Volgen
Jianneng Cao (曹健能)
Jianneng Cao (曹健能)
Bank Jago
Geverifieerd e-mailadres voor tech.jago.com
Titel
Geciteerd door
Geciteerd door
Jaar
An overview of state-of-the-art partial discharge analysis techniques for condition monitoring
M Wu, H Cao, J Cao, HL Nguyen, JB Gomes, SP Krishnaswamy
IEEE electrical insulation magazine 31 (6), 22-35, 2015
3002015
Privbasis: Frequent itemset mining with differential privacy
N Li, W Qardaji, D Su, J Cao
arXiv preprint arXiv:1208.0093, 2012
2242012
Differentially private k-means clustering
D Su, J Cao, N Li, E Bertino, H Jin
Proceedings of the sixth ACM conference on data and application security and …, 2016
1932016
Castle: Continuously anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
IEEE Transactions on Dependable and Secure Computing 8 (3), 337-352, 2010
1872010
Publishing microdata with a robust privacy guarantee
J Cao, P Karras
arXiv preprint arXiv:1208.0220, 2012
1382012
ρ-uncertainty: inference-proof transaction anonymization
J Cao, P Karras, C Raïssi, KL Tan
Proceedings of the VLDB Endowment (PVLDB) 3 (1), 1033-1044, 2010
1192010
Repeat buyer prediction for e-commerce
G Liu, TT Nguyen, G Zhao, W Zha, J Yang, J Cao, M Wu, P Zhao, W Chen
Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016
1132016
SABRE: a Sensitive Attribute Bucketization and REdistribution framework for t-closeness
J Cao, P Karras, P Kalnis, KL Tan
The VLDB Journal 20, 59-81, 2011
1112011
A framework to enforce access control over data streams
B Carminati, E Ferrari, J Cao, KL Tan
ACM Transactions on Information and System Security (TISSEC) 13 (3), 1-31, 2010
902010
Differentially private k-means clustering and a hybrid approach to private optimization
D Su, J Cao, N Li, E Bertino, M Lyu, H Jin
ACM Transactions on Privacy and Security (TOPS) 20 (4), 1-33, 2017
622017
Efficient and accurate strategies for differentially-private sliding window queries
J Cao, Q Xiao, G Ghinita, N Li, E Bertino, KL Tan
Proceedings of the 16th international conference on extending database …, 2013
572013
CASTLE: A delay-constrained scheme for ks-anonymizing data streams
J Cao, B Carminati, E Ferrari, KL Tan
2008 IEEE 24th International Conference on Data Engineering, 1376-1378, 2008
522008
Dbmask: Fine-grained access control on encrypted relational databases
MI Sarfraz, M Nabeel, J Cao, E Bertino
Proceedings of the 5th ACM Conference on Data and Application Security and …, 2015
512015
Acstream: Enforcing access control over data streams
J Cao, B Carminati, E Ferrari, KL Tan
2009 IEEE 25th International Conference on Data Engineering, 1495-1498, 2009
462009
DAG: a general model for privacy-preserving data mining
SG Teo, J Cao, VCS Lee
IEEE Transactions on Knowledge and Data Engineering 32 (1), 40-53, 2018
312018
Integrative dynamic reconfiguration in a parallel stream processing engine
KGS Madsen, Y Zhou, J Cao
2017 IEEE 33rd International Conference on Data Engineering (ICDE), 227-230, 2017
312017
A hybrid private record linkage scheme: Separating differentially private synopses from matching records
J Cao, FY Rao, E Bertino, M Kantarcioglu
2015 IEEE 31st International Conference on Data Engineering, 1011-1022, 2015
292015
Hybrid private record linkage: Separating differentially private synopses from matching records
FY Rao, J Cao, E Bertino, M Kantarcioglu
ACM Transactions on Privacy and Security (TOPS) 22 (3), 1-36, 2019
242019
PrivPfC: Differentially private data publication for classification
D Su, J Cao, N Li, M Lyu
The VLDB Journal 27, 201-223, 2018
212018
Efficient tree pattern queries on encrypted xml documents
J Cao, FY Rao, M Kuzu, E Bertino, M Kantarcioglu
Proceedings of the Joint EDBT/ICDT 2013 workshops, 111-120, 2013
212013
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20