2019 - ACM Distinguished Member
His primary areas of study are Data mining, Differential privacy, Internet privacy, Information privacy and Context. His studies deal with areas such as Timestamp and Theoretical computer science as well as Data mining. His study looks at the relationship between Differential privacy and fields such as Privacy software, as well as how they intersect with chemical problems.
He works mostly in the field of Internet privacy, limiting it down to concerns involving Peer-to-peer and, occasionally, Variety. His study on Privacy by Design is often connected to Data sharing, Outsourcing and Data aggregator as part of broader study in Information privacy. Context is connected with Credibility and Synthetic data in his research.
His main research concerns Data mining, Differential privacy, Information privacy, Computer security and Scalability. His work on Aggregate as part of general Data mining study is frequently connected to Record linkage, Data collection and Context, therefore bridging the gap between diverse disciplines of science and establishing a new relationship between them. His Differential privacy study also includes fields such as
His Information privacy research is multidisciplinary, incorporating elements of Data science, Secure multi-party computation, Data publishing and Distributed database. Many of his research projects under Computer security are closely connected to Event with Event, tying the diverse disciplines of science together. His Scalability research incorporates themes from Distributed computing, Privacy preserving and Protocol.
Li Xiong focuses on Differential privacy, Artificial intelligence, Data mining, Computer security and Algorithm. His Differential privacy research focuses on subjects like Internet privacy, which are linked to End-to-end principle. His work is dedicated to discovering how Artificial intelligence, Machine learning are connected with Robustness, Generative grammar, Inference and Crowdsourcing and other disciplines.
In most of his Data mining studies, his work intersects topics such as Information privacy. In his work, Adversary is strongly intertwined with Location-based service, which is a subfield of Computer security. His studies examine the connections between Algorithm and genetics, as well as such issues in Skyline, with regards to Pareto optimal, Cluster analysis, Time complexity, Theoretical computer science and Scalability.
Differential privacy, Data mining, Data collection, Computer security and Information privacy are his primary areas of study. As part of his studies on Differential privacy, he frequently links adjacent subjects like Theoretical computer science. The concepts of his Data mining study are interwoven with issues in Database server and Encoding.
His Adversary and Information sensitivity study, which is part of a larger body of work in Computer security, is frequently linked to Sequence and Event, bridging the gap between disciplines. His Information privacy study incorporates themes from Spatial query and Server-side. His Protocol course of study focuses on Skyline and Server, Encryption and Scalability.
This overview was generated by a machine learning system which analysed the scientist’s body of work. If you have any feedback, you can contact us here.
PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities
Li Xiong;Ling Liu.
IEEE Transactions on Knowledge and Data Engineering (2004)
Advances and open problems in federated learning
Peter Kairouz;H. Brendan McMahan;Brendan Avent;Aurélien Bellet.
Foundations and Trends® in Machine Learning (2021)
Advances and Open Problems in Federated Learning
Peter Kairouz;H. Brendan McMahan;Brendan Avent;Aurélien Bellet.
arXiv: Learning (2019)
A reputation-based trust model for peer-to-peer e-commerce communities
Li Xiong;Ling Liu.
congress on evolutionary computation (2003)
A reputation-based trust model for peer-to-peer ecommerce communities.
Li Xiong;Ling Liu.
electronic commerce (2003)
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Mudhakar Srivatsa;Li Xiong;Ling Liu.
the web conference (2005)
Protecting Locations with Differential Privacy under Temporal Correlations
Yonghui Xiao;Li Xiong.
computer and communications security (2015)
Publishing set-valued data via differential privacy
Rui Chen;Noman Mohammed;Benjamin C. M. Fung;Bipin C. Desai.
very large data bases (2011)
Differentially private data release through multidimensional partitioning
Yonghui Xiao;Li Xiong;Chun Yuan.
very large data bases (2010)
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Li Xiong;Ling Liu.
electronic commerce (2003)
If you think any of the details on this page are incorrect, let us know.
We appreciate your kind effort to assist us to improve this page, it would be helpful providing us with as much detail as possible in the text box below:
Emory University
The University of Texas Health Science Center at Houston
Simon Fraser University
Georgia Institute of Technology
University of Southern California
University of California, San Diego
McGill University
Georgia Institute of Technology
University of Science and Technology of China
American University of Beirut
FX Palo Alto Laboratory
University of South Australia
Princeton University
Stony Brook University
University of Liverpool
University of California, Berkeley
Utah State University
Federal University of Rio Grande do Sul
Kiel University
University of Lausanne
University of Amsterdam
University of Florida
Grenoble Alpes University
Tel Aviv University
Tokyo Medical and Dental University
Queen's University Belfast