity.
IEEE Access, 2018

Optimized Label Propagation Community Detection on Big Data Networks.
Proceedings of the 2018 International Conference on Big Data and Education, 2018

Optimized Rank Estimator in Big Data Social Networks.
Proceedings of the 2018 International Conference on Big Data and Education, 2018

Toward metadata removal to preserve privacy of social media users.
Proceedings of the IEEE 8th Annual Computing and Communication Workshop and Conference, 2018

An efficient alternative to personalized page rank for friend recommendations.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

Prediction of online social networks users' behaviors with a game theoretic approach.
Proceedings of the 15th IEEE Annual Consumer Communications & Networking Conference, 2018

2017
Data mining in distributed environment: a survey.
WIREs Data Mining Knowl. Discov., 2017

Cover Image, Volume 7, Issue 6.
WIREs Data Mining Knowl. Discov., 2017

A Framework for Community Detection in Large Networks Using Game-Theoretic Modeling.
IEEE Trans. Big Data, 2017

An ACO-based approach to mine high-utility itemsets.
Knowl. Based Syst., 2017

Efficient hiding of confidential high-utility itemsets with minimal side effects.
J. Exp. Theor. Artif. Intell., 2017

Vaccination allocation in large dynamic networks.
J. Big Data, 2017

Identification of top-K nodes in large networks using Katz centrality.
J. Big Data, 2017

Using deep learning for short text understanding.
J. Big Data, 2017

Efficient Mining of Multiple Fuzzy Frequent Itemsets.
Int. J. Fuzzy Syst., 2017

Mining of frequent patterns with multiple minimum supports.
Eng. Appl. Artif. Intell., 2017

Extracting recent weighted-based patterns from uncertain temporal databases.
Eng. Appl. Artif. Intell., 2017

Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets.
IEEE Access, 2017

Toward Efficient Hub-Less Real Time Personalized PageRank.
IEEE Access, 2017

Uncovering Suspicious Activity From Partially Paired and Incomplete Multimodal Data.
IEEE Access, 2017

A Novel Online and Non-Parametric Approach for Drift Detection in Big Data.
IEEE Access, 2017

A Novel Weak Estimator For Dynamic Systems.
IEEE Access, 2017

Using Proxies for Node Immunization Identification on Large Graphs.
IEEE Access, 2017

Toward predicting medical conditions using k-nearest neighbors.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Securing the positioning signals of autonomous vehicles.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Toward data quality analytics in signature verification using a convolutional neural network.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Efficient mining of high-utility itemsets using multiple minimum utility thresholds.
Knowl. Based Syst., 2016

Identification of top-K influential communities in big networks.
J. Big Data, 2016

Towards shortest path identification on large networks.
J. Big Data, 2016

An optimized approach for community detection and ranking.
J. Big Data, 2016

Optimized relativity search: node reduction in personalized page rank estimation for large graphs.
J. Big Data, 2016

Mining high-utility itemsets based on particle swarm optimization.
Eng. Appl. Artif. Intell., 2016

Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining.
Eng. Appl. Artif. Intell., 2016

A sanitization approach for hiding sensitive itemsets based on particle swarm optimization.
Eng. Appl. Artif. Intell., 2016

An efficient algorithm to mine high average-utility itemsets.
Adv. Eng. Informatics, 2016

Mining of High-Utility Itemsets by ACO Algorithm.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

Vulnerability Analysis of Iframe Attacks on Websites.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

An Efficient Anonymous System for Transaction Data.
Proceedings of the The 3rd Multidisciplinary International Social Networks Conference on SocialInformatics 2016, 2016

2015
Sentiment analysis using product review data.
J. Big Data, 2015

Erratum to: Structural and functional analytics for community detection in large-scale complex networks.
J. Big Data, 2015

Structural and functional analytics for community detection in large-scale complex networks.
J. Big Data, 2015

A course module on web tracking and privacy.
Proceedings of the 2015 Information Security Curriculum Development Conference, 2015

2014
A computational framework for detecting malicious actors in communities.
Int. J. Inf. Priv. Secur. Integr., 2014

An Information-Theoretic Approach for Secure Protocol Composition.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
Triple DoS: DDoS defence and traceback.
Int. J. Inf. Priv. Secur. Integr., 2013

IT convergence and security.
Electron. Commer. Res., 2013

Sociometric Methods for Relevancy Analysis of Long Tail Science Data.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Determining Appropriate Staffing Adjustments in a Call Center Staff Group.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Towards Network Reduction on Big Data.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

Towards Obesity Causes, Prevalence and Prevention.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

2012
Editorial: special issue on "social computing and e-business".
Inf. Syst. E Bus. Manag., 2012

A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection.
Proceedings of the 2012 International Conference on Privacy, 2012

Task-Oriented Social Ego Network Generation via Dynamic Collaborator Selection.
Proceedings of the 2012 International Conference on Privacy, 2012

SUCH: A Cloud Computing Management Tool.
Proceedings of the 5th International Conference on New Technologies, 2012

A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

Towards Defeating DDoS Attacks.
Proceedings of the 2012 ASE International Conference on Cyber Security, 2012

An artificial immune system for phishing detection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2012

2011
Anomaly Detection in Dynamic Systems Using Weak Estimators.
ACM Trans. Internet Techn., 2011

Social computing: the state of the art.
Int. J. Soc. Comput. Cyber Phys. Syst., 2011

Integrating privacy requirements considerations into a security requirements engineering method and tool.
Int. J. Inf. Priv. Secur. Integr., 2011

Top-K Algorithm for Recommendation in Social Networking Kingdoms.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

A Novel Trust Computing System for Social Networks.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Anomaly Detection in Social-Economic Computing.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Using Private Matching for Securely Querying Genomic Sequences.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011

Trust Maximization in Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2011

Location Privacy Protection on Social Networks.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2011

Anomaly detection using weak estimators.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Integrating online social networks for enhancing reputation systems of e-commerce.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

Using gaming strategies for attacker and defender in recommender systems.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2011

Phishing detection using stochastic learning-based weak estimators.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Trust optimization in task-oriented social networks.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

Location privacy protection on social networks.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
Privacy-Preserving Collaborative Recommender Systems.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Secure Collaborative Social Networks.
IEEE Trans. Syst. Man Cybern. Part C, 2010

Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService.
IEEE Trans. Mob. Comput., 2010

Granular computing in privacy-preserving data mining.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2010

Towards real-time performance of data privacy protection.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2010

P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users.
Proceedings of the 19th USENIX Security Symposium, 2010

A Computational Trust Framework for Social Computing (A Position Paper for Panel Discussion on Social Computing Foundations).
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Phishing Using a Modified Bayesian Technique.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Multi-party k-Means Clustering with Privacy Consideration.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2010

2009
Toward Empirical Aspects of Secure Scalar Product.
IEEE Trans. Syst. Man Cybern. Part C, 2009

Authentication Using Multi-level Social Networks.
Proceedings of the Knowledge Discovery, Knowlege Engineering and Knowledge Management, 2009

Importance of Data Standardization in Privacy-Preserving K-Means Clustering.
Proceedings of the Database Systems for Advanced Applications, 2009

Anomaly Detection in Dynamic Social Systems Using Weak Estimators.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Practical Values for Privacy.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

2008
Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data.
Proceedings of the Data Mining: Foundations and Practice, 2008

How to Prevent Private Data from being Disclosed to a Malicious Attacker.
Proceedings of the Data Mining: Foundations and Practice, 2008

Privacy-preserving collaborative data mining.
IEEE Comput. Intell. Mag., 2008

Privacy-Preserving Collaborative Social Networks.
Proceedings of the Intelligence and Security Informatics, 2008

Using Social Networks to Organize Researcher Community.
Proceedings of the Intelligence and Security Informatics, 2008

Privacy-Aware Access Control through Negotiation in Daily Life Service.
Proceedings of the Intelligence and Security Informatics, 2008

Efficient keyword index search over encrypted documents of groups.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Privacy-Preserving Collaborative E-Voting.
Proceedings of the Intelligence and Security Informatics, 2008

Towards Efficient Privacy-preserving Collaborative Recommender Systems.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Granular Computing in Privacy-preserving Data Mining.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Towards Real-time Performance of Data Value Hiding for Frequent Data Updates.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Scalar-product based Secure Two-party Computation.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Attribute-based Access Control using Combined Authentication Technologies.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Towards Improving QoS-Guided Scheduling in Grids.
Proceedings of the Third ChinaGrid Annual Conference, ChinaGrid 2008, Dunhuang, Gansu, 2008

Computer-Aided Privacy Requirements Elicitation Technique.
Proceedings of the 3rd IEEE Asia-Pacific Services Computing Conference, 2008

2007
Privacy-preserving collaborative association rule mining.
J. Netw. Comput. Appl., 2007

Privacy-Preserving Data Mining in Electronic Surveys.
Int. J. Netw. Secur., 2007

Privacy-preserving support vector machine classification.
Int. J. Intell. Inf. Database Syst., 2007

Privacy-preserving multi-party decision tree induction.
Int. J. Bus. Intell. Data Min., 2007

Secure Similarity Search.
IACR Cryptol. ePrint Arch., 2007

Privacy preserving K-Medoids clustering.
Proceedings of the IEEE International Conference on Systems, 2007

Collaboratively mining sequential patterns over private data.
Proceedings of the IEEE International Conference on Systems, 2007

Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Improved Customers' Privacy Preference Policy.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Measuring Topological Anonymity in Social Networks.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

A Verification Scheme for Data Aggregation in Data Mining.
Proceedings of the 2007 IEEE International Conference on Granular Computing, 2007

Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Quantifying Privacy for Privacy Preserving Data Mining.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

Efficient Privacy-Preserving Association Rule Mining: P4P Style.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2007

2006
Privacy-Preserving Collaborative Data Mining.
Proceedings of the Foundations and Novel Approaches in Data Mining, 2006

Using Cryptography for Privacy Protection in Data Mining Systems.
Proceedings of the Web Intelligence Meets Brain Informatics, 2006

Privacy-Oriented Collaborative Learning Systems.
Proceedings of the IEEE International Conference on Systems, 2006

A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Privacy Preserving K-nearest Neighbor Classification.
Int. J. Netw. Secur., 2005

Private Mining of Association Rules.
Proceedings of the Intelligence and Security Informatics, 2005

Building k-nearest neighbor classifiers on vertically partitioned private data.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

2004
Privacy-Preserving Collaborative Association Rule Mining.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Bayesian Network Induction With Incomplete Private Data.
Proceedings of the Fourth International Conference on Electronic Business, 2004

2003
Using randomized response techniques for privacy-preserving data mining.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

2002
A practical approach to solve Secure Multi-party Computation problems.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002


  Loading...