Research

RESEARCH INTERESTS

  •  Cyber Security
  • Social Computing
  • Big Data
  • Biomedical Computing

SELECTED PUBLICATIONS

  • Doyal, A., and Zhan, J., Towards DDoS Defense and Traceback, International Journal of Privacy, Security, and Integrity, Vol. 2, No. 2, pp. 20-40, 2013.
    Zhan, J., and Fang, X., A Computational Framework for Detecting Malicious Actors in Communities, International Journal of Privacy, Security, and Integrity, Vol 3, No. 1, pp. 15-30, 2013.
    Zhan, J., and Kanampiu, Using Non-Verbal Social Signals and Degree Centrality to Optimize a Covert Actors Detection Scheme for a Healthy Networked Community, International Journal of Social Computing and Cyber-Physical System, Vol. 2, No. 1, pp. 21-35, 2013.
    (I)      Zhan, J., and Fang, X., A Novel Model for Social Ego Network Evolution, Human Journal, Vol.1, No. 4, pp. 218-233, 2013
    Zhan, J., and Fang, X., Social Computing: The State of the Art, International Journal of Social Computing and Cyber-Physical Systems, Vol. 1, No. 1, pp. 1-12, 2011.
    Zhan, J., Oommen, J., and Crisostomo, J., Anomaly Detection in Dynamic Social Computing Systems, ACM Transaction on Internet Technology, Vol. 11, No. 1, pp. 53-69, July 2011.
    Mead, N., Miyazaki S. and Zhan, J., Integrating Privacy Requirements Considerations Into A Security Requirements Engineering Method and Tool, International Journal of Information Privacy, Security and Integrity, Vol. 1, No. 1, pp.106-126, 2011..
    Zhan, J., Secure Collaborative Social Networks, IEEE Transaction on Systems, Man, and Cybernetics, Part C, Volume 40, Issue. 6, pp.682-689, November 2010.
    Zhan, J., Hsieh C., Wang, I., Hsu, T., Liau, C., and Wang D., Privacy-Preserving Collaborative Recommender Systems, IEEE Transaction on Systems, Man, and Cybernetics, Part C, Volume 40, Issue 4, pp. 472-476, July 2010.
    Park, H., Hong, J., Park, J., Zhan, J., Lee, D., Attribute-Based Access Control Using Combined Authentication Technologies, IEEE Transaction on Mobile Computing, Volume 9, No. 6, pp. 824-837, June 2010.
    Zhan, J., Privacy-Preserving Data Mining and Granular Computing, International Journal of Granular Computing, Rough Sets and Intelligent Systems, Volume 1, No. 3, pp. 272-288, 2010.
    Wang, J., Zhan, J. and Zhang, J., Data Value Hiding for Frequent Data Updates, International Journal of Granular Computing, Rough Sets and Intelligent Systems, In Press.
    Wang, I., Shen, C., Zhan, J., Hsu, T., Liau, C. and Wang, D., Empirical Evaluations of Secure Scalar Product, IEEE Transactions on Systems, Man, and Cybernetics, Part C, Vol. 39, Issue 4, pp. 440-447, 2008.
    Zhan, J., Privacy-Preserving Collaborative Data Mining, IEEE Computational Intelligence Magazine, Vol. 3, No. 2, pp. 31-41, 2008.
    Zhan, J. and Rajamani, V., The Economic Aspects of Privacy, International Journal of Security and Its Applications, Vol. 2, No.3, pp. 101-108, 2008.
    Zhang, W., Zhan, J., Wang, P. and Patt, S., On Truth, Uncertainty, and Bipolar Logic, Journal of New Mathematics and Natural Computing, Vol. 4, No 2, pp. 55-65, 2008.
    Mead, N., Viswanathan, V. and Zhan, J., Incorporating Security Requirements Engineering into Standard Lifecycle Processes, International Journal of Security and Its Applications, Vol. 2, No.4, pp. 67-80, 2008.
     
    Matwin, S., Chang, L., Wright, R., Zhan, J., Editorial – “Privacy and Security Aspects of Data Mining” Special issue – International Journal of Information and Computer Security, Vol. 2, No. 1, pp.1, 2008.
    Zhan, J., Using Cryptography for Privacy-Preserving Data Mining, In Advances in Data Warehousing and Mining series (IGI Publisher), Vol. 2, pp. 175-194, 2008.
    Bashir, A. and Zhan, J.,  Not Always a Blunt Tool – Legislation in the Context of Privacy Externalities, Communications of the Chinese Cryptology and Information Security Association, Vol. 2, No. 1, pp. 36-48, 2007.
    Zhan, J., Privacy Quantification in Privacy Preserving Data Mining, International Journal of Information Technology and Intelligent Computing, In Press.
     
    Zhan, J. and Matwin S., Privacy Preserving Support Vector Machine Classification, International Journal of Intelligent Information and Database Systems, Vol. 1, No.3/4, pp. 356–385, 2007.
    Inoue, A., Wong, T. and Zhan, J., Applications of Machine Learning to Information Security and Privacy, Journal of Japanese Society for Fuzzy Theory and Intelligent Informatics, Vol. 19, No. 3, pp. 222–232, 2007.
    Zhan, J. and Matwin, S., Privacy-Preserving Data Mining in Electronic Surveys, International Journal of Network Security, Vol. 4, No. 3, pp. 318-327, 2007.
    Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Multi-Party Decision Tree Induction, International Journal of Business Intelligence and Data Mining, Vol.2, No.2, pp. 197–212, 2007.
    Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Collaborative Association Rule Mining, Journal of Network and Computer Applications, Vol. 30, pp. 1216-1227, 2007.
     
    Zhan, J., Privacy-Oriented Collaborative Decision Tree Classification, International Journal of Information Technology and Intelligent Computing, In Press.
    Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Electronic Voting, International Journal of Information and Security, Vol. 15, No. 2, pp. 165-180, 2006.
    Zhan, J., Chang, L. and Matwin, S.,  Building K-nearest Neighbor Classifiers on Vertically Partitioned Private Data, International Journal of Network Security, Vol. 1, No. 1, pp. 46-51, 2005.
  • Yu, Huiming, Barron, C., Zhan, J., Cloud Computing Security Case Studies and Research, The 2013 International Conference of Parallel and Distributed Computing, London, UK, July 3-5, 2013.
  • Lake, J., Yuan, X., and Zhan, J., Towards Authentication Vulnerabilities in OpenEMR, The 2013 Symposium on Computing at Minority Institutions, Virginia Beach, VA, USA, April 11-13, 2013.
  • Fang, X. and Zhan, J., A Computational Framework for Detecting Malicious Actors in Communities, ASE International Conference on Social Informatics, Washington D.C., December 14-16, 2012.
  • Kanampiu, M. and Zhan, J., A Dynamic Covert Passive Actors Detection Scheme for a Healthy Networked Community, ASE International Conference on Cyber Security, Washington D.C., December 14-16, 2012.
  • Doyal, A., Zhan, J., Yu, A., Towards Defending DDoS Attacks, ASE International Conference on Cyber Security, Washington D.C. December 14-16, 2012.
  • Albu-Shamah, A. and Zhan, J., Towards an Optimizing Model for Older People at Risk of Falls, ASE International Conference on Biomedical Computing, Washington D.C. December 14-16, 2012.
  • Fang, X. and Zhan, J., Task-Oriented Social Ego Network Generation via Dynamic Collaborator Selection, ASE/IEEE International Conference on Social Computing, Amsterdam, Netherlands, September 3-5, 2012.
  • Kanampiu, M.,  Zhan, J., Baek, J., A Secure Group Collaboration Protocol for Nonverbal Human Social Signals Featuring Deception Detection, ASE/IEEE International Conference on Privacy, Security, Risk, and Trust, Amsterdam, Netherlands, September 3-5, 2012.
  • Fang, X., Koceja, N., Zhan, J., Dozier, G., and Dasgupta, D., An Artificial Immune System for Phishing Detection, IEEE Congress on Evolutionary Computation, Brisbane, Australia, June 10-15, 2012.
  •  
  • Yu, H., Rann, J. and Zhan, J., “SUCH: A Cloud Computing Management Tool”, The Proceedings of the 5th IFIP International Conference on New Technologies, Mobility & Security, Istanbul, Turkey, May 2012.
  •  
  • Zhan, J., Cabrera, L., Osman, G., Shah, R., Using Private Matching for Securely Querying Genomic Sequences, IEEE International Conference on Privacy, Security, Risk and Trust, MIT, Boston, USA, October 9-11, 2011.
  • Zhan, J. and Fang, X., A Novel Trust Computing System for Social Networks, IEEE International Conference on Privacy, Security, Risk and Trust, MIT, Boston, USA, October 9-11, 2011.
  • Zhan, J. and Fang, X., Anomaly Detection in Social-Economic Computing, IEEE International Conference on Social Computing, MIT, Boston, October 9-11, 2011.
  • Zhan, J., Jones, N., and Purnell, M., Top-K Algorithm for Recommendation in Social Networking Kingdoms, IEEE International Conference on Social Computing, MIT, Boston, USA, October 9-11, 2011.
  • Fang, X., Zhan, J., Koceja, N., Williams, K., and Brewton, J., Integrating Online Social Networks for Enhancing Reputation Systems of E-Commerce, IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 10-12, 2011.
  • Zhan, J., Oommen, J., Crisostomo, J., System Call Anomaly Detection, IEEE International Conference on Intelligence and Security Informatics, Beijing, China, July 10-12, 2011.
  • Zhan, J., and Thomas, L., Phishing Detection Using Stochastic Learning-Based Weak Estimators, IEEE Symposium Series on Computational Intelligence, Paris, France, April 2011.
  • Zhan, J., Thomas, L., Pasumarthi, V., Using Gaming Strategies For Attacker and Defender in Recommender Systems, IEEE Symposium Series on Computational Intelligence, Paris, France, April 2011.
  • Zhan, J., Fang, X., and Bandaru, N., Protecting Location Data on Social Networks, IEEE Symposium Series on Computational Intelligence, Paris, France, April 2011.
  • Zhan, J., Fang, X., Killion, P., Trust Optimization in Task-Oriented Social Networks, IEEE Symposium Series on Computational Intelligence, Paris, France, April 2011.
  • Zhan, J., and Fang, X., Authentication Using Multi-Level Social Networks, International Conference on Knowledge Discovery, Knowledge Engineering and Knowledge Management, Springer Series on Communications in Computer and Information Science, Vol. 128, 2011.
  • Zhan, J., and Fang, X., Trust Maximization in Social Networks, Proceedings of International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, Maryland, USA, March 2011.
  • Zhan, J., and Fang, X., Location Privacy Protection on Social Networks, Proceedings of International Conference on Social Computing, Behavioral-Cultural Modeling and Prediction, Maryland, USA, March 2011.
  •  
  • Zhan, J., and Fang, X., A Computational Trust Framework for Social Computing, Proceedings of IEEE International Conference on Social Computing, Minneapolis, USA, August 2010.
  • Beck, K., and Zhan, J., Phishing Using a Modified Bayesian Technique, Proceedings of International Symposium on Social Computing Applications, IEEE CS Press, Minneapolis, USA, August 2010.
  • Yu, T., Lee, D., and Zhan, J., Multi-Party K-Means Clustering with Privacy Consideration, in Proceedings of IEEE International Symposium on Parallel and Distributed Processing with Applications, Taipei, Taiwan, September 2010.
  • Duan, Y., Canny, J., and Zhan, J., Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users, in Proceedings of 19th USENIX Security Symposium, Washington, D.C., August 11-13, 2010.
  • Fang, X. and Zhan, J., Online Banking Authentication Using Mobile Phones, Proceedings of the International Symposium on Financial Security, Busan, Korea, May 2010, IEEE Computer Society Press.
  • Beck, K., and Zhan, J., Phishing in Finance, Proceedings of International Symposium on Financial Security, Proceedings of the International Symposium on Financial Security, Busan, Korea, May  2010, IEEE Computer Society Press.
  • Erhardt, D., and Zhan, J., A Proactive Approach to Detecting and Reducing Information Security Threats in Billing Systems, Proceedings of the International Symposium on Financial Security, Busan, Korea, May 2010, IEEE Computer Society Press.
  • Henkel, J., Zhan, J., Remote Deposit Capture in the Consumer’s Hands, Proceedings of the International Symposium on Financial Security, Busan, Korea, May 2010, IEEE Computer Society Press.
  • Knopik, C., and Zhan, J., The Effects of Financial Crises on American Financial Institutions Information Security, Proceedings of the International Symposium on Financial Security, Busan, Korea, May 2010, IEEE Computer Society Press.
  • Allan, T., and Zhan, J., Towards Fraud Detection Methodologies, Proceedings of the International Symposium on Financial Security, Busan, Korea, May 2010, IEEE Computer Society Press.
  • Zhan, J., Oommen, J., and Crisostomo, J., Anomaly Detection in Dynamic Social Systems, Proceedings of the IEEE International Conference on Social Computing, Vancouver, Canada, pp.18-25, August 2009. (8.92% acceptance rate)
  •  
  • Wasser, B. and Zhan, J., Practical Values for Privacy, Proceedings of the International Symposium  on Privacy and Security Applications, Vancouver, Canada, August 2009, IEEE Computer Society Press.
  • Su, C., Zhan, J. and Sakurai, K., Data Standardization Problem in Privacy-Preserving K-Means Clustering, Proceedings of the 2009 Symposium on Cryptography and Information Security, Otsu, Japan, pp. 1-5, January 2009.
  • Miyazaki, S., Mead, N. and Zhan, J., Computer-Aided Privacy Requirements Elicitation Techniques, Proceedings of the IEEE Asia Pacific International Conference on Services Computing, Yilan, Taiwan, pp. 367-372, December 2008.
  • Shen, C., Zhan, J., Hsu, T., Liau, C. and Wang, D., Scalar Product-Based Secure Two Party Computation, Proceedings of the IEEE International Conference on Granular Computing, Hangzhou, China, pp. 600-605, August 2008.
  • Wang, J., Zhan, J. and Zhang, J., Towards Real-time Performance of Data Value Hiding, Proceedings of the IEEE International Conference on Granular Computing, Hangzhou, China, pp. 606-611, August 2008.
  • Park, H., Lee, D. and Zhan, J., Attribute-Based Access Control Using Combined Authentication Technologies, Proceedings of the IEEE International Conference on Granular Computing, Hangzhou, China, pp. 518-523, August 2008.
  • Zhan, J., Cheng, I., Hsieh, C., Hsu, T., Liau, C. and Wang, D., Towards Efficient Privacy-Preserving Recommender Systems, Proceedings of the IEEE International Conference on Granular Computing, Hangzhou, China, pp. 778-783, August 2008.
  • Zhan, J. and Lin, T., Granular Computing in Privacy-Preserving Data Mining, Proceedings of the IEEE International Conference on Granular Computing, Hangzhou, China, pp. 86-92, August 2008.
  • Hsu, C., Zhan,  J., Fang, W. and Ma, J., Towards Improving QoS-Guided Scheduling in Grids, Proceedings of the 3rd ChinaGrid Annual Conference, Dunhuang, China, pp. 89-95, IEEE CS Press, August 2008.
  • Park, H., Lee, D., Zhan, J. and Blosser, G., Efficient Keyword Index Search over Encrypted Data of Groups, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, pp. 225-229, June 2008.
  • Park, H., Zhan, J. and Lee, D., Privacy-Aware Access Control through Negotiation in Daily Life Service, Lecture Notes in Computer Science, Volume 5075, pp. 514-519, Springer, 2008.
  • Xu, X., Zhan, J. and Zhu, H., Using Social Networks to Organize Researcher Community, Lecture Notes in Computer Science, Volume 5075, pp. 421-427, Springer, 2008.
  • Hsieh, C., and Zhan, J., Privacy-Preserving Collaborative Recommender Systems for Promoting Sales in E-Commerce, the Annual RAKUTEN Conference, Japan, 2008.
  • Blosser, G. and Zhan, J., Privacy-Preserving Collaborative E-Voting, Lecture Notes in Computer Science, Volume 5075, pp. 508-513, Springer, 2008.
  • Zhan, J., Blosser, G., Yang, C. and Singh, L., Privacy-Preserving Collaborative Social Networks, Lecture Notes in Computer Science, Volume 5075, pp. 114-125, Springer, 2008.
  • Blosser, G. and Zhan, J., Privacy-Preserving Collaborative Social Networks, Proceedings of the International Conference on Information Security and Assurance, pp. 543-548, IEEE CS Press, April 2008.
  • Park, H. and Zhan, J., Privacy-Preserving SQL Queries, Proceedings of the International Conference on Information Security and Assurance, pp. 549-554, IEEE CS Press, April 2008.
  • Prakobphol, K. and Zhan, J., A Novel Outlier Detection Scheme for Network Intrusion Detection Systems, Proceedings of the International Conference on Information Security and Assurance, pp. 555-560, IEEE CS Press, April 2008. (Best Special Session Paper)
  • Hsieh, C., Zhan, J., Zeng, D. and Wang, F., Privacy-Preserving Recommender Systems, Proceedings of the International Conference on Information Security and Assurance, pp. 561-566, IEEE CS Press, April 2008.
  • Xu, X. and Zhan, J., Security Applications in Dynamics Evolution Systems, Proceedings of the International Conference on Information Security and Assurance, pp. 567-572, IEEE CS Press, April 2008.
  • Mead, N., Viswanathan, V. and Zhan, J., Incorporating Security Requirements Engineering into the Rational Unified Process, Proceedings of the International Conference on Information Security and Assurance, pp. 537-542, IEEE CS Press, 2008.
  • Wang, I., Shen, C., Hsu, T., Liau, C., Wang, D. and Zhan, J.,  Towards Empirical Aspect of Secure Scalar Product Protocol, Proceedings of the International Conference on Information Security and Assurance, pp. 573-578, IEEE CS Press, April 2008.
  • Zhan, J. and Rajamani, V., The Economics of Privacy: People, Policy and Technology, Proceedings of the International Conference on Information Security and Assurance, pp. 579-584, IEEE CS Press, April 2008.
  • Park, H., Kim, B., Lee, D., Chung, Y. and Zhan, J., Secure Similarity Search, Proceedings of the IEEE International Conference on Granular Computing, Silicon Valley, USA, pp. 598-598, November 2007.
  • Singh, L. and Zhan, J., Measuring Topological Anonymity in Social Networks, Proceedings of the IEEE International Conference on Granular Computing, Silicon Valley, USA, pp. 770-774, November 2007.
  • Shin, K. and Zhan, J., A Verification Schemes for Data Aggregation in Data Mining, Proceedings of the IEEE International Conference on Granular Computing, Silicon Valley, USA, pp. 374-380, November 2007.
  • Zhang, W. and Zhan, J., A Scientific Decoding of YinYang 1-2-4-8-64 for Equilibrium-Based Granular Computing, Proceedings of the IEEE International Conference on Granular Computing, Silicon Valley, USA, pp. 28-34, November 2007.
  • Wei, R. and Zhan, J., Improved Privacy Preference Policy, Proceedings of the IEEE International Conference on Granular Computing, Silicon Valley, USA, pp.787-787, November 2007.
  • Zhan, J., Privacy-Preserving K-Medoids Clustering, Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Montreal, Canada, pp. 3600-3603, October 2007.
  • Zhan, J., Collaboratively Mining Sequential Patterns Over Private Data, Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, Montreal, Canada, pp. 3323-3326, October 2007.
  • Shen, C., Zhan, J., Wang, D., Hsu, T. and Liau, C., Information Theoretically Secure Number Product Protocol, Proceedings of the International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3006-3011, August 2007.
  • Wei, R. and Zhan, J., A Proposal for Customers’ Privacy Preference Policy, Proceedings of the International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3022-3027, August 2007.
  • Blosser, G. and Zhan, J., Maintaining K-Anonymity On Real-Time Data, Proceedings of the International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3012-3015, August 2007.
  • Purcell, C. and Zhan, J., Adapting US Privacy Laws to the Internet: Is Patching Enough? Proceedings of the International Conference on Machine Learning and Cybernetics, Hong Kong, pp. 3000-3005, August 2007.
  • Zhan, J., Privacy Preserving Decision Tree Classification in Horizontal Collaboration, Proceedings of the International Conference on Security of Information and Networks, North Cyprus, pp.53-58, May 2007.
  • Zhan, J., Privacy Preserving Collaborative Data Mining,  Proceedings of the IEEE International Conference on Intelligence and Security Informatics, New Jersey, USA, pp. 208-218, May 2007.
  • Zhan, J., Using Homomorphic Encryption and Digital Envelope Techniques for Privacy Preserving Collaborative Sequential Pattern Mining, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, New Jersey, USA, pp. 331–334, May 2007.
  •  
  • Zhan, J., Quantifying Privacy for Privacy Preserving Data Mining, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, Honolulu, Hawaii, USA, pp. 630-636, April 2007.
  • Zhan, J., Privacy Preserving Data Mining In Digital Age, the Pacific Asia Workshop on Intelligence and Security Informatics, Chengdu, China, April 2007.
  • Duan, Y., Canny, J. and Zhan, J., Efficient Privacy-Preserving Association Rule Mining:  P4P Style, Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, Honolulu, Hawaii,  USA, pp. 654-660, April 2007.
  • Zhan, J., and Matwin, S., A Crypto-Approach to Privacy-Preserving Data Mining, Proceedings of the IEEE International Conference on Data Mining Workshop on Privacy Aspect of Data Mining, Hong Kong, pp. 546-550, December 2006.
  • Zhan, J., Chang, L. and Matwin, S., How to Prevent Private Data From Being Disclosed To A Malicious Attacker. Data Mining: Foundations and Practice, Edited by T.Y. Lin and Y. Xie, Springer-Verlag, pp. 517-528, November 2006.
  •  
  • Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Naive Bayesian Classification over Horizontally Partitioned Data, Data Mining: Foundations and Practice, Edited by T.Y. Lin and Y. Xie, Springer-Verlag, pp. 529-538, November 2006.
  • Zhan, J. and Matwin, S., Privacy-Oriented Learning Systems, Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, the Grand Hotel, Taipei, Taiwan, pp. 4102-4105, October 2006.
  • Zhan, J., Privately Mining Applications in Bioinformatics, the Seventh International Conference on Systems Biology, Yokohama, Japan, October 2006
  • Zhan, J.,  Privacy-Preserving Collaborative Sequential Pattern Mining, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Workshop on Theory and Practice of Temporal Data Mining , Philadelphia, USA, pp. 5-14, August 2006.
  •  
  • Zhan, J., The Economic Aspects of Privacy Preserving Data Mining, the IEEE Symposium on Security and Privacy, the Claremont Resort, Oakland, California, USA, May 2006.
  • Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Association Rule Mining, Proceedings of the 2005 Annual IFIP WG 11.3 Working Conference on Data and Applications Security,  Storrs, Connecticut, USA, pp. 153-165, August 2005.
  • Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Support Vector Machine Learning, Proceedings of the International Conference on Electronic Business, Hong Kong, December 2005.
  • Zhan, J., Matwin S. and Chang, L., Privacy-Preserving Decision Tree Classification Over Horizontally Partitioned Data, Proceedings of the International Conference on Electronic Business, Hong Kong, December 2005.
  • Zhan, J., Chang, L and Matwin, S., Privacy-Preserving Sequential Pattern Mining Over Vertically Partitioned Data, Proceedings of the International Conference on Electronic Business, Hong Kong, December 2005.
  • Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Naïve Bayesian Classification Over Horizontally Partitioned Data, Proceedings of the International Conference on Electronic Business, Hong Kong, December 2005.
  • Zhan, J. and Matwin, S., Privacy and Security Issues in Medical Informatics, the Electronic Health Information and Privacy Conference, Ottawa, Canada, November 2005.
  • Zhan, J., Chang, L. and Matwin, S., How to Prevent Private Data From Being Disclosed To A Malicious Attacker, Proceedings of the IEEE International Conference on Data Mining Workshop on Foundations of Semantic Oriented Data and Web Mining, Houston, Texas, pp. 41-46, November 2005.
  • Zhan, J., Chang, L. and Matwin, S. Privacy-Preserving Naïve Bayesian Classification Over Vertically Partitioned Data, Proceedings of the IEEE International Conference on Data Mining Workshop on Foundations of Semantic Oriented Data and Web Mining, Houston, Texas, pp. 47-53, November 2005.
  • Zhan, J., Matwin, S. and Chang, L., Multi-Party Sequential Pattern Mining Over Private Data, Proceedings of the IEEE International Conference on Data Mining Workshop on Multi-Agent Data Warehousing and Multi-Agent Data Mining, Houston, Texas, USA, pp. 112-120, November 2005.
  • Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Decision Tree Classification Over Vertically Partitioned Data, Proceedings of the IEEE International Conference on Data Mining Workshop on Multi-Agent Data Warehousing and Multi-Agent Data Mining, Houston, Texas, pp. 121-129, November 2005.
  •  
  • Zhan, J., Chang, L. and Matwin, S., K-nearest Neighbor Classification on Vertically Partitioned Private Data, Proceedings of the IEEE International Conference on Granular Computing, Beijing, China, pp. 708-711, July 2005.
  • Zhan, J., Matwin, S. and Chang, L., Privacy-Preserving Clustering Over Horizontally Partitioned Data, Proceedings of Artificial Intelligence Studies: VII International Conference on Artificial Intelligence AI-20’2005, Poland, pp. 39-48, June 2005.
  • Zhan, J., Chang, L. and Matwin, S., How to Construct Support Vector Machines Without Breaching Privacy, Proceedings of Artificial Intelligence Studies: VII International Conference on Artificial Intelligence AI-20’2005, Poland, pp. 49-58, June 2005.
  • Zhan, J., Research Directions in Data Mining and Privacy, International Conference on Services Systems and Services Management, Chongqing, China, June 2005.
  • Zhan, J., Matwin, S. and Chang, L., Private Mining of Association Rules, Proceedings of the IEEE International Conference on Intelligence and Security Informatics, Atlanta, Georgia, pp. 72-80, May 2005.
  •  
  • Zhan, J., Chang, L. and Matwin, S., Collaborative Association Rule Mining By Sharing Private Data, Proceedings of the Montreal Conference On E-Technologies, Montreal, Canada, pp. 193-197, January 2005.
  •  
  • Zhan, J., Chang, L. and Matwin, S., Bayesian Network Induction with Incomplete Private Data, Proceedings of the International Conference on Electronic Business, Beijing, China, pp. 1119-1124, December 2004.
  •  
  • Zhan, J., Matwin, S. Japkowicz, N., and Chang, L., Association Rule Mining and Privacy Protection, Proceedings of the International Conference on Electronic Business, Beijing, China, pp. 1172-1178, December 2004.
  • Zhan, J. and Matwin, S., Privacy-Preserving Electronic Surveys, Proceedings of the International Conference on Electronic Business, Beijing, China, pp. 1179-1185, December 2004.
  • Zhan, J., Chang, L. and Matwin, S., Collaborative Data Mining and Privacy Protection, Foundation and Novel Approach in Data Mining, Edited by T.Y. Lin, S. Ohsuga, C.J. Liau, and X. Hu, Springer-Verlag, pp. 213-227, August 2004.
  •  
  • Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Multi-Party Decision Tree Classification, Proceedings of the 2004 Annual IFIP WG 11.3 Working Conference on Data and Application Security, Sitges, Catalonia, Spain, pp.341-355, July 2004.
  • Zhan, J. and Chang, L., Privacy-Preserving Collaborative Sequential Pattern Mining With Horizontally Partitioned Datasets, Proceedings of the International Conference on Data Privacy and Security in A Global Society, Skiathos, Greece, pp. 242-252, May 2004.
  • Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Collaborative Sequential Pattern Mining, Proceedings of the SIAM International Conference on Data Mining, Workshop on Link Analysis, Counter-terrorism, and Privacy, Lake Buena Vista, Florida, pp 61-72, April 2004.
  • Zhan, J., Chang, L. and Matwin, S., Privacy-Preserving Naive Bayesian Classification, Proceedings of the IASTED International Conference on Artificial Intelligence and Applications, Innsbruck, Austria, pp. 141-155, February 2004.
  • Zhan, J. and Chang, L., Privacy-Preserving Data Mining, Proceedings of the IEEE International Conference on Data Mining, Workshop of Foundations and New Directions in Data Mining, Melbourne, Florida, USA, pp. 65-71, November 2003.
  • Du, W. and Zhan, J., Using Randomized Response Techniques for Privacy-Preserving Data Mining, Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington DC, USA, pp. 505-510, August 2003.
  • Du, W. and Zhan, J.,  Building Decision Tree Classifier On Private Data, Proceedings of the IEEE International Conference on Data Mining, Workshop on Privacy, Security, and Data Mining, Maebashi City, Japan, pp.1-8, December 2002.
  • Du, W. and Zhan, J.,  A Practical Approach to Solve Secure Multi-party Computation Problems, Proceedings of the ACM International Workshop on New Security Paradigms, Virginia Beach, Virginia, USA, pp.127-135, September 2002.
  • Book Publications
  •  
  • Zhan, J., the Cryptography and Privacy Protection in Data Mining Systems, Springer, Lecture Notes on Computer Science, Volume 4845, pp. 494-513, 2007.
  •  Zhan, J., Yang, L. (Eds.) Proceedings of IEEE International Conference on Social Computing,  SocialCom 2009, Vancouver, Canada, 2009.
  •  Zhan, J., Yang, L. (Eds.) Proceedings of IEEE International Conference on Privacy, Security, Risk and Trust, PASSAT 2009, Vancouver, Canada, 2009.
  • Park, J.H., Zhan, J., Lee, C., Wang, G., Kim, T.-h., Yeo, S.-S. (Eds.), Vol. 36, 2009, ISBN 978-3-642-02632-4, Advances in Information Security and Its Application, Proceedings of the Third International Conference, ISA 2009, Seoul, Korea, 2009.
  • Yang, C., Chen, H., Chau, M., Chang, K., Lang, S., Chen, P., Hsieh, R., Zeng, D., Wang, F., Carley, K., Mao, W. and Zhan, J. (Eds.), Proceedings of Intelligence and Security & Informatics Workshops, PAISI, PACCF and SOCO 2008, LNCS5075, 2008.
  • Matwin, S., Chang, L., Wright, R. and Zhan, J. (Eds.), Proceedings of International Workshop on Privacy-Preserving Data Mining, 2005.
  • Zhan, J., Matwin, S. and Chang, L. (Eds.), Proceedings of International Workshop on Privacy-Preserving Data Mining, 2004.