Query and update efficient B+-tree based indexing of moving objects CS Jensen, D Lin, BC Ooi Proceedings of the Thirtieth international conference on Very large data …, 2004 | 511 | 2004 |
iPrivacy: image privacy protection by identifying sensitive objects via deep multi-task learning J Yu, B Zhang, Z Kuang, D Lin, J Fan IEEE Transactions on Information Forensics and Security 12 (5), 1005-1016, 2016 | 329 | 2016 |
Ensuring Distributed Accountability for Data Sharing in the Cloud S Sundareswaran, A Squicciarini, D Lin Dependable and Secure Computing, IEEE Transactions on 9 (4), 556-568, 2012 | 297 | 2012 |
A brokerage-based approach for cloud service selection S Sundareswaran, A Squicciarini, D Lin 2012 IEEE Fifth International Conference on Cloud Computing, 558-565, 2012 | 257 | 2012 |
MoZo: A moving zone based routing protocol using pure V2V communication in VANETs D Lin, J Kang, A Squicciarini, Y Wu, S Gurung, O Tonguz Ieee transactions on mobile computing 16 (5), 1357-1370, 2016 | 252 | 2016 |
Leveraging content sensitiveness and user trustworthiness to recommend fine-grained privacy settings for social image sharing J Yu, Z Kuang, B Zhang, W Zhang, D Lin, J Fan IEEE transactions on information forensics and security 13 (5), 1317-1332, 2018 | 214 | 2018 |
An approach to evaluate data trustworthiness based on data provenance C Dai, D Lin, E Bertino, M Kantarcioglu Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008 | 212 | 2008 |
Continuous clustering of moving objects CS Jensen, D Lin, BC Ooi IEEE transactions on knowledge and data engineering 19 (9), 1161-1174, 2007 | 209 | 2007 |
Access control policy combining: theory meets practice N Li, Q Wang, W Qardaji, E Bertino, P Rao, J Lobo, D Lin Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 163 | 2009 |
Effective density queries on continuouslymoving objects CS Jensen, D Lin, BC Ooi, R Zhang 22nd International Conference on Data Engineering (ICDE'06), 71-71, 2006 | 140 | 2006 |
Privacy policy inference of user-uploaded images on content sharing sites AC Squicciarini, D Lin, S Sundareswaran, J Wede IEEE transactions on knowledge and data engineering 27 (1), 193-206, 2014 | 136 | 2014 |
Information-oriented trustworthiness evaluation in vehicular ad-hoc networks S Gurung, D Lin, A Squicciarini, E Bertino Network and System Security: 7th International Conference, NSS 2013, Madrid …, 2013 | 135 | 2013 |
An algebra for fine-grained integration of XACML policies P Rao, D Lin, E Bertino, N Li, J Lobo Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 131 | 2009 |
Efficient indexing of the historical, present, and future positions of moving objects D Lin, CS Jensen, BC Ooi, S Šaltenis Proceedings of the 6th international conference on Mobile data management, 59-66, 2005 | 121 | 2005 |
A3p: adaptive policy prediction for shared images over popular content sharing sites AC Squicciarini, S Sundareswaran, D Lin, J Wede Proceedings of the 22nd ACM conference on Hypertext and hypermedia, 261-270, 2011 | 116 | 2011 |
Preventing information leakage from indexing in the cloud A Squicciarini, S Sundareswaran, D Lin 2010 IEEE 3rd International Conference on Cloud Computing, 188-195, 2010 | 115 | 2010 |
A benchmark for evaluating moving object indexes S Chen, CS Jensen, D Lin Proceedings of the VLDB Endowment 1 (2), 1574-1585, 2008 | 109 | 2008 |
An approach to evaluate policy similarity D Lin, P Rao, E Bertino, J Lobo Proceedings of the 12th ACM symposium on Access control models and …, 2007 | 96 | 2007 |
EXAM: a comprehensive environment for the analysis of access control policies D Lin, P Rao, E Bertino, N Li, J Lobo International Journal of Information Security 9, 253-273, 2010 | 92 | 2010 |
Learning urban community structures: A collective embedding perspective with periodic spatial-temporal mobility graphs P Wang, Y Fu, J Zhang, X Li, D Lin ACM Transactions on Intelligent Systems and Technology (TIST) 9 (6), 1-28, 2018 | 87 | 2018 |