| 2009 |
25 | | Yawei Zhang,
Xiaojun Ye,
Feng Xie,
Yong Peng:
A Practical Database Intrusion Detection System Framework.
CIT (1) 2009: 342-347 |
24 | | Naiqiao Du,
Xiaojun Ye,
Jianmin Wang:
Towards workflow-driven database system workload modeling.
DBTest 2009 |
23 | | Lijian Lu,
Xiaojun Ye:
An Improved Weighted-Feature Clustering Algorithm for K-anonymity.
IAS 2009: 415-418 |
22 | | Xiaojun Ye,
Zude Li,
Bin Li,
Feng Xie:
Trust and Privacy in Dissemination Control.
ICEBE 2009: 173-180 |
21 | | Xiaojun Ye,
Jingmin Xie,
Jianmin Wang,
Hao Tang,
Naiqiao Du:
An Approach of Performance Evaluation in Authentic Database Applications.
TPCTC 2009: 253-266 |
| 2008 |
20 | | Yalong Dong,
Zude Li,
Xiaojun Ye:
Privacy Inference Attacking and Prevention on Multiple Relative K-Anonymized Microdata Sets.
APWeb 2008: 263-274 |
19 | | Jingmin Xie,
Xiaojun Ye,
Bin Li,
Feng Xie:
A Configurable Web Service Performance Testing Framework.
HPCC 2008: 312-319 |
18 | | Lei Jin,
Yawei Zhang,
Xiaojun Ye:
An Extensible Data Model with Security Support for Dataspace Management.
HPCC 2008: 556-563 |
17 | | Xiaojun Ye,
Lei Jin,
Bin Li:
A Multi-Dimensional K-Anonymity Model for Hierarchical Data.
ISECS 2008: 327-332 |
16 | | Huanchun Peng,
Jun Gu,
Xiaojun Ye:
Dynamic Purpose-Based Access Control.
ISPA 2008: 695-700 |
15 | | Lei Jin,
Yawei Zhang,
Xiaojun Ye:
Secure Dataspace with Access Policies.
ISPA 2008: 701-706 |
14 | | Xiaojun Ye,
Yawei Zhang,
Ming Liu:
A Personalized (a, k)-Anonymity Model.
WAIM 2008: 341-348 |
| 2007 |
13 | | Hua Zhu,
Xiaojun Ye:
Achieving k -Anonymity Via a Density-Based Clustering Method.
APWeb/WAIM 2007: 745-752 |
12 | | Xiaojun Ye,
Zude Li,
Yongnian Li:
Capture Inference Attacks for K-Anonymity with Privacy Inference Logic.
DASFAA 2007: 676-687 |
11 | | Zhen Li,
Xiaojun Ye:
Privacy Protection on Multiple Sensitive Attributes.
ICICS 2007: 141-152 |
10 | | Shenkun Xu,
Xiaojun Ye:
Risk & Distortion Based K-Anonymity.
WISA 2007: 345-358 |
| 2006 |
9 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Resource Management Continuity With Constraint Inheritance Relation.
ARES 2006: 609-616 |
8 | | Guoqiang Zhan,
Zude Li,
Xiaojun Ye,
Jianmin Wang:
Privacy Preservation and Protection by Extending Generalized Partial Indices.
BNCOD 2006: 102-114 |
7 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Towards a More Reasonable Generalization Cost Metric for K-Anonymization.
BNCOD 2006: 258-261 |
6 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Towards an Anti-inference (K, l)-Anonymity Model with Value Association Rules.
DEXA 2006: 883-893 |
5 | | Min Wu,
Xiaojun Ye:
Towards the Diversity of Sensitive Attributes in k-Anonymity.
IAT Workshops 2006: 98-104 |
4 | | Guoqiang Zhan,
Zude Li,
Xiaojun Ye,
Jianmin Wang:
FGAC-QD: Fine-Grained Access Control Model Based on Query Decomposition Strategy.
TrustBus 2006: 132-141 |
3 | | Zude Li,
Guoqiang Zhan,
Xiaojun Ye:
Role-Based Peer-to-Peer Model: Capture Global Pseudonymity for Privacy Protection.
WAIM 2006: 193-204 |
2 | | Zude Li,
Xiaojun Ye:
Towards a dynamic multi-policy dissemination control model: (DMDCON).
SIGMOD Record 35(1): 33-38 (2006) |
| 2005 |
1 | | Fei Guo,
Jianmin Wang,
Zhihao Zhang,
Xiaojun Ye,
Deyi Li:
An Improved Algorithm to Watermark Numeric Relational Data.
WISA 2005: 138-149 |