Security-preserving social data sharing methods in modern social big knowledge systems (English)
- New search for: Chen, Xuan
- Further information on Chen, Xuan:
- https://orcid.org/0000-0001-7452-960X
- New search for: Chen, Xuan
- Further information on Chen, Xuan:
- https://orcid.org/0000-0001-7452-960X
In:
Information Sciences
;
515
;
404-416
;
2019
-
ISSN:
- Article (Journal) / Electronic Resource
-
Title:Security-preserving social data sharing methods in modern social big knowledge systems
-
Contributors:Chen, Xuan ( author )
-
Published in:Information Sciences ; 515 ; 404-416
-
Publisher:
-
Publication date:2019-12-17
-
Size:13 pages
-
ISSN:
-
DOI:
-
Type of media:Article (Journal)
-
Type of material:Electronic Resource
-
Language:English
-
Keywords:
-
Source:
Table of contents – Volume 515
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Formal approach for discovering work transference networks from workflow logsAhn, Hyun / Kim, Kwanghoon Pio et al. | 2019
- 26
-
Optimization of vehicle speed for batches to minimize supply chain cost under uncertain demandMandal, Jasashwi / Goswami, Adrijit / Wang, Junwei / Tiwari, Manoj Kumar et al. | 2019
- 44
-
CONAN: A framework for detecting and handling collusion in crowdsourcingChen, Pengpeng / Sun, Hailong / Fang, Yili / Liu, Xudong et al. | 2019
- 64
-
Spatio-spectral networks for color-texture analysisScabini, Leonardo F.S. / Ribas, Lucas C. / Bruno, Odemir M. et al. | 2019
- 80
-
A new self-paced method for multiple instance boosting learningXiao, Yanshan / Yang, Xiaozhou / Liu, Bo et al. | 2019
- 91
-
Spatial-temporal data-driven service recommendation with privacy-preservationQi, Lianyong / Zhang, Xuyun / Li, Shancang / Wan, Shaohua / Wen, Yiping / Gong, Wenwen et al. | 2019
- 103
-
Recommending investors for new startups by integrating network diffusion and investors’ domain preferenceXu, Shuqi / Zhang, Qianming / Lü, Linyuan / Mariani, Manuel Sebastian et al. | 2019
- 116
-
New construction of an ordinal sum of t-norms and t-conorms on bounded latticesDvořák, Antonín / Holčapek, Michal et al. | 2019
- 132
-
Privacy-preserving clustering for big data in cyber-physical-social systems: Survey and perspectivesZhao, Yaliang / Tarus, Samwel K. / Yang, Laurence T. / Sun, Jiayu / Ge, Yunfei / Wang, Jinke et al. | 2019
- 156
-
Life-Like Network Automata descriptor based on binary patterns for network classificationRibas, Lucas C. / Machicao, Jeaneth / Bruno, Odemir M. et al. | 2019
- 169
-
Modeling hierarchical category transition for next POI recommendation with uncertain check-insZhang, Lu / Sun, Zhu / Zhang, Jie / Kloeden, Horst / Klanner, Felix et al. | 2019
- 191
-
Design and implementation of a simple dynamical 4-D chaotic circuit with applications in image encryptionTsafack, Nestor / Kengne, Jacques / Abd-El-Atty, Bassem / Iliyasu, Abdullah M. / Hirota, Kaoru / Abd EL-Latif, Ahmed A. et al. | 2019
- 218
-
BPF++: A Unified Factorization model for predicting retweet behaviorsWang, Shaoqing / Li, Cuiping / Wang, Zheng / Chen, Hong / Zheng, Kai et al. | 2019
- 233
-
Attention-aware perceptual enhancement nets for low-resolution image classificationZhu, Xiaobin / Li, Zhuangzi / Li, Xianbo / Li, Shanshan / Dai, Feng et al. | 2019
- 248
-
Secure distributed estimation against false data injection attackHua, Yi / Chen, Feng / Deng, Shuwei / Duan, Shukai / Wang, Lidan et al. | 2019
- 263
-
Three-way decision on two universesLi, Xiaonan / Sun, Qianqian / Chen, Hongmei / Yi, Huangjian et al. | 2019
- 280
-
A mixed attributes oriented dynamic SOM fuzzy cluster algorithm for mobile user classificationXu, Guangxia / Zhang, Linghao / Ma, Chuang / Liu, Yanbing et al. | 2019
- 294
-
Uniform random posetsKozieł, Patryk / Sulkowska, Małgorzata et al. | 2019
- 302
-
EHAUSM: An efficient algorithm for high average utility sequence miningTruong, Tin / Duong, Hai / Le, Bac / Fournier-Viger, Philippe et al. | 2019
- 324
-
Sliding mode control of automotive electronic valve system under weighted try-once-discard protocolCao, Zhiru / Niu, Yugang / Karimi, Hamid Reza et al. | 2019
- 341
-
Relation constrained attributed network embeddingChen, Yiqi / Qian, Tieyun et al. | 2019
- 352
-
Worst-case ϵ-stealthy false data injection attacks in cyber-physical systemsLi, Yi-Gang / Yang, Guang-Hong et al. | 2019
- 365
-
AREA: An adaptive reference-set based evolutionary algorithm for multiobjective optimisationJiang, Shouyong / Li, Hongru / Guo, Jinglei / Zhong, Mingjun / Yang, Shengxiang / Kaiser, Marcus / Krasnogor, Natalio et al. | 2019
- 388
-
Secure k-skyband computation framework in distributed multi-party databasesQaosar, Mahboob / Zaman, Asif / Siddique, Md. Anisuzzaman / Li, Chen / Morimoto, Yasuhiko et al. | 2019
- 404
-
Security-preserving social data sharing methods in modern social big knowledge systemsChen, Xuan et al. | 2019
- ii
-
Editorial Board| 2019