Follow
Zaobo He
Zaobo He
Jinan University (暨南大学)
Verified email at jnu.edu.cn - Homepage
Title
Cited by
Cited by
Year
Collective data-sanitization for preventing sensitive information inference attacks in social networks
Z Cai, Z He, X Guan, Y Li
IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016
4862016
Trading private range counting over big IoT data
Z Cai, Z He
2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019
2842019
Cost-efficient strategies for restraining rumor spreading in mobile social networks
Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li
IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016
2472016
Latent-data privacy preserving with customized data utility for social network data
Z He, Z Cai, J Yu
IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017
1672017
Approximate aggregation for tracking quantiles and range countings in wireless sensor networks
Z He, Z Cai, S Cheng, X Wang
Theoretical Computer Science 607, 381-390, 2015
1442015
Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks
Z He, Z Cai, X Wang
2015 IEEE 35Th international conference on distributed computing systems …, 2015
1142015
An energy efficient privacy-preserving content sharing scheme in mobile social networks
Z He, Z Cai, Q Han, W Tong, L Sun, Y Li
Personal and Ubiquitous Computing 20 (5), 833-846, 2016
722016
Optimal security strategy for malware propagation in mobile wireless sensor networks
Y Cao, X Wang, Z He
ACTA ELECTONICA SINICA 44 (8), 1851, 2016
362016
Customized privacy preserving for inherent data and latent data
Z He, Z Cai, Y Sun, Y Li, X Cheng
Personal and Ubiquitous Computing 21 (1), 43-54, 2017
352017
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks
XM Wang, ZB He, XQ Zhao, C Lin, Y Pan, ZP Cai
Science China Information Sciences 56 (9), 1-18, 2013
312013
User social activity-based routing for cognitive radio networks
J Lu, Z Cai, X Wang, L Zhang, P Li, Z He
Personal and Ubiquitous Computing 22 (3), 471-487, 2018
252018
Approximate aggregation for tracking quantiles in wireless sensor networks
Z He, Z Cai, S Cheng, X Wang
International Conference on Combinatorial Optimization and Applications, 161-172, 2014
242014
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks
X Wang, Z He, L Zhang
Chin. J. Electron 23 (4), 810-815, 2014
152014
Differentially private recommendation system based on community detection in social network applications
G Li, Z Cai, G Yin, Z He, M Siddula
Security and Communication Networks 2018, 2018
142018
Inference attacks and controls on genotypes and phenotypes for individual genomic data
Z He, J Yu, J Li, Q Han, G Luo, Y Li
IEEE/ACM transactions on computational biology and bioinformatics 17 (3 …, 2018
132018
Customized privacy preserving for classification based applications
Z He, Z Cai, Y Li
Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 37-42, 2016
112016
Achieving differential privacy of genomic data releasing via belief propagation
Z He, Y Li, J Li, K Li, Q Cai, Y Liang
Tsinghua Science and Technology 23 (4), 389-395, 2018
82018
Private data trading towards range counting queries in internet of things
Z Cai, X Zheng, J Wang, Z He
IEEE Transactions on Mobile Computing, 2022
72022
Learning disentangled user representation with multi-view information fusion on social networks
W Tang, B Hui, L Tian, G Luo, Z He, Z Cai
Information Fusion 74, 77-86, 2021
72021
Inference attacks on genomic data based on probabilistic graphical models
Z He, J Zhou
Big Data Mining and Analytics 3 (3), 225-233, 2020
62020
The system can't perform the operation now. Try again later.
Articles 1–20