According to our database1, Zhiyuan Chen authored at least 42 papers between 1999 and 2018.
Legend:Book In proceedings Article PhD thesis Other
Analyzing attack strategies against rule-based intrusion detection systems.
Proceedings of the Workshop Program of the 19th International Conference on Distributed Computing and Networking, 2018
Target-Based, Privacy Preserving, and Incremental Association Rule Mining.
IEEE Trans. Services Computing, 2017
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level.
Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper).
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2016 Conferences, 2016
Using Transfer Learning to Identify Privacy Leaks in Tweets.
Proceedings of the 2nd IEEE International Conference on Collaboration and Internet Computing, 2016
Analyzing and retrieving illicit drug-related posts from social media.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016
Dynamic Query Forms for Database Queries.
IEEE Trans. Knowl. Data Eng., 2014
A data recipient centered de-identification method to retain statistical attributes.
Journal of Biomedical Informatics, 2014
A generic and distributed privacy preserving classification method with a worst-case privacy guarantee.
Distributed and Parallel Databases, 2014
A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior.
IEEE Trans. Knowl. Data Eng., 2013
Stock Trend Prediction by Classifying Aggregative Web Topic-Opinion.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013
Co-anomaly Event Detection in Multiple Temperature Series.
Proceedings of the Knowledge Science, Engineering and Management, 2013
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification.
Discrete wavelet transform-based time series analysis and mining.
ACM Comput. Surv., 2011
Target-based privacy preserving association rule mining.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
A privacy protection technique for publishing data mining models and research data.
ACM Trans. Management Inf. Syst., 2010
A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining.
Privacy preserving linear discriminant analysis from perturbed data.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010
Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts.
J. Data Semantics, 2009
Preserving Privacy in Mining Quantitative Associations Rules.
Addressing Diverse User Preferences: A Framework for Query Results Navigation.
IEEE Data Eng. Bull., 2009
Searching for relevant software change artifacts using semantic networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009
A tree-based approach to preserve the privacy of software engineering data and predictive models.
Proceedings of the 5th International Workshop on Predictive Models in Software Engineering, 2009
Dynamic active probing of helpdesk databases.
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes.
A fuzzy programming approach for data reduction and privacy in distance-based mining.
Measuring interestingness of discovered skewed patterns in data cubes.
Decision Support Systems, 2008
A privacy preserving technique for distance-based classification with worst case privacy guarantees.
Data Knowl. Eng., 2008
Semantic Integration and Knowledge Discovery for Environmental Research.
J. Database Manag., 2007
Semantic integration of government data for water quality management.
Government Information Quarterly, 2007
Addressing diverse user preferences in SQL-query-result navigation.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2007
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms.
VLDB J., 2006
Navigation Rules for Exploring Large Multidimensional Data Cubes.
Personalization and visualization on handheld devices.
Proceedings of the 2006 ACM Symposium on Applied Computing (SAC), 2006
Index Structures for Matching XML Twigs Using Relational Query Processors.
Proceedings of the 21st International Conference on Data Engineering Workshops, 2005
Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs.
Proceedings of the 20th International Conference on Data Engineering, 2004
Generalized substring selectivity estimation.
J. Comput. Syst. Sci., 2003
Query Optimization In Compressed Database Systems.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001
Counting Twig Matches in a Tree.
Proceedings of the 17th International Conference on Data Engineering, 2001
Selectivity Estimation for Boolean Queries.
Proceedings of the Nineteenth ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems, 2000
An Algebraic Compression Framework for Query Results.
Proceedings of the 16th International Conference on Data Engineering, San Diego, California, USA, February 28, 2000
The Cornell Jaguar System: Adding Mobility to PREDATOR.
Proceedings of the SIGMOD 1999, 1999