Justin Zhijun Zhan
Justin Z. Zhan – Justin Zhan
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2010 – today
- 2018
- [j50]Payam Ezatpoor, Justin Zhan, Jimmy Ming-Thai Wu, Carter Chiu:
Finding Top-k Dominance on Incomplete Big Data Using MapReduce Framework. IEEE Access 6: 7872-7887 (2018) - [j49]Moinak Bhaduri, Justin Zhan:
Using Empirical Recurrence Rates Ratio for Time Series Data Similarity. IEEE Access 6: 30855-30864 (2018) - [j48]Carter Chiu, Justin Zhan:
Deep Learning for Link Prediction in Dynamic Networks Using Weak Estimators. IEEE Access 6: 35937-35945 (2018) - [j47]Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Justin Zhan, Ji Zhang:
Exploiting highly qualified pattern with frequency and weight occupancy. Knowl. Inf. Syst. 56(1): 165-196 (2018) - [c80]Felix Zhan, Gabriella Laines, Sarah Deniz, Sahan Paliskara, Irvin Ochoa, Idania Guerra, Shahab Tayeb, Carter Chiu, Matin Pirouz, Elliott Ploutz, Justin Zhan, Laxmi Gewali, Paul Oh:
Prediction of online social networks users' behaviors with a game theoretic approach. CCNC 2018: 1-2 - [c79]Felix Zhan, Brandon Waters, Maria Mijangos, LeAnn Chung, Raghav Bhagat, Tanvi Bhagat, Matin Pirouz, Carter Chiu, Shahab Tayeb, Elliott Ploutz, Justin Zhan, Laxmi Gewali:
An efficient alternative to personalized page rank for friend recommendations. CCNC 2018: 1-2 - [c78]Matin Pirouz, Justin Zhan:
Optimized Label Propagation Community Detection on Big Data Networks. ICBDE 2018: 57-62 - [c77]Matin Pirouz, Sai Phani Parsa, Justin Zhan:
Optimized Rank Estimator in Big Data Social Networks. ICBDE 2018: 80-84 - 2017
- [j46]Jimmy Ming-Thai Wu, Justin Zhan, Jerry Chun-Wei Lin:
Ant Colony System Sanitization Approach to Hiding Sensitive Itemsets. IEEE Access 5: 10024-10039 (2017) - [j45]Raymond Ahn, Justin Zhan:
Using Proxies for Node Immunization Identification on Large Graphs. IEEE Access 5: 13046-13053 (2017) - [j44]Carter Chiu, Justin Zhan, Felix Zhan:
Uncovering Suspicious Activity From Partially Paired and Incomplete Multimodal Data. IEEE Access 5: 13689-13698 (2017) - [j43]Moinak Bhaduri, Justin Zhan, Carter Chiu, Felix Zhan:
A Novel Online and Non-Parametric Approach for Drift Detection in Big Data. IEEE Access 5: 15883-15892 (2017) - [j42]Matin Pirouz, Justin Zhan:
Toward Efficient Hub-Less Real Time Personalized PageRank. IEEE Access 5: 26364-26375 (2017) - [j41]Moinak Bhaduri, Justin Zhan, Carter Chiu:
A Novel Weak Estimator For Dynamic Systems. IEEE Access 5: 27354-27365 (2017) - [j40]Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Justin Zhan:
Mining of frequent patterns with multiple minimum supports. Eng. Appl. of AI 60: 83-96 (2017) - [j39]Wensheng Gan, Jerry Chun-Wei Lin, Philippe Fournier-Viger, Han-Chieh Chao, Jimmy Ming-Thai Wu, Justin Zhan:
Extracting recent weighted-based patterns from uncertain temporal databases. Eng. Appl. of AI 61: 161-172 (2017) - [j38]Justin Zhan, Timothy Rafalski, Gennady Stashkevich, Edward Verenich:
Vaccination allocation in large dynamic networks. J. Big Data 4: 2 (2017) - [j37]Justin Zhan, Sweta Gurung, Sai Phani Krishna Parsa:
Identification of top-K nodes in large networks using Katz centrality. J. Big Data 4: 16 (2017) - [j36]Justin Zhan, Binay Dahal:
Using deep learning for short text understanding. J. Big Data 4: 34 (2017) - [j35]Jerry Chun-Wei Lin, Tzung-Pei Hong, Philippe Fournier-Viger, Qiankun Liu, Jia-Wei Wong, Justin Zhan:
Efficient hiding of confidential high-utility itemsets with minimal side effects. J. Exp. Theor. Artif. Intell. 29(6): 1225-1245 (2017) - [j34]Jimmy Ming-Thai Wu, Justin Zhan, Jerry Chun-Wei Lin:
An ACO-based approach to mine high-utility itemsets. Knowl.-Based Syst. 116: 102-113 (2017) - [j33]Pravin Chopade, Justin Zhan:
A Framework for Community Detection in Large Networks Using Game-Theoretic Modeling. IEEE Trans. Big Data 3(3): 276-288 (2017) - [j32]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Justin Zhan:
Cover Image, Volume 7, Issue 6. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 7(6) (2017) - [j31]Wensheng Gan, Jerry Chun-Wei Lin, Han-Chieh Chao, Justin Zhan:
Data mining in distributed environment: a survey. Wiley Interdiscip. Rev. Data Min. Knowl. Discov. 7(6) (2017) - [c76]Shahab Tayeb, Matin Pirouz, Brittany Cozzens, Richard Huang, Maxwell Jay, Kyle Khembunjong, Sahan Paliskara, Felix Zhan, Mark Zhang, Justin Zhan, Shahram Latifi:
Toward data quality analytics in signature verification using a convolutional neural network. BigData 2017: 2644-2651 - [c75]Shahab Tayeb, Matin Pirouz, Johann Sun, Kaylee Hall, Andrew Chang, Jessica Li, Connor Song, Apoorva Chauhan, Michael Ferra, Theresa Sager, Justin Zhan, Shahram Latifi:
Toward predicting medical conditions using k-nearest neighbors. BigData 2017: 3897-3903 - [c74]Shahab Tayeb, Matin Pirouz, Gabriel Esguerra, Kimiya Ghobadi, Jimson Huang, Robin Hill, Derwin Lawson, Stone Li, Tiffany Zhan, Justin Zhan, Shahram Latifi:
Securing the positioning signals of autonomous vehicles. BigData 2017: 4522-4528 - 2016
- [j30]Jerry Chun-Wei Lin, Ting Li, Philippe Fournier-Viger, Tzung-Pei Hong, Justin Zhan, Miroslav Voznak:
An efficient algorithm to mine high average-utility itemsets. Advanced Engineering Informatics 30(2): 233-243 (2016) - [j29]Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Miroslav Voznak, Justin Zhan:
A sanitization approach for hiding sensitive itemsets based on particle swarm optimization. Eng. Appl. of AI 53: 1-18 (2016) - [j28]Jerry Chun-Wei Lin, Tsu-Yang Wu, Philippe Fournier-Viger, Guo Lin, Justin Zhan, Miroslav Voznak:
Fast algorithms for hiding sensitive high-utility itemsets in privacy-preserving utility mining. Eng. Appl. of AI 55: 269-284 (2016) - [j27]Jerry Chun-Wei Lin, Lu Yang, Philippe Fournier-Viger, Jimmy Ming-Thai Wu, Tzung-Pei Hong, Shyue-Liang Leon Wang, Justin Zhan:
Mining high-utility itemsets based on particle swarm optimization. Eng. Appl. of AI 55: 320-330 (2016) - [j26]Haysam Selim, Justin Zhan:
Towards shortest path identification on large networks. J. Big Data 3: 10 (2016) - [j25]Matin Pirouz, Justin Zhan:
Optimized relativity search: node reduction in personalized page rank estimation for large graphs. J. Big Data 3: 12 (2016) - [j24]Justin Zhan, Vivek Guidibande, Sai Phani Krishna Parsa:
Identification of top-K influential communities in big networks. J. Big Data 3: 16 (2016) - [j23]Matin Pirouz, Justin Zhan, Shahab Tayeb:
An optimized approach for community detection and ranking. J. Big Data 3: 22 (2016) - [j22]Jerry Chun-Wei Lin, Wensheng Gan, Philippe Fournier-Viger, Tzung-Pei Hong, Justin Zhan:
Efficient mining of high-utility itemsets using multiple minimum utility thresholds. Knowl.-Based Syst. 113: 100-115 (2016) - [c73]Jerry Chun-Wei Lin, Qiankun Liu, Philippe Fournier-Viger, Tzung-Pei Hong, Justin Zhan, Miroslav Voznak:
An Efficient Anonymous System for Transaction Data. MISNC 2016: 28 - [c72]Jimmy Ming-Thai Wu, Justin Zhan, Jerry Chun-Wei Lin:
Mining of High-Utility Itemsets by ACO Algorithm. MISNC 2016: 44 - [c71]Haysam Selim, Shahab Tayeb, Yoohwan Kim, Justin Zhan, Matin Pirouz:
Vulnerability Analysis of Iframe Attacks on Websites. MISNC 2016: 45 - 2015
- [j21]
- [j20]Pravin Chopade, Justin Zhan:
Structural and functional analytics for community detection in large-scale complex networks. J. Big Data 2: 11 (2015) - [j19]Pravin Chopade, Justin Zhan:
Erratum to: Structural and functional analytics for community detection in large-scale complex networks. J. Big Data 2: 19 (2015) - [c70]Lindsay Simpkins, Xiaohong Yuan, Jwalit Modi, Justin Zhan, Li Yang:
A course module on web tracking and privacy. InfoSecCD 2015: 10:1-10:7 - 2014
- [j18]Justin Zhan, Xing Fang:
A computational framework for detecting malicious actors in communities. IJIPSI 2(1): 1-20 (2014) - [c69]Yi-Ting Chiang, Tsan-sheng Hsu, Churn-Jung Liau, Yun-Ching Liu, Chih-Hao Shen, Da-Wei Wang, Justin Zhan:
An Information-Theoretic Approach for Secure Protocol Composition. SecureComm (1) 2014: 405-423 - 2013
- [j17]Stefanos Gritzalis, Justin Z. Zhan, Kitae Jeong:
IT convergence and security. Electronic Commerce Research 13(3): 237-241 (2013) - [j16]
- [c68]Arcot Rajasekar, Sharlini Sankaran, Howard Lander, Tom Carsey, Jonathan David Crabtree, Hye-Chung Kum, Mercè Crosas, Gary King, Justin Zhan:
Sociometric Methods for Relevancy Analysis of Long Tail Science Data. SocialCom 2013: 1-6 - [c67]Xing Fang, Justin Zhan, Nicholas Koceja:
Towards Network Reduction on Big Data. SocialCom 2013: 685-690 - [c66]Ahmad Albu-Shamah, Justin Zhan:
Towards Obesity Causes, Prevalence and Prevention. SocialCom 2013: 852-857 - [c65]Curtis M. Passmore, Justin Zhan:
Determining Appropriate Staffing Adjustments in a Call Center Staff Group. SocialCom 2013: 1046-1053 - 2012
- [j15]Dongsong Zhang, Wenji Mao, Justin Zhan, Daniel Zeng:
Editorial: special issue on "social computing and e-business". Inf. Syst. E-Business Management 10(2): 161-163 (2012) - [c64]Xing Fang, Nicholas Koceja, Justin Zhan, Gerry V. Dozier, Dipankar Dasgupta:
An artificial immune system for phishing detection. IEEE Congress on Evolutionary Computation 2012: 1-7 - [c63]Munene W. Kanampiu, Justin Zhan:
A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community. CyberSecurity 2012: 178-186 - [c62]Alex Doyal, Justin Zhan, Huiming Anna Yu:
Towards Defeating DDoS Attacks. CyberSecurity 2012: 209-212 - [c61]Huiming Anna Yu, Jonathan Rann, Justin Zhan:
SUCH: A Cloud Computing Management Tool. NTMS 2012: 1-4 - [c60]Xing Fang, Justin Zhan:
Task-Oriented Social Ego Network Generation via Dynamic Collaborator Selection. SocialCom/PASSAT 2012: 41-50 - [c59]Munene W. Kanampiu, Justin Zhan, Jinsuk Baek:
A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection. SocialCom/PASSAT 2012: 813-818 - [c58]Xing Fang, Justin Zhan:
A Computational Framework for Detecting Malicious Actors in Communities. SocialInformatics 2012: 339-343 - 2011
- [j14]Nancy R. Mead, Seiya Miyazaki, Justin Zhan:
Integrating privacy requirements considerations into a security requirements engineering method and tool. IJIPSI 1(1): 106-126 (2011) - [j13]
- [j12]Justin Zhan, B. John Oommen, Johanna Crisostomo:
Anomaly Detection in Dynamic Systems Using Weak Estimators. ACM Trans. Internet Techn. 11(1): 3:1-3:16 (2011) - [c57]Justin Zhan, Lijo Thomas:
Phishing detection using stochastic learning-based weak estimators. CICS 2011: 55-59 - [c56]Justin Zhan, Xing Fang, Peter Killion:
Trust optimization in task-oriented social networks. CICS 2011: 137-143 - [c55]Justin Zhan, Xing Fang, Naveen Bandaru:
Location privacy protection on social networks. CICS 2011: 160-163 - [c54]Justin Zhan, Lijo Thomas, Venkata Pasumarthi:
Using gaming strategies for attacker and defender in recommender systems. CIDM 2011: 80-87 - [c53]Justin Zhan, B. John Oommen, Johanna Crisostomo:
Anomaly detection using weak estimators. ISI 2011: 143-149 - [c52]Xing Fang, Justin Zhan, Nicholas Koceja, Kenneth Williams, Justin Brewton:
Integrating online social networks for enhancing reputation systems of e-commerce. ISI 2011: 384-389 - [c51]
- [c50]
- [c49]Justin Zhan, Nadia M. Jones, Michael D. Purnell:
Top-K Algorithm for Recommendation in Social Networking Kingdoms. SocialCom/PASSAT 2011: 688-694 - [c48]Justin Zhan, Xing Fang:
Anomaly Detection in Social-Economic Computing. SocialCom/PASSAT 2011: 695-703 - [c47]Justin Zhan, Luis Cabrera, Gasim Osman, Ronak Shah:
Using Private Matching for Securely Querying Genomic Sequences. SocialCom/PASSAT 2011: 1163-1168 - [c46]Justin Zhan, Xing Fang:
A Novel Trust Computing System for Social Networks. SocialCom/PASSAT 2011: 1284-1289 - 2010
- [j11]
- [j10]Jie Wang, Jun Zhang, Justin Zhan:
Towards real-time performance of data privacy protection. IJGCRSIS 1(4): 329-342 (2010) - [j9]Hyun-A Park, Jong Wook Hong, Jae Hyun Park, Justin Zhan, Dong Hoon Lee:
Combined Authentication-Based Multilevel Access Control in Mobile Application for DailyLifeService. IEEE Trans. Mob. Comput. 9(6): 824-837 (2010) - [j8]Justin Zhan, Chia-Lung Hsieh, I-Cheng Wang, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
Privacy-Preserving Collaborative Recommender Systems. IEEE Trans. Systems, Man, and Cybernetics, Part C 40(4): 472-476 (2010) - [j7]Justin Zhan:
Secure Collaborative Social Networks. IEEE Trans. Systems, Man, and Cybernetics, Part C 40(6): 682-689 (2010) - [c45]Teng-Kai Yu, D. T. Lee, Shih-Ming Chang, Justin Zhan:
Multi-party k-Means Clustering with Privacy Consideration. ISPA 2010: 200-207 - [c44]Justin Zhan, Xing Fang:
A Computational Trust Framework for Social Computing (A Position Paper for Panel Discussion on Social Computing Foundations). SocialCom/PASSAT 2010: 264-269 - [c43]Krist Beck, Justin Zhan:
Phishing Using a Modified Bayesian Technique. SocialCom/PASSAT 2010: 649-655 - [c42]Yitao Duan, NetEase Youdao, John F. Canny, Justin Z. Zhan:
P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users. USENIX Security Symposium 2010: 207-222
2000 – 2009
- 2009
- [j6]I-Cheng Wang, Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
Toward Empirical Aspects of Secure Scalar Product. IEEE Trans. Systems, Man, and Cybernetics, Part C 39(4): 440-447 (2009) - [c41]Justin Zhan, B. John Oommen, Johanna Crisostomo:
Anomaly Detection in Dynamic Social Systems Using Weak Estimators. CSE (4) 2009: 18-25 - [c40]
- [c39]Chunhua Su, Justin Zhan, Kouichi Sakurai:
Importance of Data Standardization in Privacy-Preserving K-Means Clustering. DASFAA Workshops 2009: 276-286 - [c38]
- [c37]
- 2008
- [c36]Seiya Miyazaki, Nancy R. Mead, Justin Zhan:
Computer-Aided Privacy Requirements Elicitation Technique. APSCC 2008: 367-372 - [c35]Ching-Hsien Hsu, Justin Zhan, Wai-Chi Fang, Jianhua Ma:
Towards Improving QoS-Guided Scheduling in Grids. ChinaGrid 2008: 89-95 - [c34]Justin Zhijun Zhan, Tsau Young Lin:
Granular Computing in Privacy-preserving Data Mining. GrC 2008: 86-92 - [c33]Hyun-A Park, Dong Hoon Lee, Justin Zhan:
Attribute-based Access Control using Combined Authentication Technologies. GrC 2008: 518-523 - [c32]Chih-Hao Shen, Justin Zhan, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
Scalar-product based Secure Two-party Computation. GrC 2008: 556-561 - [c31]
- [c30]Justin Zhan, I-Cheng Wang, Chia-Lung Hsieh, Tsan-sheng Hsu, Churn-Jung Liau, Da-Wei Wang:
Towards Efficient Privacy-preserving Collaborative Recommender Systems. GrC 2008: 778-783 - [c29]Justin Zhan, Gary Blosser, Christopher C. Yang, Lisa Singh:
Privacy-Preserving Collaborative Social Networks. ISI Workshops 2008: 114-125 - [c28]Hyun-A Park, Dong Hoon Lee, Justin Zhan, Gary Blosser:
Efficient keyword index search over encrypted documents of groups. ISI 2008: 225-229 - [c27]Xian-Ming Xu, Justin Zhan, Hai-tao Zhu:
Using Social Networks to Organize Researcher Community. ISI Workshops 2008: 421-427 - [c26]
- [c25]Hyun-A Park, Justin Zhan, Dong Hoon Lee:
Privacy-Aware Access Control through Negotiation in Daily Life Service. ISI Workshops 2008: 514-519 - [p3]Justin Zhijun Zhan, LiWu Chang, Stan Matwin:
How to Prevent Private Data from being Disclosed to a Malicious Attacker. Data Mining: Foundations and Practice 2008: 517-528 - [p2]Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data. Data Mining: Foundations and Practice 2008: 529-538 - [e1]Christopher C. Yang, Hsinchun Chen, Michael Chau, Kuiyu Chang, Sheau-Dong Lang, Patrick S. Chen, Raymond Hsieh, Daniel Zeng, Fei-Yue Wang, Kathleen M. Carley, Wenji Mao, Justin Zhan:
Intelligence and Security Informatics, IEEE ISI 2008 International Workshops: PAISI, PACCF, and SOCO 2008, Taipei, Taiwan, June 17, 2008. Proceedings. Lecture Notes in Computer Science 5075, Springer 2008, ISBN 978-3-540-69136-5 [contents] - 2007
- [j5]Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Privacy-preserving multi-party decision tree induction. IJBIDM 2(2): 197-212 (2007) - [j4]Justin Zhijun Zhan, Stan Matwin:
Privacy-preserving support vector machine classification. IJIIDS 1(3/4): 356-385 (2007) - [j3]Justin Zhijun Zhan, Stan Matwin:
Privacy-Preserving Data Mining in Electronic Surveys. I. J. Network Security 4(3): 318-327 (2007) - [j2]Justin Zhijun Zhan, Stan Matwin, LiWu Chang:
Privacy-preserving collaborative association rule mining. J. Network and Computer Applications 30(3): 1216-1227 (2007) - [c24]
- [c23]Justin Z. Zhan:
Using Homomorphic Encryption For Privacy-Preserving Collaborative Decision Tree Classification. CIDM 2007: 637-645 - [c22]Yitao Duan, John F. Canny, Justin Z. Zhan:
Efficient Privacy-Preserving Association Rule Mining: P4P Style. CIDM 2007: 654-660 - [c21]Wen-Ran Zhang, Justin Zhan:
A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing. GrC 2007: 28-31 - [c20]Kilho Shin, Justin Zhan:
A Verification Scheme for Data Aggregation in Data Mining. GrC 2007: 374-379 - [c19]Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search. GrC 2007: 598- - [c18]
- [c17]
- [c16]
- [c15]Justin Z. Zhan:
Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining. ISI 2007: 331-334 - [c14]
- [c13]
- [i1]Hyun-A Park, Bum Han Kim, Dong Hoon Lee, Yon Dohn Chung, Justin Zhan:
Secure Similarity Search. IACR Cryptology ePrint Archive 2007: 312 (2007) - 2006
- [c12]Justin Zhijun Zhan, Stan Matwin:
A Crypto-Based Approach to Privacy-Preserving Collaborative Data Mining. ICDM Workshops 2006: 546-550 - [c11]Justin Zhijun Zhan, Stan Matwin:
Privacy-Oriented Collaborative Learning Systems. SMC 2006: 4102-4105 - [c10]Justin Z. Zhan:
Using Cryptography for Privacy Protection in Data Mining Systems. WImBI 2006: 494-513 - [p1]Justin Zhijun Zhan, LiWu Chang, Stan Matwin:
Privacy-Preserving Collaborative Data Mining. Foundations and Novel Approaches in Data Mining 2006: 213-227 - 2005
- [j1]Justin Zhijun Zhan, LiWu Chang, Stan Matwin:
Privacy Preserving K-nearest Neighbor Classification. I. J. Network Security 1(1): 46-51 (2005) - [c9]