Yuan Hong
Yuan Hong
Dirección de correo verificada de iit.edu - Página principal
Título
Citado por
Citado por
Año
Differentially private naive bayes classification
J Vaidya, B Shafiq, A Basu, Y Hong
2013 IEEE/WIC/ACM International Joint Conferences on Web Intelligence (WI …, 2013
772013
Collaborative search log sanitization: Toward differential privacy and boosted utility
Y Hong, J Vaidya, H Lu, P Karras, S Goel
IEEE Transactions on Dependable and Secure Computing 12 (5), 504-518, 2015
662015
Constraint-aware role mining via extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
IEEE Transactions on Dependable and Secure Computing 9 (5), 655-669, 2012
582012
Effective anonymization of query logs
Y Hong, X He, J Vaidya, N Adam, V Atluri
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
572009
Secure and Efficient Distributed Linear Programming
Y Hong, J Vaidya, H Lu
Journal of Computer Security 20 (5), 583-634, 2012
422012
Security challenges in smart grid implementation
S Goel, Y Hong
Smart grid security, 1-39, 2015
402015
Differentially private search log sanitization with optimal output utility
Y Hong, J Vaidya, H Lu, M Wu
Proceedings of the 15th International Conference on Extending Database …, 2012
372012
Privacy Preserving Smart Meter Streaming against Information Leakage of Appliance Status
Y Hong, WM Liu, L Wang
IEEE Transactions on Information Forensics and Security 12 (9), 2227-2241, 2017
352017
Smart grid security
S Goel, Y Hong, V Papakonstantinou, D Kloza
Springer, 2015
292015
Towards user-oriented RBAC model
H Lu, Y Hong, Y Yang, L Duan, N Badar
Journal of Computer Security 23 (1), 107-129, 2015
292015
An efficient and privacy‐preserving scheme for P2P energy exchange among smart microgrids
Y Hong, S Goel, WM Liu
International Journal of Energy Research 40 (3), 313–331, 2016
272016
On the robust and stable flowshop scheduling under stochastic and dynamic disruptions
F Liu, S Wang, Y Hong, X Yue
IEEE Transactions on Engineering Management 64 (4), 539-553, 2017
262017
Cyber war games: Strategic jostling among traditional adversaries
S Goel, Y Hong
Cyber Warfare, 1-13, 2015
26*2015
Releasing correlated trajectories: Towards high utility and optimal differential privacy
L Ou, Z Qin, S Liao, Y Hong, X Jia
IEEE Transactions on Dependable and Secure Computing 17 (5), 1109-1123, 2020
232020
Securing telehealth applications in a Web-based e-health portal
Q Liu, S Lu, Y Hong, L Wang, R Dssouli
2008 Third International Conference on Availability, Reliability and …, 2008
232008
Extended boolean matrix decomposition
H Lu, J Vaidya, V Atluri, Y Hong
2009 Ninth IEEE International Conference on Data Mining, 317-326, 2009
212009
An inference–proof approach to privacy-preserving horizontally partitioned linear programs
Y Hong, J Vaidya
Optimization Letters 8 (1), 267-277, 2014
202014
A Survey of Privacy-aware Supply Chain Collaboration: From Theory to Applications
Y Hong, J Vaidya, S Wang
Journal of Information Systems 28 (1), 243-268, 2014
182014
Overlapping clustering with sparseness constraints
H Lu, Y Hong, WN Street, F Wang, H Tong
2012 IEEE 12th International Conference on Data Mining Workshops, 486-494, 2012
172012
Efficient distributed linear programming with limited disclosure
Y Hong, J Vaidya, H Lu
IFIP Annual Conference on Data and Applications Security and Privacy, 170-185, 2011
172011
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20