LiWu Chang

According to our database1, LiWu Chang authored at least 39 papers between 1990 and 2011.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2011
Improvement of Teaching Mode and Its Effect on Experiments in Material Mechanics with Information Technology.
Proceedings of the Advances in Computer Science, Environment, Ecoinformatics, and Education, 2011

2008
Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data.
Proceedings of the Data Mining: Foundations and Practice, 2008

How to Prevent Private Data from being Disclosed to a Malicious Attacker.
Proceedings of the Data Mining: Foundations and Practice, 2008

2007
Distance Bounding Protocols: Authentication Logic Analysis and Collusion Attacks.
Proceedings of the Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks, 2007

Network intrusion detection through Adaptive Sub-Eigenspace Modeling in multiagent systems.
ACM Trans. Auton. Adapt. Syst., 2007

Privacy-preserving collaborative association rule mining.
J. Netw. Comput. Appl., 2007

Privacy-preserving multi-party decision tree induction.
Int. J. Bus. Intell. Data Min., 2007

Efficient algorithms for distortion and blocking techniques in association rule hiding.
Distributed Parallel Databases, 2007

2006
Privacy-Preserving Collaborative Data Mining.
Proceedings of the Foundations and Novel Approaches in Data Mining, 2006

Principal Component-based Anomaly Detection Scheme.
Proceedings of the Foundations and Novel Approaches in Data Mining, 2006

A Distributed Agent-Based Approach to Intrusion Detection Using the Lightweight PCC Anomaly Detection Classifier.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

Towards More Efficient Distance Bounding Protocols for Use in Sensor Networks.
Proceedings of the Second International Conference on Security and Privacy in Communication Networks and the Workshops, 2006

UNPCC: A Novel Unsupervised Classification Scheme for Network Intrusion Detection.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

Collateral Representative Subspace Projection Modeling for Supervised Classification.
Proceedings of the 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2006), 2006

2005
Privacy Preserving K-nearest Neighbor Classification.
Int. J. Netw. Secur., 2005

Preventing wormhole attacks on wireless ad hoc networks: a graph theoretic approach.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Handling Nominal Features in Anomaly Intrusion Detection Problems.
Proceedings of the 15th International Workshop on Research Issues in Data Engineering (RIDE-SDMA 2005), 2005

Private Mining of Association Rules.
Proceedings of the Intelligence and Security Informatics, 2005

Handling missing values via decomposition of the conditioned set.
Proceedings of the 2005 IEEE International Conference on Information Reuse and Integration, 2005

Building k-nearest neighbor classifiers on vertically partitioned private data.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

2004
A quantitative and qualitative ANALYSIS of blocking in association rule hiding.
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society, 2004

Privacy-Preserving Collaborative Association Rule Mining.
Proceedings of the Fourth International Conference on Electronic Business, 2004

Bayesian Network Induction With Incomplete Private Data.
Proceedings of the Fourth International Conference on Electronic Business, 2004

2003
An Agent-Based Approach to Inference Prevention in Distributed Database Systems.
Int. J. Artif. Intell. Tools, 2003

2002
Capacity is the wrong paradigm.
Proceedings of the 2002 Workshop on New Security Paradigms, 2002

A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis.
Proceedings of the Information Hiding, 5th International Workshop, 2002

A Study of Inference Problems in Distributed Databases.
Proceedings of the Research Directions in Data and Applications Security, 2002

2001
Randomly roving agents for intrusion detection.
Proceedings of the Database and Application Security XV, 2001

2000
A new paradigm hidden in steganography.
Proceedings of the 2000 Workshop on New Security Paradigms, 2000

An Integrated Framework for Database Privacy Protection.
Proceedings of the Data and Application Security, 2000

1999
An Entropy-Based Framework for Database Inference.
Proceedings of the Information Hiding, Third International Workshop, 1999

1998
Parsimonious Downgrading and Decision Trees Applied to the Inference Problem.
Proceedings of the 1998 Workshop on New Security Paradigms, 1998

Bayesian Methods to the Database Inference Problem.
Proceedings of the Database Security XII: Status and Prospects, 1998

1997
Critical analysis of security in voice hiding techniques.
Proceedings of the Information and Communication Security, First International Conference, 1997

1993
Study of interval belief combination.
J. Intell. Robotic Syst., 1993

Application of a Real-Time Control Strategy for Bayesian Belief Networks to Ship Classification Problem Solving.
Int. J. Pattern Recognit. Artif. Intell., 1993

A Study of Scaling Issues in Bayesian Belief Networks for Ship Classification.
Proceedings of the UAI '93: Proceedings of the Ninth Annual Conference on Uncertainty in Artificial Intelligence, 1993

1990
A real time control strategy for Bayesian belief networks with application to ship classification problem solving.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990

Study of interval-valued belief combination with conflicting evidence.
Proceedings of the 2nd International IEEE Conference on Tools for Artificial Intelligence, 1990


  Loading...