Zhuhua Cai

According to our database1, Zhuhua Cai authored at least 17 papers between 2009 and 2020.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2020
Declarative Recursive Computation on an RDBMS: or, Why You Should Use a Database For Distributed Machine Learning.
SIGMOD Rec., 2020

2019
Declarative Recursive Computation on an RDBMS.
Proc. VLDB Endow., 2019

2014
A comparison of platforms for implementing and running very large scale machine learning algorithms.
Proceedings of the International Conference on Management of Data, 2014

2013
Simulation of database-valued markov chains using SimSQL.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

The Pairwise Gaussian Random Field for High-Dimensional Data Imputation.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

2012
The Latent Community Model for Detecting Sybils in Social Networks.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

Facilitating real-time graph mining.
Proceedings of the Fourth International Workshop on Cloud Data Management, 2012

2011
Green: Towards a Pollution-Free Peer-to-Peer Content Sharing Service
CoRR, 2011

Bring order to online social networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Social Trust and Reputation in Online Social Networks.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

2010
An Adjacency Matrixes-Based Model for Network Security Analysis.
Proceedings of IEEE International Conference on Communications, 2010

2009
Securing key issuing in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

A holistic mechanism against file pollution in peer-to-peer networks.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.
Proceedings of the Proceedings P2P 2009, 2009

SKIP: A Secure Key Issuing Scheme for Peer-to-Peer Networks.
Proceedings of the Fifth International Conference on Networking and Services, 2009

SpamResist: Making Peer-to-Peer Tagging Systems Robust to Spam.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Evaluating Network Security With Two-Layer Attack Graphs.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...