Aggregate query answering on anonymized tables Q Zhang, N Koudas, D Srivastava, T Yu 2007 IEEE 23rd international conference on data engineering, 116-125, 2006 | 537 | 2006 |
Anonymizing bipartite graph data using safe groupings G Cormode, D Srivastava, T Yu, Q Zhang Proceedings of the VLDB Endowment 1 (1), 833-844, 2008 | 224 | 2008 |
A framework for identifying compromised nodes in wireless sensor networks Q Zhang, T Yu, P Ning ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-37, 2008 | 151 | 2008 |
Anonymizing bipartite graph data using safe groupings G Cormode, D Srivastava, T Yu, Q Zhang the VLDB Journal 19 (1), 115-139, 2010 | 92 | 2010 |
A Classification Scheme for Trust Functions in Reputation-Based Trust Management. Q Zhang, T Yu, K Irwin Trust@ ISWC, 2004 | 78 | 2004 |
Systems and associated computer program products that disguise partitioned data structures using transformations having targeted distributions D Srivastava, N Koudas, T Yu, Q Zhang US Patent 8,209,342, 2012 | 34 | 2012 |
Method and apparatus for providing anonymization of data G Cormode, D Srivastava, T Yu, Q Zhang US Patent 8,590,049, 2013 | 26 | 2013 |
On the modeling of honest players in reputation systems Q Zhang, W Wei, T Yu Journal of Computer Science and Technology 24 (5), 808-819, 2009 | 18 | 2009 |
Distribution based microdata anonymization N Koudas, D Srivastava, T Yu, Q Zhang Proceedings of the VLDB Endowment 2 (1), 958-969, 2009 | 15 | 2009 |
Aggregate query answering on anonymized tables N Koudas, D Srivastava, T Yu, Q Zhang North Carolina State University. Dept. of Computer Science, 2006 | 4 | 2006 |
Microdata privacy protection through permutation-based approaches Q Zhang North Carolina State University, 2008 | 2 | 2008 |
Database Systems and Theory-Article 10 (25 pages)-Continuous Sampling from Distributed Streams G Cormode, S Muthukrishnan, K Yi, Q Zhang Journal of the ACM-Association for ComputingMachinery 59 (2), 2012 | | 2012 |
A framework for identifying compromised nodes in sensor networks Q Zhang, T Yu, P Ning 2006 Securecomm and Workshops, 1-10, 2006 | | 2006 |