Collective data-sanitization for preventing sensitive information inference attacks in social networks Z Cai, Z He, X Guan, Y Li IEEE Transactions on Dependable and Secure Computing 15 (4), 577-590, 2016 | 486 | 2016 |
Trading private range counting over big IoT data Z Cai, Z He 2019 IEEE 39th International Conference on Distributed Computing Systems …, 2019 | 284 | 2019 |
Cost-efficient strategies for restraining rumor spreading in mobile social networks Z He, Z Cai, J Yu, X Wang, Y Sun, Y Li IEEE Transactions on Vehicular Technology 66 (3), 2789-2800, 2016 | 247 | 2016 |
Latent-data privacy preserving with customized data utility for social network data Z He, Z Cai, J Yu IEEE Transactions on Vehicular Technology 67 (1), 665-673, 2017 | 167 | 2017 |
Approximate aggregation for tracking quantiles and range countings in wireless sensor networks Z He, Z Cai, S Cheng, X Wang Theoretical Computer Science 607, 381-390, 2015 | 144 | 2015 |
Modeling propagation dynamics and developing optimized countermeasures for rumor spreading in online social networks Z He, Z Cai, X Wang 2015 IEEE 35Th international conference on distributed computing systems …, 2015 | 114 | 2015 |
An energy efficient privacy-preserving content sharing scheme in mobile social networks Z He, Z Cai, Q Han, W Tong, L Sun, Y Li Personal and Ubiquitous Computing 20 (5), 833-846, 2016 | 72 | 2016 |
Optimal security strategy for malware propagation in mobile wireless sensor networks Y Cao, X Wang, Z He ACTA ELECTONICA SINICA 44 (8), 1851, 2016 | 36 | 2016 |
Customized privacy preserving for inherent data and latent data Z He, Z Cai, Y Sun, Y Li, X Cheng Personal and Ubiquitous Computing 21 (1), 43-54, 2017 | 35 | 2017 |
Reaction-diffusion modeling of malware propagation in mobile wireless sensor networks XM Wang, ZB He, XQ Zhao, C Lin, Y Pan, ZP Cai Science China Information Sciences 56 (9), 1-18, 2013 | 31 | 2013 |
User social activity-based routing for cognitive radio networks J Lu, Z Cai, X Wang, L Zhang, P Li, Z He Personal and Ubiquitous Computing 22 (3), 471-487, 2018 | 25 | 2018 |
Approximate aggregation for tracking quantiles in wireless sensor networks Z He, Z Cai, S Cheng, X Wang International Conference on Combinatorial Optimization and Applications, 161-172, 2014 | 24 | 2014 |
A pulse immunization model for inhibiting malware propagation in mobile wireless sensor networks X Wang, Z He, L Zhang Chin. J. Electron 23 (4), 810-815, 2014 | 15 | 2014 |
Differentially private recommendation system based on community detection in social network applications G Li, Z Cai, G Yin, Z He, M Siddula Security and Communication Networks 2018, 2018 | 14 | 2018 |
Inference attacks and controls on genotypes and phenotypes for individual genomic data Z He, J Yu, J Li, Q Han, G Luo, Y Li IEEE/ACM transactions on computational biology and bioinformatics 17 (3 …, 2018 | 13 | 2018 |
Customized privacy preserving for classification based applications Z He, Z Cai, Y Li Proceedings of the 1st ACM Workshop on Privacy-Aware Mobile Computing, 37-42, 2016 | 11 | 2016 |
Achieving differential privacy of genomic data releasing via belief propagation Z He, Y Li, J Li, K Li, Q Cai, Y Liang Tsinghua Science and Technology 23 (4), 389-395, 2018 | 8 | 2018 |
Private data trading towards range counting queries in internet of things Z Cai, X Zheng, J Wang, Z He IEEE Transactions on Mobile Computing, 2022 | 7 | 2022 |
Learning disentangled user representation with multi-view information fusion on social networks W Tang, B Hui, L Tian, G Luo, Z He, Z Cai Information Fusion 74, 77-86, 2021 | 7 | 2021 |
Inference attacks on genomic data based on probabilistic graphical models Z He, J Zhou Big Data Mining and Analytics 3 (3), 225-233, 2020 | 6 | 2020 |