Information security in big data: privacy and data mining L Xu, C Jiang, J Wang, J Yuan, Y Ren Ieee Access 2, 1149-1176, 2014 | 739 | 2014 |
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks K Gai, Y Wu, L Zhu, L Xu, Y Zhang IEEE Internet of Things Journal 6 (5), 7992-8004, 2019 | 312 | 2019 |
Privacy or utility in data collection? A contract theoretic approach L Xu, C Jiang, Y Chen, Y Ren, KJR Liu IEEE Journal of Selected Topics in Signal Processing 9 (7), 1256-1269, 2015 | 103 | 2015 |
Energy efficient D2D communications: A perspective of mechanism design L Xu, C Jiang, Y Shen, TQS Quek, Z Han, Y Ren IEEE Transactions on Wireless Communications 15 (11), 7272-7285, 2016 | 62 | 2016 |
A framework for categorizing and applying privacy-preservation techniques in big data mining L Xu, C Jiang, Y Chen, J Wang, Y Ren Computer 49 (2), 54-62, 2016 | 61 | 2016 |
Trust-based collaborative privacy management in online social networks L Xu, C Jiang, N He, Z Han, A Benslimane IEEE Transactions on Information Forensics and Security 14 (1), 48-60, 2018 | 51 | 2018 |
Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards L Xu, C Jiang, Y Qian, Y Zhao, J Li, Y Ren IEEE Transactions on Information Forensics and Security 12 (2), 271-285, 2016 | 46 | 2016 |
Distributed data privacy preservation in IoT applications J Du, C Jiang, E Gelenbe, L Xu, J Li, Y Ren IEEE Wireless Communications 25 (6), 68-76, 2018 | 40 | 2018 |
User participation in collaborative filtering-based recommendation systems: a game theoretic approach L Xu, C Jiang, Y Chen, Y Ren, KJR Liu IEEE transactions on cybernetics 49 (4), 1339-1352, 2018 | 31 | 2018 |
Blockchain-based multimedia sharing in vehicular social networks with privacy protection K Shi, L Zhu, C Zhang, L Xu, F Gao Multimedia Tools and Applications 79, 8085-8105, 2020 | 30 | 2020 |
Microblog dimensionality reduction—a deep learning approach L Xu, C Jiang, Y Ren, HH Chen IEEE Transactions on Knowledge and Data Engineering 28 (7), 1779-1789, 2016 | 27 | 2016 |
Graph-based ajax crawl: Mining data from rich internet applications Z Peng, N He, C Jiang, Z Li, L Xu, Y Li, Y Ren 2012 International Conference on Computer Science and Electronics …, 2012 | 27 | 2012 |
Trust-based privacy-preserving photo sharing in online social networks L Xu, T Bao, L Zhu, Y Zhang IEEE Transactions on Multimedia 21 (3), 591-602, 2018 | 26 | 2018 |
User association in heterogeneous networks: A social interaction approach Y Meng, C Jiang, L Xu, Y Ren, Z Han IEEE Transactions on Vehicular Technology 65 (12), 9982-9993, 2016 | 26 | 2016 |
Blockchain-enabled data provenance in cloud datacenter reengineering H Li, K Gai, Z Fang, L Zhu, L Xu, P Jiang Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019 | 19 | 2019 |
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system L Xu, C Jiang, N He, Y Qian, Y Ren, J Li IEEE Internet of Things Journal 5 (5), 4178-4190, 2018 | 17 | 2018 |
Game theoretic data privacy preservation: Equilibrium and pricing L Xu, C Jiang, J Wang, Y Ren, J Yuan, M Guizani 2015 IEEE International Conference on Communications (ICC), 7071-7076, 2015 | 15 | 2015 |
Privacy-accuracy trade-off in differentially-private distributed classification: A game theoretical approach L Xu, C Jiang, Y Qian, J Li, Y Zhao, Y Ren IEEE Transactions on Big Data 7 (4), 770-783, 2017 | 13 | 2017 |
User participation game in collaborative filtering L Xu, C Jiang, Y Qian, Y Ren, L Xu, C Jiang, Y Qian, Y Ren Data Privacy Games, 119-149, 2018 | 11 | 2018 |
Successive point-of-interest recommendation with personalized local differential privacy T Bao, L Xu, L Zhu, L Wang, T Li IEEE Transactions on Vehicular Technology 70 (10), 10477-10488, 2021 | 10 | 2021 |