Dr Tianqing Zhu

STAFF PROFILE

Contact

Publications

Filter by

2018

Answering differentially private queries for continual datasets release

T Zhu, G Li, P Xiong, W Zhou

(2018), Vol. 87, pp. 816-827, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Density-based location preservation for mobile crowdsensing with differential privacy

M Yang, T Zhu, Y Xiang, W Zhou

(2018), Vol. 6, pp. 14779-14789, IEEE Access, Piscataway, N.J., C1

journal

Machine learning differential privacy with multifunctional aggregation in a fog computing architecture

M Yang, T Zhu, B Liu, Y Xiang, W Zhou

(2018), Vol. 6, pp. 17119-17129, IEEE Access, Piscataway, N.J., C1

journal

Location privacy and its applications: a systematic study

B Liu, W Zhou, T Zhu, L Gao, Y Xiang

(2018), Vol. 6, pp. 17606-17624, IEEE access, Piscataway, N.J., C1

journal

RIMS: a real-time and intelligent monitoring system for live-broadcasting platforms

Y Li, W Ren, T Zhu, Y Ren, Y Qin, W Jie

(2018), Vol. 87, pp. 259-266, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Differential private POI queries via Johnson-Lindenstrauss transform

M Yang, T Zhu, B Liu, Y Xiang, W Zhou

(2018), Vol. 6, pp. 29685-29699, IEEE access, Piscataway, N.J., C1

journal
2017

Evolutionary virus immune strategy for temporal networks based on community vitality

M Li, C Fu, X Liu, J Yang, T Zhu, L Han

(2017), Vol. 74, pp. 276-290, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

Invisible hand: a privacy preserving mobile crowd sensing framework based on economic models

B Liu, W Zhou, T Zhu, H Zhou, X Lin

(2017), Vol. 66, pp. 4410-4423, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal

A cyber-threat analytic model for autonomous detection of virtual property theft

N Patterson, T Zhu, M Hobbs

(2017), Vol. 25, pp. 358-381, Information and computer security, Bingley, Eng., C1

journal

Discovering learning patterns of male and female students by contrast targeted rule mining

X Tian, J Kong, T Zhu, H Xia

(2017), pp. 196-202, ES 2016 : Proceedings of the 4th International Conference on Enterprise Systems, Melbourne, Victoria, E1

conference

Personalized privacy preserving collaborative filtering

M Yang, T Zhu, Y Xiang, W Zhou

(2017), Vol. 10232, pp. 371-385, GPC 2017 : Proceedings of the 12th Green, Pervasive, and Cloud Computing International Conference, Cetara, Italy, E1

conference

Differentially private data publishing and analysis: a survey

T Zhu, G Li, W Zhou, P Yu

(2017), Vol. 29, pp. 1619-1638, IEEE Transactions on Knowledge and Data Engineering, Piscataway, N.J., C1

journal

Reward-based spatial crowdsourcing with differential privacy preservation

P Xiong, L Zhang, T Zhu

(2017), Vol. 11, pp. 1500-1517, Enterprise Information Systems, Abingdon, Eng., C1

journal

Differentially private query learning: from data publishing to model publishing

T Zhu, P Xiong, G Li, W Zhou, P Yu

(2017), pp. 1117-1122, Big Data 2017 : Proceedings of the 2017 IEEE Interantional Conference on Big Data, Boston, Mass., E1

conference

Privacy preserving collaborative filtering via the Johnson-Lindenstrauss transform

M Yang, T Zhu, L Ma, Y Xiang, W Zhou

(2017), pp. 417-424, TrustCom / BigDataSE / ICESS 2017 : proceedings of the TrustCom / BigDataSE / ICESS 2017 international conference, Sydney, Australia, E1

conference

CloudController: a writable and heterogeneous-adaptive virtual machine introspection for cloud management

W Qiang, G Xu, G Sun, T Zhu, H Jin

(2017), pp. 177-184, Trustcom/BigDataSE/ICESS 2017 : Proceedings 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems, Sydney, N.S.W., E1

conference

Differential privacy and applications

T Zhu, G Li, W Zhou, P Yu

(2017), Cham, Switzerland, A1

book
2016

Privacy-preserving topic model for tagging recommender systems

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2016), Vol. 46, pp. 33-58, Knowledge and information systems, London, Eng., C1

journal

Semantic analysis in location privacy preserving

P Xiong, L Zhang, T Zhu

(2016), Vol. 28, pp. 1884-1899, Concurrency and computation, London, Eng., C1

journal

A differentially private algorithm for location data release

P Xiong, T Zhu, W Niu, G Li

(2016), Vol. 47, pp. 647-669, Knowledge and information systems, Berlin, Germany, C1

journal

Taming transitive permission attack via bytecode rewriting on Android application

D Wang, H Jin, D Zou, P Xu, T Zhu, G Chen

(2016), Vol. 9, pp. 2100-2114, Security and communication networks, Hoboken, N.J., C1

journal

Silence is golden: enhancing privacy of location-based services by content broadcasting and active caching in wireless vehicular networks

B Liu, W Zhou, T Zhu, L Gao, H Luan, H Zhou

(2016), Vol. 65, pp. 9942-9953, IEEE transactions on vehicular technology, Piscataway, N.J., C1

journal
2015

Correlated differential privacy: hiding information in non-IID data set

T Zhu, P Xiong, G Li, W Zhou

(2015), Vol. 10, pp. 229-242, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Privacy preserving data release for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2015), Vol. 13, pp. 229-246, Web intelligence, Amsterdam, The Netherlands, C1

journal

A differentially private method for reward-based spatial crowdsourcing

L Zhang, X Lu, P Xiong, T Zhu

(2015), Vol. 557, pp. 153-164, Applications and techniques in information security : 6th international conference, ATIS 2015, Beijing, China, November 4-6, 2015 proceedings, Berlin, Germany, B1

chapter
2014

Android malware detection with contrasting permission patterns

P Xiong, X Wang, W Niu, T Zhu, G Li

(2014), Vol. 11, pp. 1-14, China communications, Piscataway, N.J., C1

journal

A survey on differential privacy and applications

P Xiong, T-Q Zhu, X-F Wang

(2014), Vol. 37, pp. 101-122, Jisuanji Xuebao/Chinese Journal of Computers, Beijing, China, C1

journal

Deferentially private tagging recommendation based on topic model

T Zhu, G Li, W Zhou, P Xiong, C Yuan

(2014), Vol. 8443 Part 1, pp. 557-568, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Heidelberg, Germany, B1

chapter

An effective privacy preserving algorithm for neighborhood-based collaborative filtering

T Zhu, Y Ren, W Zhou, J Rong, P Xiong

(2014), Vol. 36, pp. 142-155, Future Generation Computer Systems, Amsterdam, The Netherlands, C1

journal

Location privacy preserving for semantic-aware applications

L Zhang, P Xiong, T Zhu

(2014), Vol. 490, pp. 135-146, Communications in Computer and Information Science, Switzerland, B1

chapter

Privacy preserving in location data release: A differential privacy approach

P Xiong, T Zhu, L Pan, W Niu, G Li

(2014), Vol. 8862, pp. 183-195, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Berlin, Germany, B1

chapter

Privacy preserving collaborative filtering for KNN attack resisting

T Zhu, G Li, L Pan, Y Ren, W Zhou

(2014), Vol. 4, pp. 1-14, Social network analysis and mining, Berlin, Germany, C1-1

journal
2013

Differential privacy for neighborhood-based collaborative filtering

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 752-759, ASONAM 2013 : Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, Niagara, Ontario, E1

conference

Top-N recommendations by learning user preference dynamics

Y Ren, T Zhu, G Li, W Zhou

(2013), pp. 390-401, PAKDD 2013 : Advances in knowledge discovery and data mining : 17th Pacific-Asia Conference, Gold Coast, Australia, April 14-17, 2013 : proceedings, Gold Coast, Queensland, E1

conference

An effective deferentially private data releasing algorithm for decision tree

T Zhu, P Xiong, Y Xiang, W Zhou

(2013), pp. 388-395, TrustCom 2013 : Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Melbourne, Victoria, E1

conference

Privacy preserving for tagging recommender systems

T Zhu, G Li, Y Ren, W Zhou, P Xiong

(2013), pp. 81-88, WI-IAT 2013 : Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence, Atlanta, Georgia, E1

conference

Dynamic user behavior-based piracy propagation monitoring in wireless peer-to-peer networks

B Qu, W Niu, T Zhu, L Wu, S Liu, N Wang

(2013), pp. 44-55, Behavior and social computing, Cham, Switzerland, B1

chapter
2012

AMDD : Exploring entropy based anonymous multi-dimensional data detection for network optimization in human associated DTNs

L Gao, M Li, T Zhu, A Bonti, W Zhou, S Yu

(2012), pp. 1245-1250, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference

Funded Projects at Deakin

Industry and Other Funding

Developing a Secure and Privacy-Preserving App for the Cloud Campus System

Prof Wanlei Zhou, Dr Tianqing Zhu, Dr Bo Liu

  • 2016: $50,000

Supervisions

No completed student supervisions to report