Found 13 results
Filters: Author is Chang, LiWu  [Clear All Filters]
Zhan, Z., and LW. Chang, "Privacy-Preserving Collaborative Sequential Pattern Mining", Workshop on Link Analysis, Counter-terrorism and Privacy, 2004. ZhanChang2004.pdf (131.54 KB)
Zhan, Z., LW. Chang, and S. Matwin, "Privacy-Preserving Naive Bayesian Classification", IASTED conference on AIA, Austria, 2004. Zhan etal2004.pdf (132.97 KB)
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", International Journal on Artificial Intelligence Tools, vol. 12, issue 3, pp. 297-314, 2003. Tracy etal2003.pdf (220.93 KB)
Shyu, M-L., S-C. Chen, K. Sarinnapakorn, and LW. Chang, "A Novel Anomaly Detection Scheme Based on Principal Component Classifier", ICDM Foundation and New Direction of Data Mining workshop, pp. 172-179, 2003. Shyu etal2003.pdf (359.15 KB)
Chang, LW., "Statistical Sensitive Data Protection And Inference Prevention with Decision Tree Methods", Joint Statistical Meeting 2003, 2003. Chang2003.pdf (119.01 KB)
Tracy, J., LW. Chang, and I. S. Moskowitz, "An Agent-based Approach to Inference Prevention in Distributed Database Systems", 14th IEEE International Conference on Tools with Artificial Intelligence, Washington, D.C., pp. 413-422, 2002. Tracy etal2002.pdf (220.93 KB)
Moskowitz, I. S., LW. Chang, and R. Newman, "Capacity is the Wrong Paradigm", New Security Paradigms Workshop (NSPW), Virginia Beach, Virginia, 2002. Moskowitz etal2002b.pdf (247.04 KB)
Chang, LW., and J. Tracy, "Multi-Dimensional Inference and Confidential Data Protection with Decision Tree Methods", ICDM02 Workshop: The Foundation of Data Mining and Knowledge Discovery, Maebashi, Japan, pp. 195-200, 2002. ChangTracy2002.pdf (204 KB)
Newman, R., I. S. Moskowitz, LW. Chang, and M. M. Brahmadesam, "A Steganographic Embedding Undetectable by JPEG Compatibility Steganalysis", Information Hiding, 2002. Newman etal2002.pdf (251.68 KB)
Chang, LW., and I. S. Moskowitz, "A Study of Inference Problems in Distributed Databases", IFIP 11.3 WG in Data Security and Applications, Kings College, UK, 2002. ChangMoskowitz2002.pdf (256.28 KB)
Chang, LW., and I. S. Moskowitz, "A Bayesian Network Schema for Lessoning Database Inference", International Conference on Computational Intelligence for Modeling, Control and Automation, Las Vegas, Nevada, 2001. ChangMoskowitz2001.pdf (151.37 KB)
Moskowitz, I. S., M. Kang, LW. Chang, and G. E. Longdon, "Randomly Roving Agents for Intrusion Detection", 15th IFIP WG 11.3 Working Conference on Database and Application Security, Niagra on the Lake, Canada, Kluwer Press, 2001. Moskowitz etal2001.pdf (257.73 KB)
Moskowitz, I. S., G. E. Longdon, and LW. Chang, "A New Paradigm Hidden in Steganography", New Security Paradigms Workshop, Cork, Ireland, Ballycotton, Co., 2000. Moskowitz etal2000.pdf (247.73 KB)