default search action
Meiyi Xie
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Enqi Yu, Zhiwei Ye, Zhiqiang Zhang, Ling Qian, Meiyi Xie:
A federated recommendation algorithm based on user clustering and meta-learning. Appl. Soft Comput. 158: 111483 (2024) - [j12]Zhiqiang Zhang, Hong Zhu, Meiyi Xie:
Differential privacy may have a potential optimization effect on some swarm intelligence algorithms besides privacy-preserving. Inf. Sci. 654: 119870 (2024) - 2023
- [c11]Xin Li, Hong Zhu, Zhiqiang Zhang, Meiyi Xie:
Item-Oriented Personalized LDP for Discrete Distribution Estimation. ESORICS (2) 2023: 446-466 - [i1]Zhiqiang Zhang, Hong Zhu, Meiyi Xie:
Differential Privacy May Have a Potential Optimization Effect on Some Swarm Intelligence Algorithms besides Privacy-preserving. CoRR abs/2306.17370 (2023) - 2022
- [j11]Shengren Ke, Meiyi Xie, Hong Zhu, Zhongsheng Cao:
Group-based recurrent neural network for human mobility prediction. Neural Comput. Appl. 34(12): 9863-9883 (2022) - 2021
- [j10]Bing Li, Hong Zhu, Meiyi Xie:
Quantifying Location Privacy Risks Under Heterogeneous Correlations. IEEE Access 9: 23876-23893 (2021) - [c10]Yunkai Yu, Hong Zhu, Meiyi Xie:
CTP: Correlated Trajectory Publication with Differential Privacy. ICCCS 2021: 128-133
2010 – 2019
- 2019
- [j9]Hong Zhu, Xin Zuo, Meiyi Xie:
DP-FT: A Differential Privacy Graph Generation With Field Theory for Social Network Data Release. IEEE Access 7: 164304-164319 (2019) - [c9]Bing Li, Hong Zhu, Meiyi Xie:
LISC: Location Inference Attack Enhanced by Spatial-Temporal-Social Correlations. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1083-1092 - 2018
- [j8]Hong Zhu, Hongbo Li, Zongmin Cui, Zhongsheng Cao, Meiyi Xie:
EFTG: Efficient and Flexible Top-K Geo-textual Publish/Subscribe. KSII Trans. Internet Inf. Syst. 12(12): 5877-5897 (2018) - 2017
- [j7]Qiong Zuo, Meiyi Xie, Guanqiu Qi, Hong Zhu:
Tenant-based access control model for multi-tenancy and sub-tenancy architecture in Software-as-a-Service. Frontiers Comput. Sci. 11(3): 465-484 (2017) - [c8]Hong Zhu, Hongbo Li, Zongmin Cui, Zhongsheng Cao, Meiyi Xie:
Convenient Top-k Location-Text Publish/Subscribe Scheme. ISICA (2) 2017: 183-191 - 2016
- [j6]Qiong Zuo, Meiyi Xie, Wei-Tek Tsai:
Autonomous Decentralized Authorization and Authentication Management for Hierarchical Multi-Tenancy. IEICE Trans. Commun. 99-B(4): 786-793 (2016) - [j5]Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui:
Privacy-assured Boolean Adjacent Vertex Search over Encrypted Graph Data in Cloud Computing. KSII Trans. Internet Inf. Syst. 10(10): 5171-5189 (2016) - [j4]Hong Zhu, Zhuolin Mei, Meiyi Xie:
Identity-based key management for cloud computing. Secur. Commun. Networks 9(13): 2143-2156 (2016) - [j3]Hong Zhu, Bin Wu, Meiyi Xie:
Privacy-preserving ranked neighbor query over encrypted graph data in the cloud. Secur. Commun. Networks 9(16): 3167-3177 (2016) - [c7]Hong Zhu, Bin Wu, Meiyi Xie, Zongmin Cui, Zongda Wu:
Secure Shortest Path Search over Encrypted Graph Supporting Synonym Query in Cloud Computing. Trustcom/BigDataSE/ISPA 2016: 497-504 - 2015
- [j2]Hong Zhu, Shengli Tian, Genyuan Du, Meiyi Xie:
Anonymization on refining partition: Same privacy, more utility. Comput. Sci. Inf. Syst. 12(4): 1193-1216 (2015) - [j1]Hong Zhu, Zhipeng Wang, Kevin Lü, Meiyi Xie, Xiang Zou, Bing Chen:
A distributed scheme for row-based computational private information retrieval. Secur. Commun. Networks 8(8): 1537-1546 (2015) - [c6]Qiong Zuo, Meiyi Xie, Wei-Tek Tsai:
Autonomous Decentralized Tenant Access Control Model for Sub-tenancy Architecture in Software-as-a-Service (SaaS). ISADS 2015: 211-216 - 2014
- [c5]Hong Zhu, Libo Xia, Meiyi Xie, Ke Yan:
Equi-join for Multiple Datasets Based on Time Cost Evaluation Model. ICA3PP (2) 2014: 122-135 - [c4]Hong Zhu, Shengli Tian, Meiyi Xie, Mengyuan Yang:
Preserving privacy for sensitive values of individuals in data publishing based on a new additive noise approach. ICCCN 2014: 1-6 - [c3]Hong Zhu, Shengli Tian, Meiyi Xie:
Anonymization on refining partition: Same privacy, more utility. ICSAI 2014: 998-1005 - 2013
- [c2]Ke Yan, Meiyi Xie, Hong Zhu:
Fixed-length string compression for direct operations in column-oriented databases. ICNC 2013: 1171-1176
2000 – 2009
- 2008
- [c1]Meiyi Xie, Hong Zhu, Yucai Feng, Guanrong Hu:
Tracking and Repairing Damaged Databases Using Before Image Table. FCST 2008: 36-41
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-06 21:03 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint