Follow
Lei Xu
Lei Xu
Verified email at bit.edu.cn
Title
Cited by
Cited by
Year
Information security in big data: privacy and data mining
L Xu, C Jiang, J Wang, J Yuan, Y Ren
Ieee Access 2, 1149-1176, 2014
6172014
Permissioned blockchain and edge computing empowered privacy-preserving smart grid networks
K Gai, Y Wu, L Zhu, L Xu, Y Zhang
IEEE Internet of Things Journal 6 (5), 7992-8004, 2019
2302019
Privacy or utility in data collection? A contract theoretic approach
L Xu, C Jiang, Y Chen, Y Ren, KJR Liu
IEEE Journal of Selected Topics in Signal Processing 9 (7), 1256-1269, 2015
832015
Energy efficient D2D communications: A perspective of mechanism design
L Xu, C Jiang, Y Shen, TQS Quek, Z Han, Y Ren
IEEE Transactions on Wireless Communications 15 (11), 7272-7285, 2016
572016
A framework for categorizing and applying privacy-preservation techniques in big data mining
L Xu, C Jiang, Y Chen, J Wang, Y Ren
Computer 49 (2), 54-62, 2016
552016
Trust-based collaborative privacy management in online social networks
L Xu, C Jiang, N He, Z Han, A Benslimane
IEEE Transactions on Information Forensics and Security 14 (1), 48-60, 2018
412018
Dynamic privacy pricing: A multi-armed bandit approach with time-variant rewards
L Xu, C Jiang, Y Qian, Y Zhao, J Li, Y Ren
IEEE Transactions on Information Forensics and Security 12 (2), 271-285, 2016
352016
Distributed data privacy preservation in IoT applications
J Du, C Jiang, E Gelenbe, L Xu, J Li, Y Ren
IEEE Wireless Communications 25 (6), 68-76, 2018
272018
User participation in collaborative filtering-based recommendation systems: a game theoretic approach
L Xu, C Jiang, Y Chen, Y Ren, KJR Liu
IEEE transactions on cybernetics 49 (4), 1339-1352, 2018
272018
Graph-based ajax crawl: Mining data from rich internet applications
Z Peng, N He, C Jiang, Z Li, L Xu, Y Li, Y Ren
2012 International Conference on Computer Science and Electronics …, 2012
272012
Microblog dimensionality reduction—a deep learning approach
L Xu, C Jiang, Y Ren, HH Chen
IEEE Transactions on Knowledge and Data Engineering 28 (7), 1779-1789, 2016
262016
User association in heterogeneous networks: A social interaction approach
Y Meng, C Jiang, L Xu, Y Ren, Z Han
IEEE Transactions on Vehicular Technology 65 (12), 9982-9993, 2016
252016
Trust-based privacy-preserving photo sharing in online social networks
L Xu, T Bao, L Zhu, Y Zhang
IEEE Transactions on Multimedia 21 (3), 591-602, 2018
212018
Blockchain-based multimedia sharing in vehicular social networks with privacy protection
K Shi, L Zhu, C Zhang, L Xu, F Gao
Multimedia Tools and Applications 79 (11), 8085-8105, 2020
162020
Blockchain-enabled data provenance in cloud datacenter reengineering
H Li, K Gai, Z Fang, L Zhu, L Xu, P Jiang
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure …, 2019
162019
Check in or not? A stochastic game for privacy preserving in point-of-interest recommendation system
L Xu, C Jiang, N He, Y Qian, Y Ren, J Li
IEEE Internet of Things Journal 5 (5), 4178-4190, 2018
142018
Game theoretic data privacy preservation: Equilibrium and pricing
L Xu, C Jiang, J Wang, Y Ren, J Yuan, M Guizani
2015 IEEE International Conference on Communications (ICC), 7071-7076, 2015
132015
Privacy-accuracy trade-off in differentially-private distributed classification: a game theoretical approach
L Xu, C Jiang, Y Qian, J Li, Y Zhao, Y Ren
IEEE Transactions on Big Data, 2017
122017
User participation game in collaborative filtering
L Xu, C Jiang, Y Qian, Y Ren
Data Privacy Games, 119-149, 2018
112018
Ontology generation from web tables: A 1+ 1+ n approach
X Lei, R Yong
2010 International Forum on Information Technology and Applications 1, 234-239, 2010
42010
The system can't perform the operation now. Try again later.
Articles 1–20