Zhiyuan Chen

According to our database1, Zhiyuan Chen authored at least 42 papers between 1999 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Analyzing attack strategies against rule-based intrusion detection systems.
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018

Target-Based, Privacy Preserving, and Incremental Association Rule Mining.
IEEE Trans. Services Computing, 2017

Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level.
IJISP, 2016

Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016

Using Transfer Learning to Identify Privacy Leaks in Tweets.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016

Analyzing and retrieving illicit drug-related posts from social media.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

Dynamic Query Forms for Database Queries.
IEEE Trans. Knowl. Data Eng., 2014

A data recipient centered de-identification method to retain statistical attributes.
Journal of Biomedical Informatics, 2014

A generic and distributed privacy preserving classification method with a worst-case privacy guarantee.
Distributed and Parallel Databases, 2014

A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior.
IEEE Trans. Knowl. Data Eng., 2013

Stock Trend Prediction by Classifying Aggregative Web Topic-Opinion.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Co-anomaly Event Detection in Multiple Temperature Series.
Proceedings of the Knowledge Science, Engineering and Management, 2013

Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification.
IJISP, 2012

Discrete wavelet transform-based time series analysis and mining.
ACM Comput. Surv., 2011

Target-based privacy preserving association rule mining.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

A privacy protection technique for publishing data mining models and research data.
ACM Trans. Management Inf. Syst., 2010

A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining.
IJCMAM, 2010

Privacy preserving linear discriminant analysis from perturbed data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts.
J. Data Semantics, 2009

Preserving Privacy in Mining Quantitative Associations Rules.
IJISP, 2009

Addressing Diverse User Preferences: A Framework for Query Results Navigation.
IEEE Data Eng. Bull., 2009

Searching for relevant software change artifacts using semantic networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A tree-based approach to preserve the privacy of software engineering data and predictive models.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009

Dynamic active probing of helpdesk databases.
PVLDB, 2008

A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes.
IJISP, 2008

A fuzzy programming approach for data reduction and privacy in distance-based mining.
IJICS, 2008

Measuring interestingness of discovered skewed patterns in data cubes.
Decision Support Systems, 2008

A privacy preserving technique for distance-based classification with worst case privacy guarantees.
Data Knowl. Eng., 2008

Semantic Integration and Knowledge Discovery for Environmental Research.
J. Database Manag., 2007

Semantic integration of government data for water quality management.
Government Information Quarterly, 2007

Addressing diverse user preferences in SQL-query-result navigation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007

A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms.
VLDB J., 2006

Navigation Rules for Exploring Large Multidimensional Data Cubes.
IJDWM, 2006

Personalization and visualization on handheld devices.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006

Index Structures for Matching XML Twigs Using Relational Query Processors.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005

Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs.
Proceedings of the 20th International Conference on Data Engineering, 2004

Generalized substring selectivity estimation.
J. Comput. Syst. Sci., 2003

Query Optimization In Compressed Database Systems.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Counting Twig Matches in a Tree.
Proceedings of the 17th International Conference on Data Engineering, 2001

Selectivity Estimation for Boolean Queries.
Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2000

An Algebraic Compression Framework for Query Results.
Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28, 2000

The Cornell Jaguar System: Adding Mobility to PREDATOR.
Proceedings of the SIGMOD 1999, 1999