2009 | ||
---|---|---|
33 | Ping Sun, Kun Liu: Missile Autopilot Design Based on State Dependent Riccati Equation. CAR 2009: 134-138 | |
32 | E. Michael Maximilien, Tyrone Grandison, Kun Liu, Tony Sun, Dwayne Richardson, Sherry Guo: Enabling Privacy as a Fundamental Construct for Social Networks. CSE (4) 2009: 1015-1020 | |
31 | Kun Liu, Evimaria Terzi: A Framework for Computing the Privacy Scores of Users in Online Social Networks. ICDM 2009: 288-297 | |
30 | Theodoros Lappas, Kun Liu, Evimaria Terzi: Finding a team of experts in social networks. KDD 2009: 467-476 | |
29 | Kun Liu, Evimaria Terzi, Tyrone Grandison: Highlighting Diverse Concepts in Documents. SDM 2009: 545-556 | |
28 | Zhu-Wu Wu, Xue-Feng Song, Ying-Ying Xu, Kun Liu: A note on a minimax rule for portfolio selection and equilibrium price system. Applied Mathematics and Computation 208(1): 49-57 (2009) | |
27 | Chris Giannella, Kun Liu, Hillol Kargupta: On the Privacy of Euclidean Distance Preserving Data Perturbation CoRR abs/0911.2942: (2009) | |
2008 | ||
26 | Junqi Zhang, Kun Liu, Ying Tan, Xingui He: Allocation of local and global search capabilities of particle in canonical PSO. GECCO 2008: 165-166 | |
25 | Junqi Zhang, Kun Liu, Ying Tan, Xingui He: Magnifier particle swarm optimization for numerical optimization. GECCO 2008: 167-168 | |
24 | Kun Liu, Evimaria Terzi: Towards identity anonymization on graphs. SIGMOD Conference 2008: 93-106 | |
23 | Kamalika Das, Kanishka Bhaduri, Kun Liu, Hillol Kargupta: Distributed Identification of Top-l Inner Product Elements and its Application in a Peer-to-Peer Network. IEEE Trans. Knowl. Data Eng. 20(4): 475-488 (2008) | |
22 | Kun Liu, Eleonora Ferraris, Jan Peirs, Bert Lauwers, Dominiek Reynaerts: Micro-EDM process investigation of Si. IJMR 3(1): 27-47 (2008) | |
21 | Kun Liu, Wensheng Bian: Extensive theoretical study on the low-lying electronic states of silicon monofluoride cation including spin-orbit coupling. Journal of Computational Chemistry 29(2): 256-265 (2008) | |
20 | Kun Liu, Evimaria Terzi, Tyrone Grandison: ManyAspects: a system for highlighting diverse concepts in documents. PVLDB 1(2): 1444-1447 (2008) | |
19 | Deyi Li, Kun Liu, Yan Sun, MingChang Han: Emergent computation: Virtual reality from disordered clapping to ordered clapping. Science in China Series F: Information Sciences 51(5): 449-459 (2008) | |
18 | Kun Liu, Walaa Hamouda, Amr Youssef: Performance of a MANET directional MAC protocol with angle-of-arrival estimation. Wireless Communications and Mobile Computing 8(6): 759-769 (2008) | |
2007 | ||
17 | Kun Liu, Jianping Zhang, Yonghong Yan: High Quality Voice Conversion through Phoneme-Based Linear Mapping Functions with STRAIGHT for Mandarin. FSKD (4) 2007: 410-414 | |
16 | Yanmin Song, Zhongwei Bi, Kun Liu: The PLC System of Egg Powder Treatment Based on Fuzzy Control Algorithm. FSKD (4) 2007: 530-534 | |
15 | Kun Liu, Walaa Hamouda, Amr Youssef: ESPRIT-Based Directional MAC Protocol for Mobile Ad Hoc Networks. ICC 2007: 3654-3659 | |
14 | Hillol Kargupta, Kamalika Das, Kun Liu: Multi-party, Privacy-Preserving Distributed Data Mining Using a Game Theoretic Framework. PKDD 2007: 523-531 | |
2006 | ||
13 | Kun Liu, Walaa Hamouda, Amr Youssef: Performance of Directional MAC Protocols in Ad-Hoc Networks over Fading Channels. GLOBECOM 2006 | |
12 | Jian Li, Jielan Xie, Jie Zhang, Wanyi Gu, Kun Liu: A Simple and Fast Wavelength Reservation Protocol for Dynamic Traffic in Large Scale Wavelength-routed Networks. ICN/ICONS/MCL 2006: 115 | |
11 | Kun Liu, Wei Xue, Di Wang, Jiwu Shu: Design and Implementation of a Random Data-Placement System with High Scalability, Reliability and Performance. International Conference on Computational Science (3) 2006: 695-702 | |
10 | Kun Liu, Chris Giannella, Hillol Kargupta: An Attacker's View of Distance Preserving Maps for Privacy Preserving Data Mining. PKDD 2006: 297-308 | |
9 | Deyi Li, Liping Xiao, Yanni Han, Guisheng Chen, Kun Liu: Network Thinking and Network Intelligence. WImBI 2006: 36-58 | |
8 | Kun Liu, Hillol Kargupta, Jessica Ryan: Random Projection-Based Multiplicative Data Perturbation for Privacy Preserving Distributed Data Mining. IEEE Trans. Knowl. Data Eng. 18(1): 92-106 (2006) | |
7 | Sanghamitra Bandyopadhyay, Chris Giannella, Ujjwal Maulik, Hillol Kargupta, Kun Liu, Souptik Datta: Clustering distributed data streams in peer-to-peer environments. Inf. Sci. 176(14): 1952-1985 (2006) | |
6 | Kun Liu, Kanishka Bhaduri, Kamalika Das, Phuong Nguyen, Hillol Kargupta: Client-side web mining for community formation in peer-to-peer environments. SIGKDD Explorations 8(2): 11-20 (2006) | |
2005 | ||
5 | Qiang Li, Yan Lin, Kun Liu, Jiubin Ju: Constructing Correlations in Attack Connection Chains Using Active Perturbation. AAIM 2005: 252-260 | |
4 | Qiang Li, Qinyuan Feng, Kun Liu, Jiubin Ju: Constructing Correlations of Perturbed Connections Under Packets Loss and Disorder. ICCNMC 2005: 642-651 | |
2004 | ||
3 | Chris Giannella, Kun Liu, Todd Olsen, Hillol Kargupta: Communication Efficient Construction of Decision Trees Over Heterogeneously Distributed Data. ICDM 2004: 67-74 | |
2 | Hillol Kargupta, Ruchita Bhargava, Kun Liu, Michael Powers, Patrick Blair, Samuel Bushra, James Dull, Kakali Sarkar, Martin Klein, Mitesh Vasa, David Handy: VEDAS: A Mobile and Distributed Data Stream Mining System for Real-Time Vehicle Monitoring. SDM 2004 | |
2003 | ||
1 | Hillol Kargupta, Kun Liu, Jessica Ryan: Privacy Sensitive Distributed Data Mining from Multi-party Data. ISI 2003: 336-342 |