Xianxian Li

According to our database1, Xianxian Li authored at least 47 papers between 2002 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2020
Local differential privacy for social network publishing.
Neurocomputing, 2020

Top-k closed co-occurrence patterns mining with differential privacy over multiple streams.
Future Gener. Comput. Syst., 2020

GCBlock: A Grouping and Coding Based Storage Scheme for Blockchain System.
IEEE Access, 2020

A Privacy Preserving Method for Publishing Set-valued Data and Its Correlative Social Network.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Correlation-aware partitioning for skewed range query optimization.
World Wide Web, 2019

Two privacy-preserving approaches for data publishing with identity reservation.
Knowl. Inf. Syst., 2019

A three-phase approach to differentially private crucial patterns mining over data streams.
Comput. Secur., 2019

Information Entropy Differential Privacy: A Differential Privacy Protection Data Method Based on Rough Set Theory.
Proceedings of the 2019 IEEE Intl Conf on Dependable, 2019

2018
A Multi-Level Privacy-Preserving Approach to Hierarchical Data Based on Fuzzy Set Theory.
Symmetry, 2018

M-generalization for multipurpose transactional data publication.
Frontiers Comput. Sci., 2018

A graph-based multifold model for anonymizing data with attributes of multiple types.
Comput. Secur., 2018

Two Privacy-Preserving Approaches for Publishing Transactional Data Streams.
IEEE Access, 2018

A Hierarchical k-Anonymous Technique of Graphlet Structural Perception in Social Network Publishing.
Proceedings of the Mobile, Secure, and Programmable Networking, 2018

2017
移动商务推荐系统中的一种基于P2P的隐私保护策略 (P2P-based Privacy Protection Strategy in Mobile-commerce Recommender System).
计算机科学, 2017

Partial k-Anonymity for Privacy-Preserving Social Network Data Publishing.
Int. J. Softw. Eng. Knowl. Eng., 2017

A privacy-preserving approach for multimodal transaction data integrated analysis.
Neurocomputing, 2017

A Study of Enhancing Privacy for Intelligent Transportation Systems: $k$ -Correlation Privacy Model Against Moving Preference Attacks for Location Trajectory Data.
IEEE Access, 2017

Randomized Perturbation for Privacy-Preserving Social Network Data Publishing.
Proceedings of the IEEE International Conference on Big Knowledge, 2017

Anonymizing approach to resist label-neighborhood attacks in dynamic releases of social networks.
Proceedings of the 19th IEEE International Conference on e-Health Networking, 2017

Transparent Link: A Framework of Anonymizing MSA-Dataset Based on Probabilistic Graphical Model.
Proceedings of the Third IEEE International Conference on Big Data Computing Service and Applications, 2017

2016
Robust Image Hashing With Ring Partition and Invariant Vector Distance.
IEEE Trans. Inf. Forensics Secur., 2016

ROAT: Road-Network-Based Anonymization of Trajectories.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

A Local-Perturbation Anonymizing Approach to Preserving Community Structure in Released Social Networks.
Proceedings of the Quality, Reliability, Security and Robustness in Heterogeneous Networks, 2016

A Sensitivity-Adaptive ρ-Uncertainty Model for Set-Valued Data.
Proceedings of the Financial Cryptography and Data Security, 2016

2015
社会网络分析软件研究 (Study of Social Network Analysis Software).
计算机科学, 2015

A Hybrid Optimization Approach for Anonymizing Transactional Data.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A Clustering-Based Bipartite Graph Privacy-Preserving Approach for Sharing High-Dimensional Data.
Int. J. Softw. Eng. Knowl. Eng., 2014

A Personalized Privacy Preserving Method for Publishing Social Network Data.
Proceedings of the Theory and Applications of Models of Computation, 2014

Privacy Risks in Publication of Taxi GPS Data.
Proceedings of the 2014 IEEE International Conference on High Performance Computing and Communications, 2014

Personalized Privacy Protection for Transactional Data.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

A Hybrid Algorithm for Privacy Preserving Social Network Publication.
Proceedings of the Advanced Data Mining and Applications - 10th International Conference, 2014

2013
Privacy-Preserving Trajectory Publication against Parking Point Attacks.
Proceedings of the 2013 IEEE 10th International Conference on Ubiquitous Intelligence and Computing and 2013 IEEE 10th International Conference on Autonomic and Trusted Computing, 2013

An Improved Privacy Preserving Algorithm for Publishing Social Network Data.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Mining Item Popularity for Recommender Systems.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

2012
Dynamic Authentication for Cross-Realm SOA-Based Business Processes.
IEEE Trans. Serv. Comput., 2012

2009
AutoSyn: A new approach to automated synthesis of composite web services with correctness guarantee.
Sci. China Ser. F Inf. Sci., 2009

Automated synthesis of composite services with correctness guarantee.
Proceedings of the 18th International Conference on World Wide Web, 2009

2008
A Multi-agents Contractual Approach to Incentive Provision in Non-cooperative Networks.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

2007
Dynamic Cross-Realm Authentication for Multi-Party Service Interactions.
Proceedings of the 37th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2007

2006
Cryptographic protocol security analysis based on bounded constructing algorithm.
Sci. China Ser. F Inf. Sci., 2006

A Software Protocol of Goals and Operations Based on BDI Model.
Proceedings of the IEEE International Conference on Sensor Networks, 2006

A Multi-agent Cooperative Model and System for Integrated Security Monitoring.
Proceedings of the Cryptology and Network Security, 5th International Conference, 2006

2005
Towards Security Analysis to Binding Update Protocol in Mobile IPv6 with Formal Method.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Distributed Access Control in CROWN Groups.
Proceedings of the 34th International Conference on Parallel Processing (ICPP 2005), 2005

Access Control in Peer-to-Peer Collaborative Systems.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

2004
Algebra model and security analysis for cryptographic protocols.
Sci. China Ser. F Inf. Sci., 2004

2002
Efficient Non-Repudiation Multicast Source Authentication Schemes.
J. Comput. Sci. Technol., 2002


  Loading...