Author of the publication

Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy.

, , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 141-157. Springer, (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

PMDA: Privacy-Preserving Multi-functional Data Aggregation Without TTP in Smart Grid., , and . TrustCom/BigDataSE, page 1107-1114. IEEE, (2018)Harnessing the Cloud for Secure and Efficient Outsourcing of Non-negative Matrix Factorization., , , and . CNS, page 1-9. IEEE, (2018)How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack., , , , and . ISC, volume 10599 of Lecture Notes in Computer Science, page 269-287. Springer, (2017)Enforcing Access Control in Distributed Version Control Systems., , , , and . ICME, page 772-777. IEEE, (2019)Security Analysis on Privacy-Preserving Cloud Aided Biometric Identification Schemes., , and . ACISP (2), volume 9723 of Lecture Notes in Computer Science, page 446-453. Springer, (2016)Towards Privacy-Preserving Data Mining in Online Social Networks: Distance-Grained and Item-Grained Differential Privacy., , , and . ACISP (1), volume 9722 of Lecture Notes in Computer Science, page 141-157. Springer, (2016)A Lightweight Method for Accelerating Discovery of Taint-Style Vulnerabilities in Embedded Systems., , , , , and . ICICS, volume 9977 of Lecture Notes in Computer Science, page 27-36. Springer, (2016)Secure and Efficient Outsourcing of Large-Scale Overdetermined Systems of Linear Equations., , , and . SecureComm (1), volume 254 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 529-548. Springer, (2018)Secure and Efficient Outsourcing of Large-Scale Matrix Inverse Computation., , , and . WASA, volume 10874 of Lecture Notes in Computer Science, page 374-386. Springer, (2018)A Fast Secure Outsourcing of Ridge Regression Based on Singular-Value Decomposition., , , and . IPCCC, page 1-8. IEEE, (2018)