default search action
Dan Lin 0001
Person information
- affiliation: Vanderbilt University, Nashville, TN, USA
- affiliation (former): Missouri University of Science and Technology, Rolla, MO, USA
- affiliation (former): Purdue University, West Lafayette, IN, USA
- affiliation (PhD 2007): National University of Singapore, Singapore
Other persons with the same name
- Dan Lin — disambiguation page
- Dan Lin 0002 — Tianjin University, China
- Dan Lin 0003 — Simon Fraser University, BC, Canada
- Dan Lin 0004 — Hasselt University, Belgium
- Dan Lin 0005 — University of Virginia, Charlottesville, VA, USA
- Dan Lin 0006 — South China University of Technology, School of Electric Power, Guangzhou, China
- Dan Lin 0007 — Sun Yat-sen University, School of Software Engineering, Zhuhai, China
- Dan Lin 0008 — Dalian University of Technology, School of Software Technology, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Ke Li, Cameron Baird, Dan Lin:
Defend Data Poisoning Attacks on Voice Authentication. IEEE Trans. Dependable Secur. Comput. 21(4): 1754-1769 (2024) - [j44]Alian Yu, Jian Kang, Joshua Morris, Elisa Bertino, Dan Lin:
Fight Malware Like Malware: A New Defense Method Against Crypto Ransomware. IEEE Trans. Dependable Secur. Comput. 21(5): 4953-4966 (2024) - [c64]Srikanth Narayanan, Chaoquan Cai, Dan Lin:
GeoGRCNN: Synthetic Trajectory Generation for Location Privacy Protection. COMPSAC 2024: 1138-1147 - [c63]Jay Barot, Ali Allami, Ming Yin, Dan Lin:
ToneCheck: Unveiling the Impact of Dialects in Privacy Policy. SACMAT 2024 - [i11]Tyler Nicewarner, Wei Jiang, Aniruddha Gokhale, Dan Lin:
Provable Privacy Guarantee for Individual Identities and Locations in Large-Scale Contact Tracing. CoRR abs/2409.12341 (2024) - 2023
- [j43]Joshua Morris, Sara Newman, Kannappan Palaniappan, Jianping Fan, Dan Lin:
"Do You Know You Are Tracked by Photos That You Didn't Take": Large-Scale Location-Aware Multi-Party Image Privacy Protection. IEEE Trans. Dependable Secur. Comput. 20(1): 301-312 (2023) - [j42]Jian Kang, Dan Lin:
Highly Efficient Traffic Planning for Autonomous Vehicles to Cross Intersections Without a Stop. ACM Trans. Intell. Syst. Technol. 14(2): 29:1-29:24 (2023) - [j41]Chaoquan Cai, Dan Lin:
Find Another me Across the World - Large-Scale Semantic Trajectory Analysis Using Spark. IEEE Trans. Knowl. Data Eng. 35(9): 8905-8918 (2023) - [c62]Alian Yu, Jian Kang, Wei Jiang, Dan Lin:
FACT: A Flexible Access Control Technique for Very Large Scale Public IoT Services. PerCom Workshops 2023: 386-391 - [c61]Chaoquan Cai, Wei Jiang, Dan Lin:
Social Community Recommendation based on Large-scale Semantic Trajectory Analysis Using Deep Learning. SSTD 2023: 110-120 - [c60]Tyler Nicewarner, Alian Yu, Wei Jiang, Dan Lin:
Preserving Location Privacy in the Modern Era of Pervasive Environments. TPS-ISA 2023: 44-51 - 2022
- [j40]Tao Jiang, Bin Zhang, Dan Lin, Yunjun Gao, Qing Li:
Efficient parallel processing of high-dimensional spatial kNN queries. Soft Comput. 26(22): 12291-12316 (2022) - [j39]Dalton Cole, Sara Newman, Dan Lin:
A New Facial Authentication Pitfall and Remedy in Web Services. IEEE Trans. Dependable Secur. Comput. 19(4): 2635-2647 (2022) - [c59]Adam Bowers, Jize Du, Dan Lin, Wei Jiang:
Easy-to-Implement Two-Server based Anonymous Communication with Simulation Security. AsiaCCS 2022: 831-842 - [c58]Jian Kang, Alian Yu, Wei Jiang, Dan Lin:
NWADE: A Neighborhood Watch Mechanism for Attack Detection and Evacuation in Autonomous Intersection Management. ICDCS 2022: 1190-1200 - [c57]Ian Miller, Dan Lin:
Developing Self-evolving Deepfake Detectors Against AI Attacks. TPS-ISA 2022: 47-54 - [i10]Chaoquan Cai, Dan Lin:
Find Another Me Across the World - Large-scale Semantic Trajectory Analysis Using Spark. CoRR abs/2204.00878 (2022) - [i9]Ke Li, Cameron Baird, Dan Lin:
Defend Data Poisoning Attacks on Voice Authentication. CoRR abs/2209.04547 (2022) - 2021
- [j38]Adam Bowers, Cong Liao, Douglas Steiert, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson:
Detecting Suspicious File Migration or Replication in the Cloud. IEEE Trans. Dependable Secur. Comput. 18(1): 296-309 (2021) - [i8]Joshua Morris, Sara Newman, Kannappan Palaniappan, Jianping Fan, Dan Lin:
"Do You Know You Are Tracked by Photos That You Didn't Take": Location-Aware Multi-Party Image Privacy Protection. CoRR abs/2103.10851 (2021) - [i7]Joshua Morris, Dan Lin, Marcellus Smith:
Fight Virus Like a Virus: A New Defense Method Against File-Encrypting Ransomware. CoRR abs/2103.11014 (2021) - 2020
- [j37]Douglas McGeehan, Sanjay Madria, Dan Lin:
Effective social-context based message delivery using ChitChat in sparse delay tolerant networks. Distributed Parallel Databases 38(2): 401-438 (2020) - [j36]Tao Jiang, Bin Zhang, Dan Lin, Yunjun Gao, Qing Li:
Efficient column-oriented processing for mutual subspace skyline queries. Soft Comput. 24(20): 15427-15445 (2020) - [j35]Katrina Ward, Dan Lin, Sanjay Madria:
A Parallel Algorithm For Anonymizing Large-scale Trajectory Data. Trans. Data Sci. 1(1): 5:1-5:26 (2020) - [j34]Dan Lin, Douglas Steiert, Joshua Morris, Anna Cinzia Squicciarini, Jianping Fan:
REMIND: Risk Estimation Mechanism for Images in Network Distribution. IEEE Trans. Inf. Forensics Secur. 15: 539-552 (2020) - [j33]Jian Kang, Douglas Steiert, Dan Lin, Yanjie Fu:
MoveWithMe: Location Privacy Preservation for Smartphone Users. IEEE Trans. Inf. Forensics Secur. 15: 711-724 (2020) - [c56]Jian Kang, Dan Lin:
DASH: A Universal Intersection Traffic Management System for Autonomous Vehicles. ICDCS 2020: 89-99 - [c55]Nitish M. Uplavikar, Jaideep Vaidya, Dan Lin, Wei Jiang:
Privacy-Preserving Friend Recommendation in an Integrated Social Environment. ICISS 2020: 117-136
2010 – 2019
- 2019
- [j32]Dan Lin, Anna Cinzia Squicciarini, Venkata Nagarjuna Dondapati, Smitha Sundareswaran:
A Cloud Brokerage Architecture for Efficient Cloud Service Selection. IEEE Trans. Serv. Comput. 12(1): 144-157 (2019) - [c54]Ali R. Hurson, Hiroyuki Sato, Toyokazu Akiyama, Dan Lin:
Message from EATA Symposium Chairs. COMPSAC (1) 2019: 299 - [c53]Jian Kang, Dan Lin, Elisa Bertino, Ozan K. Tonguz:
From Autonomous Vehicles to Vehicular Clouds: Challenges of Management, Security and Dependability. ICDCS 2019: 1730-1741 - [c52]Joshua Morris, Dan Lin, Anna Cinzia Squicciarini:
FriendGuard: A Friend Search Engine with Guaranteed Friend Exposure Degree. SACMAT 2019: 37-48 - [i6]Wei Jiang, Adam Bowers, Dan Lin:
Hiding in the Clouds and Building a Stealth Communication Network. CoRR abs/1901.10097 (2019) - [i5]Wei Jiang, Adam Bowers, Dan Lin:
Simple and Efficient Approach for Achieving End-to-End Anonymous Communication. IACR Cryptol. ePrint Arch. 2019: 790 (2019) - 2018
- [j31]Dan Lin, Nicholas Hilbert, Christian Storer, Wei Jiang, Jianping Fan:
UFace: Your universal password that no one can see. Comput. Secur. 77: 627-641 (2018) - [j30]Jian Kang, Dan Lin, Wei Jiang, Elisa Bertino:
Highly efficient randomized authentication in VANETs. Pervasive Mob. Comput. 44: 31-44 (2018) - [j29]Jun Yu, Zhenzhong Kuang, Baopeng Zhang, Wei Zhang, Dan Lin, Jianping Fan:
Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing. IEEE Trans. Inf. Forensics Secur. 13(5): 1317-1332 (2018) - [j28]Pengyang Wang, Yanjie Fu, Jiawei Zhang, Xiaolin Li, Dan Lin:
Learning Urban Community Structures: A Collective Embedding Perspective with Periodic Spatial-temporal Mobility Graphs. ACM Trans. Intell. Syst. Technol. 9(6): 63:1-63:28 (2018) - [c51]Dakshak Keerthi Chandra, Weerdhawal Chowgule, Yanjie Fu, Dan Lin:
RIPA: Real-Time Image Privacy Alert System. CIC 2018: 136-145 - [e1]Elisa Bertino, Dan Lin, Jorge Lobo:
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, SACMAT 2018, Indianapolis, IN, USA, June 13-15, 2018. ACM 2018 [contents] - 2017
- [j27]Jingwei Li, Adam Bowers, Dan Lin, Peng Jiang, Wei Jiang:
PAS: policy-based assistance in sensor networks. Computing 99(10): 915-928 (2017) - [j26]Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Jin Li, Chunfu Jia:
Towards Privacy-Preserving Storage and Retrieval in Multiple Clouds. IEEE Trans. Cloud Comput. 5(3): 499-509 (2017) - [j25]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-Tree: Authenticated Index for Verifiable Cloud Service Selection. IEEE Trans. Dependable Secur. Comput. 14(2): 185-198 (2017) - [j24]Jun Yu, Baopeng Zhang, Zhengzhong Kuang, Dan Lin, Jianping Fan:
iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning. IEEE Trans. Inf. Forensics Secur. 12(5): 1005-1016 (2017) - [j23]Dan Lin, Jian Kang, Anna Cinzia Squicciarini, Yingjie Wu, Sashi Gurung, Ozan K. Tonguz:
MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs. IEEE Trans. Mob. Comput. 16(5): 1357-1370 (2017) - [c50]Zhenzhong Kuang, Zongmin Li, Dan Lin, Jianping Fan:
Automatic Privacy Prediction to Accelerate Social Image Sharing. BigMM 2017: 197-200 - [c49]Adam Bowers, Dan Lin, Anna Cinzia Squicciarini, Ali R. Hurson:
Real-Time Detection of Illegal File Transfers in the Cloud. ICDCS 2017: 2597-2600 - [c48]Jun Yu, Zhenzhong Kuang, Zhou Yu, Dan Lin, Jianping Fan:
Privacy Setting Recommendation for Image Sharing. ICMLA 2017: 726-730 - [c47]Wei Jiang, Feng Li, Dan Lin, Elisa Bertino:
No one can track you: Randomized authentication in Vehicular Ad-hoc Networks. PerCom 2017: 197-206 - [c46]Anna Cinzia Squicciarini, Andrea Novelli, Dan Lin, Cornelia Caragea, Haoti Zhong:
From Tag to Protect: A Tag-Driven Policy Recommender System for Image Sharing. PST 2017: 337-348 - [c45]Douglas Steiert, Dan Lin, Quincy Conduff, Wei Jiang:
Poster: A Location-Privacy Approach for Continuous Queries. SACMAT 2017: 115-117 - [c44]Jian Kang, Yousef Elmehdwi, Dan Lin:
SLIM: Secure and Lightweight Identity Management in VANETs with Minimum Infrastructure Reliance. SecureComm 2017: 823-837 - [c43]Katrina Ward, Dan Lin, Sanjay Madria:
MELT: Mapreduce-based Efficient Large-scale Trajectory Anonymization. SSDBM 2017: 35:1-35:6 - [r4]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Indexing of Moving Objects, Bx-Tree. Encyclopedia of GIS 2017: 940-947 - [r3]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Maximum Update Interval in Moving Objects Databases. Encyclopedia of GIS 2017: 1205 - [i4]Nicholas Hilbert, Christian S. Jensen, Dan Lin, Wei Jiang:
UFace: Your Universal Password That No One Can See. IACR Cryptol. ePrint Arch. 2017: 169 (2017) - 2016
- [j22]Lasanthi Heendaliya, Michael Wisely, Dan Lin, Sahra Sedigh Sarvestani, Ali R. Hurson:
Indexing and Querying Techniques for Moving Objects in Both Euclidean Space and Road Network. Adv. Comput. 102: 111-170 (2016) - [c42]Cong Liao, Anna Cinzia Squicciarini, Dan Lin:
LAST-HDFS: Location-Aware Storage Technique for Hadoop Distributed File System. CLOUD 2016: 662-669 - [c41]Douglas McGeehan, Dan Lin, Sanjay Madria:
ChitChat: An Effective Message Delivery Method in Sparse Pocket-Switched Networks. ICDCS 2016: 457-466 - 2015
- [j21]Tao Jiang, Bin Zhang, Dan Lin, Yunjun Gao, Qing Li:
Incremental evaluation of top-k combinatorial metric skyline query. Knowl. Based Syst. 74: 89-105 (2015) - [j20]Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin:
Privacy-aware access control for message exchange in vehicular ad hoc networks. Telecommun. Syst. 58(4): 349-361 (2015) - [j19]Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Joshua Wede:
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites. IEEE Trans. Knowl. Data Eng. 27(1): 193-206 (2015) - [j18]Lasanthi Heendaliya, Dan Lin, Ali R. Hurson:
Continuous Predictive Line Queries for On-the-Go Traffic Estimation. Trans. Large Scale Data Knowl. Centered Syst. 18: 80-114 (2015) - [c40]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Shuang Liang, Chunfu Jia:
SecLoc: Securing Location-Sensitive Storage in the Cloud. SACMAT 2015: 51-61 - [c39]Lasanthi Heendaliya, Michael Wisely, Dan Lin, Sahra Sedigh Sarvestani, Ali R. Hurson:
Influence-Aware Predictive Density Queries Under Road-Network Constraints. SSTD 2015: 80-97 - [i3]Jingwei Li, Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Chunfu Jia:
MMBcloud-tree: Authenticated Index for Verifiable Cloud Service Selection. IACR Cryptol. ePrint Arch. 2015: 379 (2015) - 2014
- [j17]Anna Cinzia Squicciarini, Sushama Karumanchi, Dan Lin, Nicole DeSisto:
Identifying hidden social circles for advanced privacy configuration. Comput. Secur. 41: 40-51 (2014) - [j16]Tao Jiang, Yunjun Gao, Bin Zhang, Dan Lin, Qing Li:
Monochromatic and bichromatic mutual skyline queries. Expert Syst. Appl. 41(4): 1885-1900 (2014) - [j15]Sashi Gurung, Dan Lin, Wei Jiang, Ali R. Hurson, Rui Zhang:
Traffic Information Publication with Privacy Preservation. ACM Trans. Intell. Syst. Technol. 5(3): 44:1-44:26 (2014) - [c38]Jingwei Li, Dan Lin, Anna Cinzia Squicciarini, Chunfu Jia:
STRE: Privacy-Preserving Storage and Retrieval over Multiple Clouds. SecureComm (1) 2014: 36-44 - [c37]Anna Cinzia Squicciarini, Dan Lin, Smitha Sundareswaran, Jingwei Li:
Policy Driven Node Selection in MapReduce. SecureComm (1) 2014: 55-72 - [i2]Wei Jiang, Dan Lin, Feng Li, Elisa Bertino:
Randomized and Efficient Authentication in Mobile Environments. IACR Cryptol. ePrint Arch. 2014: 86 (2014) - 2013
- [j14]Dan Lin, Prathima Rao, Rodolfo Ferrini, Elisa Bertino, Jorge Lobo:
A Similarity Measure for Comparing XACML Policies. IEEE Trans. Knowl. Data Eng. 25(9): 1946-1959 (2013) - [c36]Lasanthi Heendaliya, Dan Lin, Ali R. Hurson:
Continuous Predictive Line Queries under Road-Network Constraints. DEXA (2) 2013: 228-242 - [c35]Sashi Gurung, Dan Lin, Anna Cinzia Squicciarini, Elisa Bertino:
Information-Oriented Trustworthiness Evaluation in Vehicular Ad-hoc Networks. NSS 2013: 94-108 - 2012
- [j13]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin:
Ensuring Distributed Accountability for Data Sharing in the Cloud. IEEE Trans. Dependable Secur. Comput. 9(4): 556-568 (2012) - [j12]Lasanthi Heendaliya, Dan Lin, Ali R. Hurson:
Predictive Line Queries for Traffic Prediction. Trans. Large Scale Data Knowl. Centered Syst. 6: 106-133 (2012) - [j11]Rui Zhang, Jianzhong Qi, Dan Lin, Wei Wang, Raymond Chi-Wing Wong:
A highly optimized algorithm for continuous intersection join queries over moving objects. VLDB J. 21(4): 561-586 (2012) - [c34]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin:
A Brokerage-Based Approach for Cloud Service Selection. IEEE CLOUD 2012: 558-565 - [c33]Sashi Gurung, Anna Cinzia Squicciarini, Dan Lin, Ozan K. Tonguz:
A moving zone based architecture for message dissemination in VANETs. CNSM 2012: 184-188 - [c32]Anna Cinzia Squicciarini, Dan Lin, Sushama Karumanchi, Nicole DeSisto:
Automatic social group organization and privacy management. CollaborateCom 2012: 89-96 - [c31]Jianzhong Qi, Rui Zhang, Lars Kulik, Dan Lin, Yuan Xue:
The Min-dist Location Selection Query. ICDE 2012: 366-377 - [c30]Arej Muhammed, Dan Lin, Anna Cinzia Squicciarini:
Location Privacy Policy Management System. ICICS 2012: 427-434 - [c29]Sushama Karumanchi, Anna Cinzia Squicciarini, Dan Lin:
Selective and Confidential Message Exchange in Vehicular Ad Hoc Networks. NSS 2012: 445-461 - 2011
- [j10]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
Fine-grained integration of access control policies. Comput. Secur. 30(2-3): 91-107 (2011) - [j9]Dan Lin, Christian S. Jensen, Rui Zhang, Lu Xiao, Jiaheng Lu:
A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy. Proc. VLDB Endow. 5(1): 37-48 (2011) - [j8]Alex Hindle, Jie Shao, Dan Lin, Jiaheng Lu, Rui Zhang:
Clustering Web video search results based on integration of multiple features. World Wide Web 14(1): 53-73 (2011) - [c28]Smitha Sundareswaran, Anna Cinzia Squicciarini, Dan Lin, Shuo Huang:
Promoting Distributed Accountability in the Cloud. IEEE CLOUD 2011: 113-120 - [c27]Anna Cinzia Squicciarini, Dan Lin, Alessandro Mancarella:
PAIM: Peer-Based Automobile Identity Management in Vehicular Ad-Hoc Network. COMPSAC 2011: 263-272 - [c26]Lasanthi Heendaliya, Dan Lin, Ali R. Hurson:
Optimizing Predictive Queries on Moving Objects under Road-Network Constraints. DEXA (1) 2011: 247-261 - [c25]Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin, Joshua Wede:
A3P: adaptive policy prediction for shared images over popular content sharing sites. HT 2011: 261-270 - [i1]Dan Lin, Christian S. Jensen, Rui Zhang, Lu Xiao, Jiaheng Lu:
A MovingObject Index for Efficient Query Processing with Peer-Wise Location Privacy. CoRR abs/1109.6883 (2011) - 2010
- [j7]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: a comprehensive environment for the analysis of access control policies. Int. J. Inf. Sec. 9(4): 253-273 (2010) - [c24]Anna Cinzia Squicciarini, Smitha Sundareswaran, Dan Lin:
Preventing Information Leakage from Indexing in the Cloud. IEEE CLOUD 2010: 188-195 - [c23]Dan Lin, Sashi Gurung, Wei Jiang, Ali R. Hurson:
Privacy-Preserving Location Publishing under Road-Network Constraints. DASFAA (2) 2010: 17-31 - [c22]Dan Lin, Anna Cinzia Squicciarini:
Data protection models for service provisioning in the cloud. SACMAT 2010: 183-192
2000 – 2009
- 2009
- [j6]Elisa Bertino, Carolyn Brodie, Seraphin B. Calo, Lorrie Faith Cranor, Clare-Marie Karat, John Karat, Ninghui Li, Dan Lin, Jorge Lobo, Qun Ni, Prathima Rao, Xiping Wang:
Analysis of privacy and security policies. IBM J. Res. Dev. 53(2): 3 (2009) - [j5]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar:
Location Privacy in Moving-Object Environments. Trans. Data Priv. 2(1): 21-46 (2009) - [c21]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
An algebra for fine-grained integration of XACML policies. SACMAT 2009: 63-72 - [c20]Ninghui Li, Qihua Wang, Wahbeh H. Qardaji, Elisa Bertino, Prathima Rao, Jorge Lobo, Dan Lin:
Access control policy combining: theory meets practice. SACMAT 2009: 135-144 - [c19]Chenyun Dai, Dan Lin, Murat Kantarcioglu, Elisa Bertino, Ebru Celikel, Bhavani Thuraisingham:
Query Processing Techniques for Compliance with Data Confidence Policies. Secure Data Management 2009: 49-67 - 2008
- [j4]Su Chen, Christian S. Jensen, Dan Lin:
A benchmark for evaluating moving object indexes. Proc. VLDB Endow. 1(2): 1574-1585 (2008) - [c18]Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, Dan Lin:
High-Assurance Integrity Techniques for Databases. BNCOD 2008: 244-256 - [c17]Dan Lin, Elisa Bertino, Reynold Cheng, Sunil Prabhakar:
Position transformation: a location privacy protection method for moving objects. SPRINGL 2008: 62-71 - [c16]Rui Zhang, Dan Lin, Kotagiri Ramamohanarao, Elisa Bertino:
Continuous Intersection Joins Over Moving Objects. ICDE 2008: 863-872 - [c15]Lorenzo Martino, Qun Ni, Dan Lin, Elisa Bertino:
Multi-domain and privacy-aware role based access control in eHealth. PervasiveHealth 2008: 131-134 - [c14]Prathima Rao, Dan Lin, Elisa Bertino, Ninghui Li, Jorge Lobo:
EXAM: An Environment for Access Control Policy Analysis and Management. POLICY 2008: 238-240 - [c13]Dan Lin, Prathima Rao, Elisa Bertino, Ninghui Li, Jorge Lobo:
Policy decomposition for collaborative access control. SACMAT 2008: 103-112 - [c12]Chenyun Dai, Dan Lin, Elisa Bertino, Murat Kantarcioglu:
An Approach to Evaluate Data Trustworthiness Based on Data Provenance. Secure Data Management 2008: 82-98 - [p1]Elisa Bertino, Dan Lin, Wei Jiang:
A Survey of Quantification of Privacy Preserving Data Mining Algorithms. Privacy-Preserving Data Mining 2008: 183-205 - [r2]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Indexing of Moving Objects, Bx-Tree. Encyclopedia of GIS 2008: 512-518 - [r1]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Maximum Update Interval in Moving Objects Databases. Encyclopedia of GIS 2008: 651 - 2007
- [j3]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Continuous Clustering of Moving Objects. IEEE Trans. Knowl. Data Eng. 19(9): 1161-1174 (2007) - [c11]Dan Lin, Bin Cui, Dongqing Yang:
Optimizing Moving Queries over Moving Object Data Streams. DASFAA 2007: 563-575 - [c10]Dan Lin, Hicham G. Elmongui, Elisa Bertino, Beng Chin Ooi:
Data Management in RFID Applications. DEXA 2007: 434-444 - [c9]Qun Ni, Dan Lin, Elisa Bertino, Jorge Lobo:
Conditional Privacy-Aware Role Based Access Control. ESORICS 2007: 72-89 - [c8]Beng Chin Ooi, Zhiyong Huang, Dan Lin, Hua Lu, Linhao Xu:
Adapting Relational Database Engine to Accommodate Moving Objects in SpADE. ICDE 2007: 1505-1506 - [c7]Prathima Rao, Dan Lin, Elisa Bertino:
XACML Function Annotations. POLICY 2007: 178-182 - [c6]Dan Lin, Prathima Rao, Elisa Bertino, Jorge Lobo:
An approach to evaluate policy similarity. SACMAT 2007: 1-10 - 2006
- [j2]Bin Cui, Dan Lin, Kian-Lee Tan:
IMPACT: A twin-index framework for efficient moving object query processing. Data Knowl. Eng. 59(1): 63-85 (2006) - [j1]Dan Lin, Rui Zhang, Aoying Zhou:
Indexing Fast Moving Objects for kNN Queries Based on Nearest Landmarks. GeoInformatica 10(4): 423-445 (2006) - [c5]Christian S. Jensen, Dan Lin, Beng Chin Ooi, Rui Zhang:
Effective Density Queries on ContinuouslyMoving Objects. ICDE 2006: 71 - 2005
- [c4]Bin Cui, Dan Lin, Kian-Lee Tan:
Towards Optimal Utilization of Main Memory for Moving Object Indexing. DASFAA 2005: 600-611 - [c3]Dan Lin, Christian S. Jensen, Beng Chin Ooi, Simonas Saltenis:
Efficient indexing of the historical, present, and future positions of moving objects. Mobile Data Management 2005: 59-66 - 2004
- [c2]Bo Huang, Zhiyong Huang, Dan Lin, Hua Lu, Yaxiao Song, Hongga Li:
ITQS: An Integrated Transport Query System. SIGMOD Conference 2004: 951-952 - [c1]Christian S. Jensen, Dan Lin, Beng Chin Ooi:
Query and Update Efficient B+-Tree Based Indexing of Moving Objects. VLDB 2004: 768-779
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:26 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint