Tianqing Zhu

According to our database1, Tianqing Zhu authored at least 67 papers between 2006 and 2020.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


Correlated Differential Privacy: Feature Selection in Machine Learning.
IEEE Trans. Ind. Informatics, 2020

A flexible method to defend against computationally resourceful miners in blockchain proof of work.
Inf. Sci., 2020

BoSMoS: A Blockchain-Based Status Monitoring System for Defending Against Unauthorized Software Updating in Industrial Internet of Things.
IEEE Internet Things J., 2020

Differentially private model publishing in cyber physical systems.
Future Gener. Comput. Syst., 2020

Private collaborative filtering under untrusted recommender server.
Future Gener. Comput. Syst., 2020

Secure and efficient sharing of authenticated energy usage data with privacy preservation.
Comput. Secur., 2020

Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.
IEEE Trans. Dependable Secur. Comput., 2019

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Symmetry, 2019

CaACBIM: A Context-aware Access Control Model for BIM.
Information, 2019

SaaS: A situational awareness and analysis system for massive android malware detection.
Future Gener. Comput. Syst., 2019

A blockchain-based location privacy-preserving crowdsensing system.
Future Gener. Comput. Syst., 2019

Decentralized Learning with Average Difference Aggregation for Proactive Online Social Care.
CoRR, 2019

A differentially private method for crowdsourcing data submission.
Concurr. Comput. Pract. Exp., 2019

Adversaries or allies? Privacy and deep learning in big data era.
Concurr. Comput. Pract. Exp., 2019

Optimizing rewards allocation for privacy-preserving spatial crowdsourcing.
Comput. Commun., 2019

PICEAdatabase: a web database for Picea omics and phenotypic information.
Database, 2019

PBCert: Privacy-Preserving Blockchain-Based Certificate Status Validation Toward Mass Storage Management.
IEEE Access, 2019

Applying Differential Privacy Mechanism in Artificial Intelligence.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

Differential Privacy Preservation for Smart Meter Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Simultaneously Advising via Differential Privacy in Cloud Servers Environment.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Protecting Privacy-Sensitive Locations in Trajectories with Correlated Positions.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

Detecting Suicidal Ideation with Data Protection in Online Communities.
Proceedings of the Database Systems for Advanced Applications, 2019

A Watermark-Based In-Situ Access Control Model for Image Big Data.
Future Internet, 2018

Answering differentially private queries for continual datasets release.
Future Gener. Comput. Syst., 2018

RIMS: A Real-time and Intelligent Monitoring System for live-broadcasting platforms.
Future Gener. Comput. Syst., 2018

An iteration-based differentially private social network data release.
Comput. Syst. Sci. Eng., 2018

Performance and Security Evaluations of Identity- and Pairing-Based Digital Signature Algorithms on Windows, Android, and Linux Platforms: Revisiting the Algorithms of Cha and Cheon, Hess, Barreto, Libert, Mccullagh and Quisquater, and Paterson and Schuldt.
IEEE Access, 2018

Cryptanalysis of a Lightweight Certificateless Signature Scheme for IIOT Environments.
IEEE Access, 2018

Density-Based Location Preservation for Mobile Crowdsensing With Differential Privacy.
IEEE Access, 2018

Differential Private POI Queries via Johnson-Lindenstrauss Transform.
IEEE Access, 2018

Machine Learning Differential Privacy With Multifunctional Aggregation in a Fog Computing Architecture.
IEEE Access, 2018

Location Privacy and Its Applications: A Systematic Study.
IEEE Access, 2018

Lico: A Lightweight Access Control Model for Inter-Networking Linkages.
IEEE Access, 2018

A Differentially Private Method for Crowdsourcing Data Submission.
Proceedings of the Trends and Applications in Knowledge Discovery and Data Mining, 2018

MoSa: A Modeling and Sentiment Analysis System for Mobile Application Big Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Using Adversarial Noises to Protect Privacy in Deep Learning Era.
Proceedings of the IEEE Global Communications Conference, 2018

Location Privacy in Mobile Applications
Springer, ISBN: 978-981-13-1704-0, 2018

Differential Privacy and Applications
Advances in Information Security 69, Springer, ISBN: 978-3-319-62002-2, 2017

Invisible Hand: A Privacy Preserving Mobile Crowd Sensing Framework Based on Economic Models.
IEEE Trans. Veh. Technol., 2017

Differentially Private Data Publishing and Analysis: A Survey.
IEEE Trans. Knowl. Data Eng., 2017

A cyber-threat analytic model for autonomous detection of virtual property theft.
Inf. Comput. Secur., 2017

Evolutionary virus immune strategy for temporal networks based on community vitality.
Future Gener. Comput. Syst., 2017

Reward-based spatial crowdsourcing with differential privacy preservation.
Enterprise IS, 2017

Privacy Preserving Collaborative Filtering via the Johnson-Lindenstrauss Transform.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

CloudController: A Writable and Heterogeneous-Adaptive Virtual Machine Introspection for Cloud Management.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Personalized Privacy Preserving Collaborative Filtering.
Proceedings of the Green, Pervasive, and Cloud Computing - 12th International Conference, 2017

Differentially private query learning: From data publishing to model publishing.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Silence is Golden: Enhancing Privacy of Location-Based Services by Content Broadcasting and Active Caching in Wireless Vehicular Networks.
IEEE Trans. Veh. Technol., 2016

Taming transitive permission attack via bytecode rewriting on Android application.
Security and Communication Networks, 2016

Privacy-preserving topic model for tagging recommender systems.
Knowl. Inf. Syst., 2016

A differentially private algorithm for location data release.
Knowl. Inf. Syst., 2016

Semantic analysis in location privacy preserving.
Concurr. Comput. Pract. Exp., 2016

Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining.
Proceedings of the 4th International Conference on Enterprise Systems, 2016

Privacy preserving data release for tagging recommender systems.
Web Intell., 2015

Correlated Differential Privacy: Hiding Information in Non-IID Data Set.
IEEE Trans. Information Forensics and Security, 2015

Privacy preserving collaborative filtering for KNN attack resisting.
Social Netw. Analys. Mining, 2014

An effective privacy preserving algorithm for neighborhood-based collaborative filtering.
Future Gener. Comput. Syst., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

Deferentially Private Tagging Recommendation Based on Topic Model.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014

Privacy Preserving for Tagging Recommender Systems.
Proceedings of the 2013 IEEE/WIC/ACM International Conferences on Web Intelligence, 2013

An Effective Deferentially Private Data Releasing Algorithm for Decision Tree.
Proceedings of the 12th IEEE International Conference on Trust, 2013

Top-N Recommendations by Learning User Preference Dynamics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.
Proceedings of the Behavior and Social Computing, 2013

Differential privacy for neighborhood-based collaborative filtering.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

AMDD: Exploring Entropy Based Anonymous Multi-dimensional Data Detection for Network Optimization in Human Associated DTNs.
Proceedings of the 11th IEEE International Conference on Trust, 2012

An Outlier Detection Model Based on Cross Datasets Comparison for Financial Surveillance.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006

Suspicious Financial Transaction Detection Based on Empirical Mode Decomposition Method.
Proceedings of The 1st IEEE Asia-Pacific Services Computing Conference, 2006