• Publications
  • Influence
PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities
  • Li Xiong, L. Liu
  • Computer Science
  • IEEE Transactions on Knowledge and Data…
  • 1 July 2004
Peer-to-peer (P2P) online communities are commonly perceived as an environment offering both opportunities and threats. One way to minimize threats in such communities is to use community-basedExpand
  • 1,689
  • 141
  • PDF
Location Privacy in Mobile Systems: A Personalized Anonymization Model
  • B. Gedik, L. Liu
  • Computer Science
  • 25th IEEE International Conference on Distributed…
  • 6 June 2005
This paper describes a personalized k-anonymity model for protecting location privacy against various privacy threats through location information sharing. Our model has two unique features. First,Expand
  • 756
  • 48
  • PDF
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one anotherExpand
  • 351
  • 38
  • PDF
Supporting anonymous location queries in mobile environments with privacygrid
This paper presents PrivacyGrid - a framework for supporting anonymous location-based queries in mobile information delivery systems. The PrivacyGrid framework offers three unique capabilities.Expand
  • 458
  • 31
  • PDF
XWRAP: an XML-enabled wrapper construction system for Web information sources
  • L. Liu, C. Pu, Wei Han
  • Computer Science
  • Proceedings of 16th International Conference on…
  • 29 February 2000
The paper describes the methodology and the software development of XWRAP, an XML-enabled wrapper construction system for semi-automatic generation of wrapper programs. By XML-enabled we mean thatExpand
  • 525
  • 30
Privacy-Aware Mobile Services over Road Networks
Consider a mobile client who travels over roads and wishes to receive location-based services (LBS) from untrusted service providers. How might the user obtain such services without exposing herExpand
  • 153
  • 26
  • PDF
Chromatin Modifications as Determinants of Muscle Stem Cell Quiescence and Chronological Aging
Summary The ability to maintain quiescence is critical for the long-term maintenance of a functional stem cell pool. To date, the epigenetic and transcriptional characteristics of quiescent stemExpand
  • 307
  • 24
  • PDF
Security Models and Requirements for Healthcare Application Clouds
  • R. Zhang, L. Liu
  • Computer Science
  • IEEE 3rd International Conference on Cloud…
  • 5 July 2010
With the widespread use of electronic health record (EHR), building a secure EHR sharing environment has attracted a lot of attention in both healthcare industry and academic community. CloudExpand
  • 332
  • 24
  • PDF
Maintenance of muscle stem cell quiescence by microRNA-489
Among the key properties that distinguish adult mammalian stem cells from their more differentiated progeny is the ability of stem cells to remain in a quiescent state for prolonged periods of time.Expand
  • 340
  • 22
Scaling Queries over Big RDF Graphs with Semantic Hash Partitioning
  • K. Lee, L. Liu
  • Computer Science
  • Proc. VLDB Endow.
  • 1 September 2013
Massive volumes of big RDF data are growing beyond the performance capacity of conventional RDF data management systems operating on a single node. Applications using large RDF data demand efficientExpand
  • 121
  • 22
  • PDF