default search action
Zhiyuan Chen 0003
Person information
- affiliation: University of Maryland, Department of Computer Information Systems, Baltimore, USA
- affiliation (PhD 2002): Cornell University, Ithaca, NY, USA
Other persons with the same name
- Zhiyuan Chen — disambiguation page
- Zhiyuan Chen 0001 (aka: Zhiyuan (Brett) Chen) — Google (and 1 more)
- Zhiyuan Chen 0002 — Fudan University, State-Key Laboratory of ASIC and System, Shanghai, China (and 1 more)
- Zhiyuan Chen 0004 — Nanyang Technological University, Singapore
- Zhiyuan Chen 0005 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China
- Zhiyuan Chen 0006 — University of Nebraska, Omaha, NE, USA
- Zhiyuan Chen 0007 — University of Nottingham Malaysia, Semenyih, Malaysia
- Zhiyuan Chen 0008 — Australian National Unversity, Australia (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j32]Antonios Xenakis, Sabrina Mamtaz Nourin, Zhiyuan Chen, George Karabatis, Ahmed Aleroud, Jhancy Amarsingh:
A Self-adaptive and Secure Approach to Share Network Trace Data. DTRAP 4(4): 50:1-50:20 (2023) - [j31]Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham:
Cluster-Based Joins for Federated SPARQL Queries. IEEE Trans. Knowl. Data Eng. 35(4): 3525-3539 (2023) - 2022
- [j30]Fan Yang, Zhiyuan Chen, Aryya Gangopadhyay:
Using Randomness to Improve Robustness of Tree-Based Models Against Evasion Attacks. IEEE Trans. Knowl. Data Eng. 34(2): 969-982 (2022) - [c28]Dae-young Kim, Nujood Alodadi, Zhiyuan Chen, Karuna P. Joshi, Adina Crainiceanu, Don Needham:
MATS: A Multi-aspect and Adaptive Trust-based Situation-aware Access Control Framework for Federated Data-as-a-Service Systems. SCC 2022: 54-64 - 2021
- [j29]Ahmed Aleroud, Fan Yang, Sai C. Pallaprolu, Zhiyuan Chen, George Karabatis:
Anonymization of Network Traces Data through Condensation-based Differential Privacy. DTRAP 2(4): 30:1-30:23 (2021) - [j28]Pooja Parameshwarappa, Zhiyuan Chen, Günes Koru:
Anonymization of Daily Activity Data by Using ℓ-diversity Privacy Model. ACM Trans. Manag. Inf. Syst. 12(3): 23:1-23:21 (2021) - [c27]Payton Schubel, Zhiyuan Chen, Adina Crainiceanu, Karuna P. Joshi, Don Needham:
A Semantic Framework for Secure and Efficient Contact Tracing of Infectious Diseases. BIBM 2021: 1499-1502 - [c26]Laylon Mokry, Paul Slife, Patrick Bishop, Jose Quiroz, Cooper Guzzi, Zhiyuan Chen, Adina Crainiceanu, Don Needham:
Efficient and Privacy-Preserving Collaborative Intrusion Detection Using Additive Secret Sharing and Differential Privacy. IEEE BigData 2021: 3324-3333 - 2020
- [j27]Pooja Parameshwarappa, Zhiyuan Chen, Akif Günes Koru:
An Effective and Computationally Efficient Approach for Anonymizing Large-Scale Physical Activity Data: Multi-Level Clustering-Based Anonymization. Int. J. Inf. Secur. Priv. 14(3): 72-94 (2020) - [c25]Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna P. Joshi, Don Needham:
A Framework for Situation-Aware Access Control in Federated Data-as-a-Service Systems Based on Query Rewriting. SCC 2020: 1-11 - [c24]Samson Oni, Kajal Pansare, Sukrit Singh Arneja, Zhiyuan Chen, Adina Crainiceanu, Don Needham:
RDFINT: A Benchmark for Comparing Data Warehouse with Virtual Integration Approaches for Integration of RDF Data. IEEE BigData 2020: 2820-2826 - [c23]Wenbin Zhang, Mingli Zhang, Ji Zhang, Zhen Liu, Zhiyuan Chen, Jianwu Wang, Edward Raff, Enza Messina:
Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams. ICTAI 2020: 399-406 - [e1]Xintao Wu, Chris Jermaine, Li Xiong, Xiaohua Hu, Olivera Kotevska, Siyuan Lu, Weija Xu, Srinivas Aluru, Chengxiang Zhai, Eyhab Al-Masri, Zhiyuan Chen, Jeff Saltz:
2020 IEEE International Conference on Big Data (IEEE BigData 2020), Atlanta, GA, USA, December 10-13, 2020. IEEE 2020, ISBN 978-1-7281-6251-5 [contents]
2010 – 2019
- 2019
- [j26]Samson Oni, Zhiyuan Chen, Susan Hoban, Onimi Jademi:
A Comparative Study of Data Cleaning Tools. Int. J. Data Warehous. Min. 15(4): 48-65 (2019) - [c22]Samson Oni, Zhiyuan Chen, Adina Crainiceanu, Karuna P. Joshi, Don Needham:
Situation-Aware Access Control in Federated Data-as-a-Service for Maritime Search and Rescue. SCC 2019: 228-230 - [c21]Fan Yang, Adina Crainiceanu, Zhiyuan Chen, Don Needham:
Cluster-Based Join for Geographically Distributed Big RDF Data. BigData Congress 2019: 170-178 - [i3]Ashwinkumar Ganesan, Pooja Parameshwarappa, Akshay Peshave, Zhiyuan Chen, Tim Oates:
Extending Signature-based Intrusion Detection Systems WithBayesian Abductive Reasoning. CoRR abs/1903.12101 (2019) - [i2]Pooja Parameshwarappa, Zhiyuan Chen, Günes Koru:
A Multi-level Clustering Approach for Anonymizing Large-Scale Physical Activity Data. CoRR abs/1908.07976 (2019) - 2018
- [c20]Pooja Parameshwarappa, Zhiyuan Chen, Aryya Gangopadhyay:
Analyzing attack strategies against rule-based intrusion detection systems. ICDCN Workshops 2018: 1:1-1:4 - [i1]Fan Yang, Zhiyuan Chen:
Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks. CoRR abs/1808.03601 (2018) - 2017
- [j25]Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, Yelena Yesha:
Target-Based, Privacy Preserving, and Incremental Association Rule Mining. IEEE Trans. Serv. Comput. 10(4): 633-645 (2017) - [c19]Pei Guo, Jianwu Wang, Zhiyuan Chen:
A comparison of big data application programming approaches: A travel companion case study. IEEE BigData 2017: 2869-2878 - 2016
- [j24]Shaikha Alduaij, Zhiyuan Chen, Aryya Gangopadhyay:
Using Crowd Sourcing to Analyze Consumers' Response to Privacy Policies of Online Social Network and Financial Institutions at Micro Level. Int. J. Inf. Secur. Priv. 10(2): 41-63 (2016) - [c18]Tao Ding, Arpita Roy, Zhiyuan Chen, Qian Zhu, Shimei Pan:
Analyzing and retrieving illicit drug-related posts from social media. BIBM 2016: 1555-1560 - [c17]Saul Ricardo Medrano Castillo, Zhiyuan Chen:
Using Transfer Learning to Identify Privacy Leaks in Tweets. CIC 2016: 506-513 - [c16]Ahmed Aleroud, Zhiyuan Chen, George Karabatis:
Network Trace Anonymization Using a Prefix-Preserving Condensation-Based Technique (Short paper). OTM Conferences 2016: 934-942 - 2014
- [j23]Madhushri Banerjee, Zhiyuan Chen, Aryya Gangopadhyay:
A generic and distributed privacy preserving classification method with a worst-case privacy guarantee. Distributed Parallel Databases 32(1): 5-35 (2014) - [j22]Tamas S. Gal, Thomas C. Tucker, Aryya Gangopadhyay, Zhiyuan Chen:
A data recipient centered de-identification method to retain statistical attributes. J. Biomed. Informatics 50: 32-45 (2014) - [j21]Liang Tang, Tao Li, Yexi Jiang, Zhiyuan Chen:
Dynamic Query Forms for Database Queries. IEEE Trans. Knowl. Data Eng. 26(9): 2166-2178 (2014) - 2013
- [j20]Zhiyuan Chen, Tao Li, Yanan Sun:
A Learning Approach to SQL Query Results Ranking Using Skyline and Users' Current Navigational Behavior. IEEE Trans. Knowl. Data Eng. 25(12): 2683-2693 (2013) - [c15]Xue Bai, Yun Xiong, Yangyong Zhu, Qi Liu, Zhiyuan Chen:
Co-anomaly Event Detection in Multiple Temperature Series. KSEM 2013: 1-14 - [c14]Li Xue, Yun Xiong, Yangyong Zhu, Jianfeng Wu, Zhiyuan Chen:
Stock Trend Prediction by Classifying Aggregative Web Topic-Opinion. PAKDD (2) 2013: 173-184 - 2012
- [j19]Dongjin Kim, Zhiyuan Chen, Aryya Gangopadhyay:
Optimizing Privacy-Accuracy Tradeoff for Privacy Preserving Distance-Based Classification. Int. J. Inf. Secur. Priv. 6(2): 16-33 (2012) - 2011
- [j18]Pimwadee Chaovalit, Aryya Gangopadhyay, George Karabatis, Zhiyuan Chen:
Discrete wavelet transform-based time series analysis and mining. ACM Comput. Surv. 43(2): 6:1-6:37 (2011) - [c13]Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen, Yelena Yesha:
Target-based privacy preserving association rule mining. SAC 2011: 962-967 - 2010
- [j17]Shibnath Mukherjee, Aryya Gangopadhyay, Zhiyuan Chen:
A Partial Optimization Approach for Privacy Preserving Frequent Itemset Mining. Int. J. Comput. Model. Algorithms Medicine 1(1): 19-33 (2010) - [j16]Yu Fu, Zhiyuan Chen, Günes Koru, Aryya Gangopadhyay:
A privacy protection technique for publishing data mining models and research data. ACM Trans. Manag. Inf. Syst. 1(1): 7:1-7:20 (2010) - [c12]Somnath Chakrabarti, Zhiyuan Chen, Aryya Gangopadhyay, Shibnath Mukherjee:
Privacy preserving linear discriminant analysis from perturbed data. SAC 2010: 610-615
2000 – 2009
- 2009
- [j15]Zhiyuan Chen, Tao Li:
Addressing Diverse User Preferences: A Framework for Query Results Navigation. IEEE Data Eng. Bull. 32(4): 41-48 (2009) - [j14]Madhu Ahluwalia, Aryya Gangopadhyay, Zhiyuan Chen:
Preserving Privacy in Mining Quantitative Associations Rules. Int. J. Inf. Secur. Priv. 3(4): 1-17 (2009) - [j13]George Karabatis, Zhiyuan Chen, Vandana Pursnani Janeja, Tania Lobo, Monish Advani, Mikael Lindvall, Raimund L. Feldmann:
Using Semantic Networks and Context in Search for Relevant Software Engineering Artifacts. J. Data Semant. 14: 74-104 (2009) - [c11]Yu Fu, Akif Günes Koru, Zhiyuan Chen, Khaled El Emam:
A tree-based approach to preserve the privacy of software engineering data and predictive models. PROMISE 2009: 3 - [c10]Mikael Lindvall, Raimund L. Feldmann, George Karabatis, Zhiyuan Chen, Vandana Pursnani Janeja:
Searching for relevant software change artifacts using semantic networks. SAC 2009: 496-500 - 2008
- [j12]Shibnath Mukherjee, Madhushri Banerjee, Zhiyuan Chen, Aryya Gangopadhyay:
A privacy preserving technique for distance-based classification with worst case privacy guarantees. Data Knowl. Eng. 66(2): 264-288 (2008) - [j11]Navin Kumar, Aryya Gangopadhyay, Sanjay Bapna, George Karabatis, Zhiyuan Chen:
Measuring interestingness of discovered skewed patterns in data cubes. Decis. Support Syst. 46(1): 429-439 (2008) - [j10]Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay:
A fuzzy programming approach for data reduction and privacy in distance-based mining. Int. J. Inf. Comput. Secur. 2(1): 27-47 (2008) - [j9]Tamas S. Gal, Zhiyuan Chen, Aryya Gangopadhyay:
A Privacy Protection Model for Patient Data with Multiple Sensitive Attributes. Int. J. Inf. Secur. Priv. 2(3): 28-44 (2008) - [j8]Shenghuo Zhu, Tao Li, Zhiyuan Chen, Dingding Wang, Yihong Gong:
Dynamic active probing of helpdesk databases. Proc. VLDB Endow. 1(1): 748-760 (2008) - 2007
- [j7]Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, Divesh Srivastava:
Index structures for matching XML twigs using relational query processors. Data Knowl. Eng. 60(2): 283-302 (2007) - [j6]Zhiyuan Chen, Aryya Gangopadhyay, Stephen H. Holden, George Karabatis, Michael P. McGuire:
Semantic integration of government data for water quality management. Gov. Inf. Q. 24(4): 716-735 (2007) - [j5]Zhiyuan Chen, Aryya Gangopadhyay, George Karabatis, Michael P. McGuire, Claire Welty:
Semantic Integration and Knowledge Discovery for Environmental Research. J. Database Manag. 18(1): 43-68 (2007) - [c9]Zhiyuan Chen, Tao Li:
Addressing diverse user preferences in SQL-query-result navigation. SIGMOD Conference 2007: 641-652 - 2006
- [j4]Navin Kumar, Aryya Gangopadhyay, George Karabatis, Sanjay Bapna, Zhiyuan Chen:
Navigation Rules for Exploring Large Multidimensional Data Cubes. Int. J. Data Warehous. Min. 2(4): 27-48 (2006) - [j3]Shibnath Mukherjee, Zhiyuan Chen, Aryya Gangopadhyay:
A privacy-preserving technique for Euclidean distance-based mining algorithms using Fourier-related transforms. VLDB J. 15(4): 293-315 (2006) - [c8]Dongsong Zhang, George Karabatis, Zhiyuan Chen, Boonlit Adipat, Liwei Dai, Zhenxue Zhang, Yu Wang:
Personalization and visualization on handheld devices. SAC 2006: 1008-1012 - 2005
- [j2]Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, Yuqing Wu:
Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. IEEE Trans. Knowl. Data Eng. 17(12): 1595-1609 (2005) - [c7]Zhiyuan Chen, Johannes Gehrke, Flip Korn, Nick Koudas, Jayavel Shanmugasundaram, Divesh Srivastava:
Index Structures for Matching XML Twigs Using Relational Query Processors. ICDE Workshops 2005: 1273 - 2004
- [c6]Surajit Chaudhuri, Zhiyuan Chen, Kyuseok Shim, Yuqing Wu:
Storing XML (with XSD) in SQL Databases: Interplay of Logical and Physical Designs. ICDE 2004: 842 - 2003
- [j1]Zhiyuan Chen, Flip Korn, Nick Koudas, S. Muthukrishnan:
Generalized substring selectivity estimation. J. Comput. Syst. Sci. 66(1): 98-132 (2003) - 2002
- [b1]Zhiyuan Chen:
Building Compressed Database Systems. Cornell University, USA, 2002 - 2001
- [c5]Zhiyuan Chen, H. V. Jagadish, Flip Korn, Nick Koudas, S. Muthukrishnan, Raymond T. Ng, Divesh Srivastava:
Counting Twig Matches in a Tree. ICDE 2001: 595-604 - [c4]Zhiyuan Chen, Johannes Gehrke, Flip Korn:
Query Optimization In Compressed Database Systems. SIGMOD Conference 2001: 271-282 - 2000
- [c3]Zhiyuan Chen, Praveen Seshadri:
An Algebraic Compression Framework for Query Results. ICDE 2000: 177-188 - [c2]Zhiyuan Chen, Flip Korn, Nick Koudas, S. Muthukrishnan:
Selectivity Estimation for Boolean Queries. PODS 2000: 216-225
1990 – 1999
- 1999
- [c1]Philippe Bonnet, Kyle Buza, Zhiyuan Chen, Victor Cheng, Randolph Chung, Takako M. Hickey, Ryan Kennedy, Daniel Mahashin, Tobias Mayr, Ivan Oprencak, Praveen Seshadri, Hubert Siu:
The Cornell Jaguar System: Adding Mobility to PREDATOR. SIGMOD Conference 1999: 580-581
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:48 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint