Meiyi Xie

Orcid: 0000-0002-1973-7470

According to our database1, Meiyi Xie authored at least 23 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving.
Inf. Sci., January, 2024

2023
Item-Oriented Personalized LDP for Discrete Distribution Estimation.
Proceedings of the Computer Security - ESORICS 2023, 2023

2022
Group-based recurrent neural network for human mobility prediction.
Neural Comput. Appl., 2022

2021
Quantifying Location Privacy Risks Under Heterogeneous Correlations.
IEEE Access, 2021

CTP: Correlated Trajectory Publication with Differential Privacy.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2019
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release.
IEEE Access, 2019

LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations.
Proceedings of the 2019 IEEE SmartWorld, 2019

2018
EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe.
KSII Trans. Internet Inf. Syst., 2018

2017
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service.
Frontiers Comput. Sci., 2017

Convenient Top-k Location-Text Publish/Subscribe Scheme.
Proceedings of the Computational Intelligence and Intelligent Systems, 2017

2016
Privacy-preserving ranked neighbor query over encrypted graph data in the cloud.
Secur. Commun. Networks, 2016

Identity-based key management for cloud computing.
Secur. Commun. Networks, 2016

Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing.
KSII Trans. Internet Inf. Syst., 2016

Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy.
IEICE Trans. Commun., 2016

Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
A distributed scheme for row-based computational private information retrieval.
Secur. Commun. Networks, 2015

Anonymization on refining partition: Same privacy, more utility.
Comput. Sci. Inf. Syst., 2015

Autonomous Decentralized Tenant Access Control Model for Sub-tenancy Architecture in Software-as-a-Service (SaaS).
Proceedings of the Twelfth IEEE International Symposium on Autonomous Decentralized Systems, 2015

2014
Anonymization on refining partition: Same privacy, more utility.
Proceedings of the 2nd International Conference on Systems and Informatics, 2014

Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

Equi-join for Multiple Datasets Based on Time Cost Evaluation Model.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Fixed-length string compression for direct operations in column-oriented databases.
Proceedings of the Ninth International Conference on Natural Computation, 2013

2008
Tracking and Repairing Damaged Databases Using Before Image Table.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008


  Loading...