H-Index & Metrics Top Publications

H-Index & Metrics

Discipline name H-index Citations Publications World Ranking National Ranking
Computer Science H-index 32 Citations 4,592 90 World Ranking 7365 National Ranking 3506

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

His primary areas of study are Data mining, Access control, Classifier, Computer security and XACML. His Data mining study frequently draws parallels with other fields, such as Set. Dan Lin combines topics linked to Information retrieval with his work on Classifier.

As a member of one scientific family, Dan Lin mostly works in the field of Computer security, focusing on The Internet and, on occasion, Cloud computing. In his study, which falls under the umbrella issue of Cloud computing, Data science is strongly linked to Service provider. His XACML research incorporates themes from Variety, Binary decision diagram and Algebra.

His most cited work include:

  • Query and update efficient B + -tree based indexing of moving objects (286 citations)
  • iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning (214 citations)
  • Ensuring Distributed Accountability for Data Sharing in the Cloud (165 citations)

What are the main themes of his work throughout his whole career to date?

Dan Lin focuses on Computer security, Access control, Data mining, Cloud computing and Service provider. His work carried out in the field of Computer security brings together such families of science as Computer network and Vehicular ad hoc network. His work on XACML as part of his general Access control study is frequently connected to Grid computing, thereby bridging the divide between different branches of science.

His research in Data mining intersects with topics in Tree, Set and Search engine indexing. His study in Cloud computing is interdisciplinary in nature, drawing from both Computer data storage and Scalability, Database. His Service provider study also includes

  • Mobile device which connect with Information sensitivity,
  • Information retrieval which is related to area like Classifier.

He most often published in these fields:

  • Computer security (29.20%)
  • Access control (20.35%)
  • Data mining (18.58%)

What were the highlights of his more recent work (between 2018-2021)?

  • Service provider (15.04%)
  • Internet privacy (12.39%)
  • Cloud computing (15.04%)

In recent papers he was focusing on the following fields of study:

Service provider, Internet privacy, Cloud computing, Access control and Information sensitivity are his primary areas of study. Dan Lin interconnects Computer security, Quality of service, Cloud computing security, Tree and Parallel algorithm in the investigation of issues within Service provider. Dan Lin combines subjects such as Data stream mining and Usability with his study of Computer security.

His studies deal with areas such as Database, State, Dependability and Routing protocol as well as Cloud computing. In his works, he undertakes multidisciplinary study on Access control and Decoy. His Information sensitivity research incorporates elements of Network topology, Scalability, Mobile device and Data science.

Between 2018 and 2021, his most popular works were:

  • A Cloud Brokerage Architecture for Efficient Cloud Service Selection (14 citations)
  • MoveWithMe: Location Privacy Preservation for Smartphone Users (6 citations)
  • REMIND: Risk Estimation Mechanism for Images in Network Distribution (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Dan Lin mainly focuses on Cloud computing, Service provider, Routing protocol, Dissemination and Dependability. His Cloud computing study combines topics in areas such as Computer network and Information privacy. His research integrates issues of Tree, Quality of service, Cloud testing and Database in his study of Service provider.

The concepts of his Routing protocol study are interwoven with issues in Distributed computing and State.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Top Publications

Query and update efficient B + -tree based indexing of moving objects

Christian S. Jensen;Dan Lin;Beng Chin Ooi.
very large data bases (2004)

469 Citations

Ensuring Distributed Accountability for Data Sharing in the Cloud

S. Sundareswaran;A. Squicciarini;Dan Lin.
IEEE Transactions on Dependable and Secure Computing (2012)

265 Citations

iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning

Jun Yu;Baopeng Zhang;Zhengzhong Kuang;Dan Lin.
IEEE Transactions on Information Forensics and Security (2017)

214 Citations

A Brokerage-Based Approach for Cloud Service Selection

Smitha Sundareswaran;Anna Squicciarini;Dan Lin.
international conference on cloud computing (2012)

210 Citations

A Survey of Quantification of Privacy Preserving Data Mining Algorithms

Elisa Bertino;Dan Lin;Wei Jiang.
Privacy-Preserving Data Mining (2008)

197 Citations

Continuous Clustering of Moving Objects

C.S. Jensen;Dan Lin;Beng Chin Ooi.
IEEE Transactions on Knowledge and Data Engineering (2007)

196 Citations

An Approach to Evaluate Data Trustworthiness Based on Data Provenance

Chenyun Dai;Dan Lin;Elisa Bertino;Murat Kantarcioglu.
very large data bases (2008)

171 Citations

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs

Dan Lin;Jian Kang;Anna Squicciarini;Yingjie Wu.
IEEE Transactions on Mobile Computing (2017)

163 Citations

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Jun Yu;Zhenzhong Kuang;Baopeng Zhang;Wei Zhang.
IEEE Transactions on Information Forensics and Security (2018)

145 Citations

Access control policy combining: theory meets practice

Ninghui Li;Qihua Wang;Wahbeh Qardaji;Elisa Bertino.
symposium on access control models and technologies (2009)

142 Citations

Profile was last updated on December 6th, 2021.
Research.com Ranking is based on data retrieved from the Microsoft Academic Graph (MAG).
The ranking h-index is inferred from publications deemed to belong to the considered discipline.

If you think any of the details on this page are incorrect, let us know.

Contact us

Top Scientists Citing Dan Lin

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 38

Rui Zhang

Rui Zhang

National University of Singapore

Publications: 28

Christian S. Jensen

Christian S. Jensen

Aalborg University

Publications: 22

Mohamed F. Mokbel

Mohamed F. Mokbel

University of Minnesota

Publications: 16

Nannan Wang

Nannan Wang

Xidian University

Publications: 13

Xinbo Gao

Xinbo Gao

Chongqing University of Posts and Telecommunications

Publications: 13

Vassilis J. Tsotras

Vassilis J. Tsotras

University of California, Riverside

Publications: 12

Ling Liu

Ling Liu

Georgia Institute of Technology

Publications: 12

Hongxin Hu

Hongxin Hu

University at Buffalo, State University of New York

Publications: 12

Walid G. Aref

Walid G. Aref

Purdue University West Lafayette

Publications: 11

Bhavani Thuraisingham

Bhavani Thuraisingham

The University of Texas at Dallas

Publications: 10

Torben Bach Pedersen

Torben Bach Pedersen

Aalborg University

Publications: 10

Yu Zheng

Yu Zheng

Jingdong (China)

Publications: 10

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 10

Anna Cinzia Squicciarini

Anna Cinzia Squicciarini

Pennsylvania State University

Publications: 10

Something went wrong. Please try again later.