scispace - formally typeset
Z

Zhiyong Peng

Researcher at Wuhan University

Publications -  107
Citations -  829

Zhiyong Peng is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 12, co-authored 94 publications receiving 680 citations.

Papers
More filters
Book ChapterDOI

From Big Data to Big Data Mining: Challenges, Issues, and Opportunities

TL;DR: This paper provides an overview of big data mining and discusses the related challenges and the new opportunities, including a review of state-of-the-art frameworks and platforms for processing and managing big data as well as the efforts expected onbig data mining.
Journal ArticleDOI

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications

TL;DR: A set of strict privacy requirements for full-text retrieval in cloud storage systems are established and a Bloom filter based tree index is designed that fine-tunes the similarity between the query and encrypted documents by proposing the membership entropies of index words.
Journal ArticleDOI

Deep Reinforcement Learning-Based Approach to Tackle Topic-Aware Influence Maximization

TL;DR: This paper proposes two topic-aware social influence propagation models based on IC and LT model, respectively, which are conducive to better advertising injections and can construct the solution according to the influence evaluations efficiently, rather than spending a high cost to compute the exact influence by considering the complex graph structure.
Journal ArticleDOI

Watermarking geographical data on spatial topological relations

TL;DR: Experimental results show that the proposed algorithm has a good robustness against geometrical attacks, simplification, interpolation and noise addition attacks, and preserves shape of the watermarked geographical objects.
Proceedings ArticleDOI

An additive-attack-proof watermarking mechanism for databases' copyrights protection using image

TL;DR: The approach proposed is robust to many kinds of attacks so that the copyrights can be effectively protected and the term of WDI (Watermarking Databases using Image) is proposed.