D-Index & Metrics Best Publications

D-Index & Metrics D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines.

Discipline name D-index D-index (Discipline H-index) only includes papers and citation values for an examined discipline in contrast to General H-index which accounts for publications across all disciplines. Citations Publications World Ranking National Ranking
Computer Science D-index 33 Citations 4,731 111 World Ranking 8702 National Ranking 4013

Overview

What is he best known for?

The fields of study he is best known for:

  • Operating system
  • Computer network
  • The Internet

His primary areas of study are Data mining, Access control, Classifier, Computer security and XACML. His Data mining study frequently draws parallels with other fields, such as Set. Dan Lin combines topics linked to Information retrieval with his work on Classifier.

As a member of one scientific family, Dan Lin mostly works in the field of Computer security, focusing on The Internet and, on occasion, Cloud computing. In his study, which falls under the umbrella issue of Cloud computing, Data science is strongly linked to Service provider. His XACML research incorporates themes from Variety, Binary decision diagram and Algebra.

His most cited work include:

  • Query and update efficient B + -tree based indexing of moving objects (286 citations)
  • iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning (214 citations)
  • Ensuring Distributed Accountability for Data Sharing in the Cloud (165 citations)

What are the main themes of his work throughout his whole career to date?

Dan Lin focuses on Computer security, Access control, Data mining, Cloud computing and Service provider. His work carried out in the field of Computer security brings together such families of science as Computer network and Vehicular ad hoc network. His work on XACML as part of his general Access control study is frequently connected to Grid computing, thereby bridging the divide between different branches of science.

His research in Data mining intersects with topics in Tree, Set and Search engine indexing. His study in Cloud computing is interdisciplinary in nature, drawing from both Computer data storage and Scalability, Database. His Service provider study also includes

  • Mobile device which connect with Information sensitivity,
  • Information retrieval which is related to area like Classifier.

He most often published in these fields:

  • Computer security (29.20%)
  • Access control (20.35%)
  • Data mining (18.58%)

What were the highlights of his more recent work (between 2018-2021)?

  • Service provider (15.04%)
  • Internet privacy (12.39%)
  • Cloud computing (15.04%)

In recent papers he was focusing on the following fields of study:

Service provider, Internet privacy, Cloud computing, Access control and Information sensitivity are his primary areas of study. Dan Lin interconnects Computer security, Quality of service, Cloud computing security, Tree and Parallel algorithm in the investigation of issues within Service provider. Dan Lin combines subjects such as Data stream mining and Usability with his study of Computer security.

His studies deal with areas such as Database, State, Dependability and Routing protocol as well as Cloud computing. In his works, he undertakes multidisciplinary study on Access control and Decoy. His Information sensitivity research incorporates elements of Network topology, Scalability, Mobile device and Data science.

Between 2018 and 2021, his most popular works were:

  • A Cloud Brokerage Architecture for Efficient Cloud Service Selection (14 citations)
  • MoveWithMe: Location Privacy Preservation for Smartphone Users (6 citations)
  • REMIND: Risk Estimation Mechanism for Images in Network Distribution (2 citations)

In his most recent research, the most cited papers focused on:

  • Operating system
  • Computer network
  • The Internet

Dan Lin mainly focuses on Cloud computing, Service provider, Routing protocol, Dissemination and Dependability. His Cloud computing study combines topics in areas such as Computer network and Information privacy. His research integrates issues of Tree, Quality of service, Cloud testing and Database in his study of Service provider.

The concepts of his Routing protocol study are interwoven with issues in Distributed computing and State.

This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.

Best Publications

Query and update efficient B + -tree based indexing of moving objects

Christian S. Jensen;Dan Lin;Beng Chin Ooi.
very large data bases (2004)

492 Citations

Ensuring Distributed Accountability for Data Sharing in the Cloud

S. Sundareswaran;A. Squicciarini;Dan Lin.
IEEE Transactions on Dependable and Secure Computing (2012)

269 Citations

iPrivacy: Image Privacy Protection by Identifying Sensitive Objects via Deep Multi-Task Learning

Jun Yu;Baopeng Zhang;Zhengzhong Kuang;Dan Lin.
IEEE Transactions on Information Forensics and Security (2017)

257 Citations

A Brokerage-Based Approach for Cloud Service Selection

Smitha Sundareswaran;Anna Squicciarini;Dan Lin.
international conference on cloud computing (2012)

227 Citations

A Survey of Quantification of Privacy Preserving Data Mining Algorithms

Elisa Bertino;Dan Lin;Wei Jiang.
Privacy-Preserving Data Mining (2008)

202 Citations

MoZo: A Moving Zone Based Routing Protocol Using Pure V2V Communication in VANETs

Dan Lin;Jian Kang;Anna Squicciarini;Yingjie Wu.
IEEE Transactions on Mobile Computing (2017)

197 Citations

Continuous Clustering of Moving Objects

C.S. Jensen;Dan Lin;Beng Chin Ooi.
IEEE Transactions on Knowledge and Data Engineering (2007)

197 Citations

An Approach to Evaluate Data Trustworthiness Based on Data Provenance

Chenyun Dai;Dan Lin;Elisa Bertino;Murat Kantarcioglu.
very large data bases (2008)

179 Citations

Leveraging Content Sensitiveness and User Trustworthiness to Recommend Fine-Grained Privacy Settings for Social Image Sharing

Jun Yu;Zhenzhong Kuang;Baopeng Zhang;Wei Zhang.
IEEE Transactions on Information Forensics and Security (2018)

168 Citations

Access control policy combining: theory meets practice

Ninghui Li;Qihua Wang;Wahbeh Qardaji;Elisa Bertino.
symposium on access control models and technologies (2009)

148 Citations

If you think any of the details on this page are incorrect, let us know.

Contact us

Best Scientists Citing Dan Lin

Elisa Bertino

Elisa Bertino

Purdue University West Lafayette

Publications: 38

Rui Zhang

Rui Zhang

National University of Singapore

Publications: 28

Christian S. Jensen

Christian S. Jensen

Aalborg University

Publications: 22

Mohamed F. Mokbel

Mohamed F. Mokbel

University of Minnesota

Publications: 16

Hua Lu

Hua Lu

Aalborg University

Publications: 16

Nannan Wang

Nannan Wang

Xidian University

Publications: 13

Xinbo Gao

Xinbo Gao

Chongqing University of Posts and Telecommunications

Publications: 13

Hongxin Hu

Hongxin Hu

University at Buffalo, State University of New York

Publications: 12

Ling Liu

Ling Liu

Georgia Institute of Technology

Publications: 12

Vassilis J. Tsotras

Vassilis J. Tsotras

University of California, Riverside

Publications: 12

Walid G. Aref

Walid G. Aref

Purdue University West Lafayette

Publications: 11

Xiaofeng Meng

Xiaofeng Meng

Renmin University of China

Publications: 10

Anna Cinzia Squicciarini

Anna Cinzia Squicciarini

Pennsylvania State University

Publications: 10

Yu Zheng

Yu Zheng

Jingdong (China)

Publications: 10

Torben Bach Pedersen

Torben Bach Pedersen

Aalborg University

Publications: 10

Ravi Sandhu

Ravi Sandhu

The University of Texas at San Antonio

Publications: 10

Trending Scientists

Nikos Tsagarakis

Nikos Tsagarakis

Italian Institute of Technology

Martin Dresner

Martin Dresner

University of Maryland, College Park

Ashraf A. Kassim

Ashraf A. Kassim

National University of Singapore

T. V. Lakshman

T. V. Lakshman

Nokia (United States)

Frédéric Kuznik

Frédéric Kuznik

Institut National des Sciences Appliquées de Lyon

Simon R. Kelemen

Simon R. Kelemen

ExxonMobil (United States)

Celso Valentim Santilli

Celso Valentim Santilli

Sao Paulo State University

Jiangwen Liu

Jiangwen Liu

South China University of Technology

Alexander R. McBirney

Alexander R. McBirney

University of Oregon

Peter Nielsen

Peter Nielsen

University of Queensland

Mary A. Fristad

Mary A. Fristad

The Ohio State University

Arthur J. Sober

Arthur J. Sober

Harvard University

Elizabeth A. Montgomery

Elizabeth A. Montgomery

Johns Hopkins University

James W. Anderson

James W. Anderson

University of Kentucky

Pascal Nicod

Pascal Nicod

University Hospital of Lausanne

Matthew R. Bate

Matthew R. Bate

University of Exeter

Something went wrong. Please try again later.