| 2009 |
13 | | Xiaojun Ye,
Zude Li,
Bin Li,
Feng Xie:
Trust and Privacy in Dissemination Control.
ICEBE 2009: 173-180 |
12 | | Zude Li,
Mechelle Gittens,
Syed Shariyar Murtaza,
Nazim H. Madhavji,
Andriy V. Miranskyy,
David Godwin,
Enzo Cialini:
Analysis of pervasive multiple-component defects in a large software system.
ICSM 2009: 265-273 |
11 | | Zude Li,
Quazi Abidur Rahman,
Remo Ferrari,
Nazim H. Madhavji:
Does Requirements Clustering Lead to Modular Design?.
REFSQ 2009: 233-239 |
| 2008 |
10 | | Yalong Dong,
Zude Li,
Xiaojun Ye:
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets.
APWeb 2008: 263-274 |
| 2007 |
9 | | Xiaojun Ye,
Zude Li,
Yongnian Li:
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic.
DASFAA 2007: 676-687 |
8 | | Zude Li,
Quazi Abidur Rahman,
Nazim H. Madhavji:
An Approach to Requirements Encapsulation with Clustering.
WER 2007: 92-96 |
| 2006 |
7 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Resource Management Continuity With Constraint Inheritance Relation.
ARES 2006: 609-616 |
6 | | Guoqiang Zhan,
Zude Li,
Xiaojun Ye,
Jianmin Wang:
Privacy Preservation and Protection by Extending Generalized Partial Indices.
BNCOD 2006: 102-114 |
5 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Towards a More Reasonable Generalization Cost Metric for K-Anonymization.
BNCOD 2006: 258-261 |
4 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules.
DEXA 2006: 883-893 |
3 | | Guoqiang Zhan,
Zude Li,
Xiaojun Ye,
Jianmin Wang:
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.
TrustBus 2006: 132-141 |
2 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection.
WAIM 2006: 193-204 |
1 | | Zude Li,
Xiaojun Ye:
Towards a dynamic multi-policy dissemination control model: (DMDCON).
SIGMOD Record 35(1): 33-38 (2006) |