Z
Zhiyong Peng
Researcher at Wuhan University
Publications - 107
Citations - 829
Zhiyong Peng is an academic researcher from Wuhan University. The author has contributed to research in topics: Computer science & Encryption. The author has an hindex of 12, co-authored 94 publications receiving 680 citations.
Papers
More filters
Book ChapterDOI
From Big Data to Big Data Mining: Challenges, Issues, and Opportunities
TL;DR: This paper provides an overview of big data mining and discusses the related challenges and the new opportunities, including a review of state-of-the-art frameworks and platforms for processing and managing big data as well as the efforts expected onbig data mining.
Journal ArticleDOI
A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications
TL;DR: A set of strict privacy requirements for full-text retrieval in cloud storage systems are established and a Bloom filter based tree index is designed that fine-tunes the similarity between the query and encrypted documents by proposing the membership entropies of index words.
Journal ArticleDOI
Deep Reinforcement Learning-Based Approach to Tackle Topic-Aware Influence Maximization
TL;DR: This paper proposes two topic-aware social influence propagation models based on IC and LT model, respectively, which are conducive to better advertising injections and can construct the solution according to the influence evaluations efficiently, rather than spending a high cost to compute the exact influence by considering the complex graph structure.
Journal ArticleDOI
Watermarking geographical data on spatial topological relations
TL;DR: Experimental results show that the proposed algorithm has a good robustness against geometrical attacks, simplification, interpolation and noise addition attacks, and preserves shape of the watermarked geographical objects.
Proceedings ArticleDOI
An additive-attack-proof watermarking mechanism for databases' copyrights protection using image
TL;DR: The approach proposed is robust to many kinds of attacks so that the copyrights can be effectively protected and the term of WDI (Watermarking Databases using Image) is proposed.