Follow
Qing Zhang
Qing Zhang
Adjunt Professor, ITU
Verified email at itu.edu
Title
Cited by
Cited by
Year
Aggregate query answering on anonymized tables
Q Zhang, N Koudas, D Srivastava, T Yu
2007 IEEE 23rd international conference on data engineering, 116-125, 2006
5232006
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 1 (1), 833-844, 2008
2172008
A framework for identifying compromised nodes in wireless sensor networks
Q Zhang, T Yu, P Ning
ACM Transactions on Information and System Security (TISSEC) 11 (3), 1-37, 2008
1472008
Anonymizing bipartite graph data using safe groupings
G Cormode, D Srivastava, T Yu, Q Zhang
the VLDB Journal 19 (1), 115-139, 2010
912010
A Classification Scheme for Trust Functions in Reputation-Based Trust Management.
Q Zhang, T Yu, K Irwin
Trust@ ISWC, 2004
772004
Systems and associated computer program products that disguise partitioned data structures using transformations having targeted distributions
D Srivastava, N Koudas, T Yu, Q Zhang
US Patent 8,209,342, 2012
322012
Method and apparatus for providing anonymization of data
G Cormode, D Srivastava, T Yu, Q Zhang
US Patent 8,590,049, 2013
252013
On the modeling of honest players in reputation systems
Q Zhang, W Wei, T Yu
Journal of Computer Science and Technology 24 (5), 808-819, 2009
182009
Distribution based microdata anonymization
N Koudas, D Srivastava, T Yu, Q Zhang
Proceedings of the VLDB Endowment 2 (1), 958-969, 2009
152009
Aggregate query answering on anonymized tables
N Koudas, D Srivastava, T Yu, Q Zhang
North Carolina State University. Dept. of Computer Science, 2006
42006
Microdata privacy protection through permutation-based approaches
Q Zhang
North Carolina State University, 2008
22008
Database Systems and Theory-Article 10 (25 pages)-Continuous Sampling from Distributed Streams
G Cormode, S Muthukrishnan, K Yi, Q Zhang
Journal of the ACM-Association for ComputingMachinery 59 (2), 2012
2012
A framework for identifying compromised nodes in sensor networks
Q Zhang, T Yu, P Ning
2006 Securecomm and Workshops, 1-10, 2006
2006
The system can't perform the operation now. Try again later.
Articles 1–13