Nan Zhang

According to our database1, Nan Zhang authored at least 93 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Efficient Signal Reconstruction for a Broad Range of Applications.
SIGMOD Record, 2019

RRR: Rank-Regret Representative.
Proceedings of the 2019 International Conference on Management of Data, 2019

2018
Leveraging Similarity Joins for Signal Reconstruction.
PVLDB, 2018

DBLOC: Density Based Clustering over LOCation Based Services.
Proceedings of the 2018 International Conference on Management of Data, 2018

QR2: A Third-Party Query Reranking Service over Web Databases.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
A Survey on Internet of Things: Architecture, Enabling Technologies, Security and Privacy, and Applications.
IEEE Internet of Things Journal, 2017

Conceptual data sampling for breast cancer histology image classification.
Comp. in Bio. and Med., 2017

Efficient Computation of Regret-ratio Minimizing Set: A Compact Maxima Representative.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

HDBExpDetector: Aggregate Sudden-Change Detector over Dynamic Web Databases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Density Based Clustering over Location Based Services.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

2016
Faster Random Walks by Rewiring Online Social Networks On-the-Fly.
ACM Trans. Database Syst., 2016

Password Extraction via Reconstructed Wireless Mouse Trajectory.
IEEE Trans. Dependable Sec. Comput., 2016

Query Reranking As A Service.
PVLDB, 2016

Discovering the Skyline of Web Databases.
PVLDB, 2016

Discover Aggregates Exceptions over Hidden Web Databases.
CoRR, 2016

HDBSCAN: Density based Clustering over Location Based Services.
CoRR, 2016

ANALOC: Efficient analytics over Location Based Services.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

2015
Swiper: Exploiting Virtual Machine Vulnerability in Third-Party Clouds with Competition for I/O Resources.
IEEE Trans. Parallel Distrib. Syst., 2015

Aggregate Estimation in Hidden Databases with Checkbox Interfaces.
IEEE Trans. Knowl. Data Eng., 2015

Leveraging History for Faster Sampling of Online Social Networks.
PVLDB, 2015

Privacy Implications of Database Ranking.
PVLDB, 2015

Walk, Not Wait: Faster Sampling Over Online Social Networks.
PVLDB, 2015

Aggregate Estimations over Location Based Services.
PVLDB, 2015

TrustRank: a Cold-Start tolerant recommender system.
Enterprise IS, 2015

Hidden Database Research and Analytics (HYDRA) System .
IEEE Data Eng. Bull., 2015

Privacy Disclosure from Wearable Devices.
Proceedings of the 2015 Workshop on Privacy-Aware Mobile Computing, 2015

Querying Hidden Attributes in an Online Community Network.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

Answering Complex Queries in an Online Community Network.
Proceedings of the Ninth International Conference on Web and Social Media, 2015

2014
On False Data-Injection Attacks against Power System State Estimation: Modeling and Countermeasures.
IEEE Trans. Parallel Distrib. Syst., 2014

On Skyline Groups.
IEEE Trans. Knowl. Data Eng., 2014

Aggregate Estimation Over Dynamic Hidden Web Databases.
PVLDB, 2014

HDBTracker: Monitoring the Aggregates On Dynamic Hidden Web Databases.
PVLDB, 2014

Rank-Based Inference over Web Databases.
CoRR, 2014

Exploration and mining of web repositories.
Proceedings of the Seventh ACM International Conference on Web Search and Data Mining, 2014

Aggregate estimation over a microblog platform.
Proceedings of the International Conference on Management of Data, 2014

Query Hidden Attributes in Social Networks.
Proceedings of the 2014 IEEE International Conference on Data Mining Workshops, 2014

Anything You Can Do, I Can Do Better: Finding Expert Teams by CrewScout.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Time-Bounded Essential Localization for Wireless Sensor Networks.
IEEE/ACM Trans. Netw., 2013

Rank Discovery From Web Databases.
PVLDB, 2013

How Privacy Leaks From Bluetooth Mouse?
Proceedings of the 20th Annual Network and Distributed System Security Symposium, 2013

Breaking the top-k barrier of hidden web databases?
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

On effective localization attacks against Internet Threat monitors.
Proceedings of IEEE International Conference on Communications, 2013

Mining a search engine's corpus without a query pool.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
The Digital Marauder's Map: A WiFi Forensic Positioning Tool.
IEEE Trans. Mob. Comput., 2012

Just-in-Time Analytics on Large File Systems.
IEEE Trans. Computers, 2012

Optimal Algorithms for Crawling a Hidden Database in the Web.
PVLDB, 2012

No Silver Bullet: Identifying Security Vulnerabilities in Anonymization Protocols for Hospital Databases.
IJHISI, 2012

Digging Deeper into Deep Web Databases by Breaking Through the Top-k Barrier
CoRR, 2012

A context-aware scheme for privacy-preserving location-based services.
Comput. Networks, 2012

Brief Announcement: Detecting Users' Connectivity on Online Social Networks.
Proceedings of the Stabilization, Safety, and Security of Distributed Systems, 2012

Aggregate suppression for enterprise search engines.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2012

How privacy leaks from bluetooth mouse?
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Privacy-Preserving OLAP: An Information-Theoretic Approach.
IEEE Trans. Knowl. Data Eng., 2011

Randomized Generalization for Aggregate Suppression Over Hidden Web Databases.
PVLDB, 2011

Exploration of Deep Web Repositories.
PVLDB, 2011

ASAP: Eliminating algorithm-based disclosure in privacy-preserving data publishing.
Inf. Syst., 2011

Preserving Relation Privacy in Online Social Network Data.
IEEE Internet Computing, 2011

Message from the workshop chairs.
Proceedings of the 12th IEEE International Symposium on a World of Wireless, 2011

Mining a search engine's corpus: efficient yet unbiased sampling and aggregate estimation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Attribute domain discovery for hidden web databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

MOBIES: mobile-interface enhancement service for hidden web database.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2011

Practitioners' Challenges Panel: The Challenges and Opportunities of Forensic Investigation over Large Data Sets: Timeliness vs Precision vs Comprehensiveness.
Proceedings of the 2011 IEEE Sixth International Workshop on Systematic Approaches to Digital Forensic Engineering, 2011

Sparse target counting and localization in sensor networks based on compressive sensing.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Protection of query privacy for continuous location based services.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

On a Hierarchical False Data Injection Attack on Power System State Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Maintaining Defender's Reputation in Anomaly Detection Against Insider Attacks.
IEEE Trans. Systems, Man, and Cybernetics, Part B, 2010

Self-Disciplinary Worms and Countermeasures: Modeling and Analysis.
IEEE Trans. Parallel Distrib. Syst., 2010

Localization Attacks to Internet Threat Monitors: Modeling and Countermeasures.
IEEE Trans. Computers, 2010

Unbiased estimation of size and other aggregates over hidden web databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Time-Bounded Essential Localization for Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010

Versatile publishing for privacy preservation.
Proceedings of the 16th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2010

3DLoc: Three Dimensional Wireless Localization Toolkit.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity.
Proceedings of the Decision and Game Theory for Security, 2010

Algorithm-safe privacy-preserving data publishing.
Proceedings of the EDBT 2010, 2010

Turbo-charging hidden database samplers with overflowing queries and skew reduction.
Proceedings of the EDBT 2010, 2010

2009
Privacy preservation in wireless sensor networks: A state-of-the-art survey.
Ad Hoc Networks, 2009

Discovery and Protection of Sensitive Linkage Information for Online Social Networks Services.
Proceedings of the Wireless Algorithms, 2009

HDSampler: revealing data behind web form interfaces.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Privacy preservation of aggregates in hidden databases: why and how?
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

Privacy risks in health databases from aggregate disclosure.
Proceedings of the 2nd International Conference on Pervasive Technologies Related to Assistive Environments, 2009

Leveraging COUNT Information in Sampling Hidden Databases.
Proceedings of the 25th International Conference on Data Engineering, 2009

CAP: A Context-Aware Privacy Protection System for Location-Based Services.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

The Digital Marauder's Map: A New Threat to Location Privacy.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Privacy Protection Against Malicious Adversaries in Distributed Information Sharing Systems.
IEEE Trans. Knowl. Data Eng., 2008

Towards Effective Defense Against Insider Attacks: The Establishment of Defender's Reputation.
Proceedings of the 14th International Conference on Parallel and Distributed Systems, 2008

On localization attacks to Internet Threat Monitors: An information-theoretic framework.
Proceedings of the 38th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2008

2007
Privacy-Preserving Data Mining Systems.
IEEE Computer, 2007

2006
Self-adaptive Worms and Countermeasures.
Proceedings of the Stabilization, 2006

2005
Distributed Privacy Preserving Information Sharing.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Performance Measurements for Privacy Preserving Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2005

A new scheme on privacy-preserving data classification.
Proceedings of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2005

2004
A New Scheme on Privacy Preserving Association Rule Mining.
Proceedings of the Knowledge Discovery in Databases: PKDD 2004, 2004

Cardinality-based inference control in OLAP systems: an information theoretic approach.
Proceedings of the DOLAP 2004, 2004


  Loading...