Collective data-sanitization for preventing sensitive information inference attacks in social networks Z Cai, Z He, X Guan, Y Li IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016 | 643 | 2016 |
Trading private range counting over big IoT data Z Cai, Z He 2019 IEEE 39th international conference on distributed computing systems …, 2019 | 380 | 2019 |
Cost-efficient strategies for restraining rumor spreading in mobile social networks Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016 | 314 | 2016 |
Latent-data privacy preserving with customized data utility for social network data Z He, Z Cai, J Yu IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017 | 202 | 2017 |
Approximate aggregation for tracking quantiles and range countings in wireless sensor networks Z He, Z Cai, S Cheng, X Wang Theoretical Computer Science 607, 381-390, 2015 | 166 | 2015 |
Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks Z He, Z Cai, X Wang 2015 IEEE 35Th international conference on distributed computing systems …, 2015 | 146 | 2015 |
An energy efficient privacy-preserving content sharing scheme in mobile social networks Z He, Z Cai, Q Han, W Tong, L Sun, Y Li Personal and Ubiquitous Computing 20, 833-846, 2016 | 78 | 2016 |
Private data trading towards range counting queries in internet of things Z Cai, X Zheng, J Wang, Z He IEEE Transactions on Mobile Computing 22 (8), 4881-4897, 2022 | 74 | 2022 |
Clustered federated learning with adaptive local differential privacy on heterogeneous iot data Z He, L Wang, Z Cai IEEE Internet of Things Journal, 2023 | 53 | 2023 |
Customized privacy preserving for inherent data and latent data Z He, Z Cai, Y Sun, Y Li, X Cheng Personal and Ubiquitous Computing 21, 43-54, 2017 | 44 | 2017 |
Optimal security strategy for malware propagation in mobile wireless sensor networks YL Cao, XM Wang, ZB He Acta Electronica Sinica 44 (8), 1851-1857, 2016 | 37 | 2016 |
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks XM Wang, ZB He, XQ Zhao, C Lin, Y Pan, ZP Cai Science China Information Sciences 56, 1-18, 2013 | 35 | 2013 |
Learning disentangled user representation with multi-view information fusion on social networks W Tang, B Hui, L Tian, G Luo, Z He, Z Cai Information Fusion 74, 77-86, 2021 | 26 | 2021 |
User social activity-based routing for cognitive radio networks J Lu, Z Cai, X Wang, L Zhang, P Li, Z He Personal and Ubiquitous Computing 22, 471-487, 2018 | 25 | 2018 |
Inference attacks and controls on genotypes and phenotypes for individual genomic data Z He, J Yu, J Li, Q Han, G Luo, Y Li IEEE/ACM transactions on computational biology and bioinformatics 17 (3 …, 2018 | 25 | 2018 |
Differentially private recommendation system based on community detection in social network applications G Li, Z Cai, G Yin, Z He, M Siddula Security and Communication Networks 2018 (1), 3530123, 2018 | 23 | 2018 |
Approximate aggregation for tracking quantiles in wireless sensor networks Z He, Z Cai, S Cheng, X Wang International Conference on Combinatorial Optimization and Applications, 161-172, 2014 | 23 | 2014 |
Inference attacks on genomic data based on probabilistic graphical models Z He, J Zhou Big Data Mining and Analytics 3 (3), 225-233, 2020 | 20 | 2020 |
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks W Xiaoming, HE Zaobo, Z Lichen Chinese Journal of Electronics 23 (4), 810-815, 2014 | 16 | 2014 |
Achieving differential privacy of genomic data releasing via belief propagation Z He, Y Li, J Li, K Li, Q Cai, Y Liang Tsinghua Science and Technology 23 (4), 389-395, 2018 | 14 | 2018 |