Differentially private data publishing and analysis: A survey T Zhu, G Li, W Zhou, SY Philip IEEE Transactions on Knowledge and Data Engineering 29 (8), 1619-1638, 2017 | 319 | 2017 |
Security and privacy in 6G networks: New areas and new challenges M Wang, T Zhu, T Zhang, J Zhang, S Yu, W Zhou Digital Communications and Networks 6 (3), 281-291, 2020 | 295 | 2020 |
Correlated differential privacy: Hiding information in non-IID data set T Zhu, P Xiong, G Li, W Zhou IEEE Transactions on Information Forensics and Security 10 (2), 229-242, 2014 | 220 | 2014 |
A blockchain-based location privacy-preserving crowdsensing system M Yang, T Zhu, K Liang, W Zhou, RH Deng Future Generation Computer Systems 94, 408-418, 2019 | 192 | 2019 |
差分隐私保护及其应用 熊平, 朱天清, 王晓峰 计算机学报 37 (1), 101-122, 2014 | 147* | 2014 |
Local differential privacy and its applications: A comprehensive survey M Yang, T Guo, T Zhu, I Tjuawinata, J Zhao, KY Lam Computer Standards & Interfaces, 103827, 2023 | 135 | 2023 |
Location privacy and its applications: A systematic study B Liu, W Zhou, T Zhu, L Gao, Y Xiang IEEE access 6, 17606-17624, 2018 | 134 | 2018 |
More than privacy: Applying differential privacy in key areas of artificial intelligence T Zhu, D Ye, W Wang, W Zhou, SY Philip IEEE Transactions on Knowledge and Data Engineering 34 (6), 2824-2843, 2020 | 133 | 2020 |
Machine Unlearning: A Survey PSY Heng Xu, Tianqing Zhu, Wanlei Zhou ACM Computing Surveys 56 (1), 1-36, 2023 | 105* | 2023 |
Differential privacy and applications T Zhu, G Li, W Zhou, SY Philip Springer International Publishing, 2017 | 97 | 2017 |
An effective privacy preserving algorithm for neighborhood-based collaborative filtering T Zhu, Y Ren, W Zhou, J Rong, P Xiong Future Generation Computer Systems 36, 142-155, 2014 | 85 | 2014 |
Differential privacy for neighborhood-based collaborative filtering T Zhu, G Li, Y Ren, W Zhou, P Xiong Proceedings of the 2013 IEEE/ACM international conference on advances in …, 2013 | 78 | 2013 |
Machine learning differential privacy with multifunctional aggregation in a fog computing architecture M Yang, T Zhu, B Liu, Y Xiang, W Zhou IEEE Access 6, 17119-17129, 2018 | 76 | 2018 |
From distributed machine learning to federated learning: In the view of data privacy and security S Shen, T Zhu, D Wu, W Wang, W Zhou Concurrency and Computation: Practice and Experience 34 (16), e6002, 2022 | 73 | 2022 |
BoSMoS: A blockchain-based status monitoring system for defending against unauthorized software updating in industrial Internet of Things S He, W Ren, T Zhu, KKR Choo IEEE Internet of Things Journal 7 (2), 948-959, 2019 | 71 | 2019 |
Resource allocation in IoT edge computing via concurrent federated reinforcement learning Z Tianqing, W Zhou, D Ye, Z Cheng, J Li IEEE Internet of Things Journal 9 (2), 1414-1426, 2021 | 70 | 2021 |
Correlated differential privacy: Feature selection in machine learning T Zhang, T Zhu, P Xiong, H Huo, Z Tari, W Zhou IEEE Transactions on Industrial Informatics 16 (3), 2115-2124, 2019 | 67 | 2019 |
A blockchain-based decentralized, fair and authenticated information sharing scheme in zero trust internet-of-things Y Liu, X Hao, W Ren, R Xiong, T Zhu, KKR Choo, G Min IEEE Transactions on Computers 72 (2), 501-512, 2022 | 66 | 2022 |
Silence is golden: Enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks B Liu, W Zhou, T Zhu, L Gao, TH Luan, H Zhou IEEE transactions on vehicular technology 65 (12), 9942-9953, 2016 | 61 | 2016 |
Android malware detection with contrasting permission patterns P Xiong, X Wang, W Niu, T Zhu, G Li China Communications 11 (8), 1-14, 2014 | 60 | 2014 |