Dr Tianqing Zhu

STAFF PROFILE

Position

Teaching Scholar

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

t.zhu@deakin.edu.au
+61 3 924 43074

Publications

Filter by

2017

Evolutionary virus immune strategy for temporal networks based on community vitality

M Li, C Fu, X Liu, J Yang, T Zhu, L Han

(2017), Vol. 74, pp. 276-290, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Invisible hand: a privacy preserving mobile crowd sensing framework based on economic models

B Liu, W Zhou, T Zhu, H Zhou, X Lin

(2017), Vol. 66, pp. 4410-4423, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal

A cyber-threat analytic model for autonomous detection of virtual property theft

N Patterson, T Zhu, M Hobbs

(2017), Vol. 25, pp. 358-381, Information and computer security, Bingley, Eng., C1

journal

Discovering Learning Patterns of Male and Female Students by Contrast Targeted Rule Mining

X Tian, J Kong, T Zhu, H Xia

(2017), pp. 196-202, Proceedings - 4th International Conference on Enterprise Systems: Advances in Enterprise Systems, ES 2016, E1

conference

Answering differentially private queries for continual datasets release

T Zhu, G Li, P Xiong, W Zhou

(2017), pp. 1-12, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Differentially private data publishing and analysis: a survey

T Zhu, G Li, W Zhou, P Yu

(2017), Vol. 29, pp. 1619-1638, IEEE Transactions on Knowledge and Data Engineering, Piscataway, N.J., C1

journal

Reward-based spatial crowdsourcing with differential privacy preservation

P Xiong, L Zhang, T Zhu

(2017), Vol. 11, pp. 1500-1517, Enterprise Information Systems, Abingdon, Eng., C1

journal
2016

Privacy-preserving topic model for tagging recommender systems

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2016), Vol. 46, pp. 33-58, Knowledge and information systems, London, Eng., C1

journal

Semantic analysis in location privacy preserving

P Xiong, L Zhang, T Zhu

(2016), Vol. 28, pp. 1884-1899, Concurrency and computation, London, Eng., C1

journal

A differentially private algorithm for location data release

P Xiong, T Zhu, W Niu, G Li

(2016), Vol. 47, pp. 647-669, Knowledge and information systems, Berlin, Germany, C1

journal

Taming transitive permission attack via bytecode rewriting on Android application

D Wang, H Jin, D Zou, P Xu, T Zhu, G Chen

(2016), Vol. 9, pp. 2100-2114, Security and communication networks, Hoboken, N.J., C1

journal

Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks

B Liu, W Zhou, T Zhu, L Gao, H Luan, H Zhou

(2016), Vol. 65, pp. 9942-9953, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal
2015

Correlated differential privacy: hiding information in non-IID data set

T Zhu, P Xiong, G Li, W Zhou

(2015), Vol. 10, pp. 229-242, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Privacy preserving data release for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2015), Vol. 13, pp. 229-246, Web intelligence, Amsterdam, The Netherlands, C1

journal

A differentially private method for reward-based spatial crowdsourcing

L Zhang, X Lu, P Xiong, T Zhu

(2015), Vol. 557, pp. 153-164, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

chapter
2014

Android malware detection with contrasting permission patterns

P Xiong, X Wang, W Niu, T Zhu, G Li

(2014), Vol. 11, pp. 1-14, China communications, Piscataway, N.J., C1

journal

A survey on differential privacy and applications

P Xiong, T-Q Zhu, X-F Wang

(2014), Vol. 37, pp. 101-122, Jisuanji Xuebao/Chinese Journal of Computers, Beijing, China, C1

journal

Deferentially private tagging recommendation based on topic model

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2014), Vol. 8443 Part 1, pp. 557-568, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

An effective privacy preserving algorithm for neighborhood-based collaborative filtering

T Zhu, Y Ren, W Zhou, J Rong, P Xiong

(2014), Vol. 36, pp. 142-155, Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal

Location privacy preserving for semantic-aware applications

L Zhang, P Xiong, T Zhu

(2014), Vol. 490, pp. 135-146, Communications in Computer and Information Science, Switzerland, B1

chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal
2013

Differential privacy for neighborhood-based collaborative filtering

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 752-759, ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, E1

conference

Top-N recommendations by learning user preference dynamics

Y Ren, T Zhu, G Li, W Zhou

(2013), pp. 390-401, PAKDD 2013 : Advances in knowledge discovery and data mining : 17th Pacific-Asia Conference, Gold Coast, Australia, April 14-17, 2013 : proceedings, Gold Coast, Queensland, E1

conference

An effective deferentially private data releasing algorithm for decision tree

T Zhu, P Xiong, Y Xiang, W Zhou

(2013), pp. 388-395, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Privacy preserving for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 81-88, WI-IAT 2013 : Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Atlanta, Georgia, E1

conference

Dynamic user behavior-based piracy propagation monitoring in wireless peer-to-peer networks

B Qu, W Niu, T Zhu, L Wu, S Liu, N Wang

(2013), pp. 44-55, Behavior and social computing, Cham, Switzerland, B1

chapter
2012

AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs

L Gao, M Li, T Zhu, A Bonti, W Zhou, S Yu

(2012), pp. 1245-1250, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Funded Projects at Deakin

Industry and Other Funding

Developing a Secure and Privacy-Preserving App for the Cloud Campus System

Prof Wanlei Zhou, Dr Tianqing Zhu, Dr Bo Liu

  • 2016: $50,000

Supervisions

No completed student supervisions to report