Query and update efficient B+-tree based indexing of moving objects CS Jensen, D Lin, BC Ooi Proceedings of the Thirtieth international conference on Very large data …, 2004 | 479 | 2004 |
Ensuring distributed accountability for data sharing in the cloud S Sundareswaran, A Squicciarini, D Lin IEEE transactions on dependable and secure computing 9 (4), 556-568, 2012 | 263 | 2012 |
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning J Yu, B Zhang, Z Kuang, D Lin, J Fan IEEE Transactions on Information Forensics and Security 12 (5), 1005-1016, 2016 | 252 | 2016 |
A brokerage-based approach for cloud service selection S Sundareswaran, A Squicciarini, D Lin 2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012 | 227 | 2012 |
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz Ieee transactions on mobile computing 16 (5), 1357-1370, 2016 | 199 | 2016 |
A survey of quantification of privacy preserving data mining algorithms E Bertino, D Lin, W Jiang Privacy-preserving data mining, 183-205, 2008 | 197 | 2008 |
Continuous clustering of moving objects CS Jensen, D Lin, BC Ooi IEEE transactions on knowledge and data engineering 19 (9), 1161-1174, 2007 | 197 | 2007 |
An approach to evaluate data trustworthiness based on data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Workshop on Secure Data Management, 82-98, 2008 | 182 | 2008 |
Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing J Yu, Z Kuang, B Zhang, W Zhang, D Lin, J Fan IEEE transactions on information forensics and security 13 (5), 1317-1332, 2018 | 168 | 2018 |
Access control policy combining: theory meets practice N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 145 | 2009 |
Effective density queries on continuouslymoving objects CS Jensen, D Lin, BC Ooi, R Zhang 22nd International Conference on Data Engineering (ICDE'06), 71-71, 2006 | 129 | 2006 |
An algebra for fine-grained integration of XACML policies P Rao, D Lin, E Bertino, N Li, J Lobo Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 125 | 2009 |
Privacy policy inference of user-uploaded images on content sharing sites AC Squicciarini, D Lin, S Sundareswaran, J Wede IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014 | 115 | 2014 |
Efficient indexing of the historical, present, and future positions of moving objects D Lin, CS Jensen, BC Ooi, S Šaltenis Proceedings of the 6th international conference on Mobile data management, 59-66, 2005 | 113 | 2005 |
A benchmark for evaluating moving object indexes S Chen, CS Jensen, D Lin Proceedings of the VLDB Endowment 1 (2), 1574-1585, 2008 | 108 | 2008 |
A3p: adaptive policy prediction for shared images over popular content sharing sites AC Squicciarini, S Sundareswaran, D Lin, J Wede Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011 | 106 | 2011 |
Preventing information leakage from indexing in the cloud A Squicciarini, S Sundareswaran, D Lin 2010 IEEE 3rd International Conference on Cloud Computing, 188-195, 2010 | 99 | 2010 |
An approach to evaluate policy similarity D Lin, P Rao, E Bertino, J Lobo Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 91 | 2007 |
Information-oriented trustworthiness evaluation in vehicular ad-hoc networks S Gurung, D Lin, A Squicciarini, E Bertino International conference on network and system security, 94-108, 2013 | 88 | 2013 |
Conditional privacy-aware role based access control Q Ni, D Lin, E Bertino, J Lobo European Symposium on Research in Computer Security, 72-89, 2007 | 84 | 2007 |