Sen Zhang

ORCID: 0000-0003-3031-3721
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Privacy-Preserving Technologies in Data
  • Privacy, Security, and Data Protection
  • Algorithms and Data Compression
  • Mobile Crowdsensing and Crowdsourcing
  • Network Packet Processing and Optimization
  • Geochemistry and Geologic Mapping
  • Advanced Graph Neural Networks
  • Human Mobility and Location-Based Analysis
  • Natural Language Processing Techniques
  • Geochemistry and Geochronology of Asian Mineral Deposits
  • Stochastic Gradient Optimization Techniques
  • Complex Network Analysis Techniques
  • Geological and Geochemical Analysis
  • Genomics and Phylogenetic Studies
  • Cryptography and Data Security
  • Vehicular Ad Hoc Networks (VANETs)
  • Ethics and Social Impacts of AI
  • Recommender Systems and Techniques
  • Blockchain Technology Applications and Security
  • Geoscience and Mining Technology
  • Internet Traffic Analysis and Secure E-voting
  • Speech and dialogue systems
  • Topic Modeling
  • Speech Recognition and Synthesis
  • DNA and Biological Computing

Hong Kong Polytechnic University
2022-2025

Sun Yat-sen University
2024

Southeast University
2019-2023

Ministry of Education of the People's Republic of China
2021-2022

SUNY Oneonta
2007-2014

Purchase College
2008

We present, in this paper, two efficient algorithms for linear time suffix array construction. These achieve their complexities, using the techniques of divide-and-conquer, and recursion. What distinguish proposed from other construction (SACAs) are variable-length leftmost S-type (LMS) substrings fixed-length d-critical sampled problem reduction, simple sorting these substrings: induced algorithm LMS radix substrings. The very mechanisms render our an elegant design framework, and, turn,...

10.1109/tc.2010.188 article EN IEEE Transactions on Computers 2010-09-29

The objective of privacy-preserving synthetic graph publishing is to safeguard individuals' privacy while retaining the utility original data. Most existing methods focus on neural networks under differential (DP), and yet two fundamental problems in generating graphs remain open. First, current research often encounters high sensitivity due intricate relationships between nodes a graph. Second, DP usually achieved through advanced composition mechanisms that tend converge prematurely when...

10.48550/arxiv.2501.02354 preprint EN arXiv (Cornell University) 2025-01-04

Graph embedding generation techniques aim to learn low-dimensional vectors for each node in a graph and have recently gained increasing research attention. Publishing enables various analysis tasks, such as structural equivalence link prediction. Yet, improper publication opens backdoor malicious attackers, who can infer sensitive information of individuals from the vectors. Existing methods tackle this issue by developing deep learning models with differential privacy (DP). However, they...

10.48550/arxiv.2501.03451 preprint EN arXiv (Cornell University) 2025-01-06

We present a new suffix array construction algorithm that aims to build, in external memory, the for an input string of length n measured magnitude tens Giga characters over constant or integer alphabet. The core this is adapted from framework original internal memory SA-DS samples fixed-size d-critical substrings. This external-memory algorithm, called EM-SA-DS, uses novel cache data structures construct sequential scanning manner with good spatial locality: read written disk sequentially....

10.1145/2518175 article EN ACM transactions on office information systems 2014-01-01

Graph embedding maps a graph into low-dimensional vectors, i.e., matrix, while preserving the structure, solving high computation and space cost for analysis. Matrix factorization (MF) is an effective means to achieve since maintaining utility of structure. The personalized structure features implied in matrix can identify individual, which potentially breaches individual sensitive information original graph. Currently, protecting privacy without compromising key sharing matrix. Differential...

10.1109/access.2019.2927365 article EN cc-by IEEE Access 2019-01-01

The goal of privacy-preserving social graph publishing is to protect individual privacy while preserving data utility. Community structure, which an important global pattern nodes, a crucial utility as it serves fundamental operations for many analysis tasks. Yet, most existing methods with differential (DP) commonly fall in edge-DP sacrifice security exchange Moreover, they reconstruct graphs from the local feature-extraction resulting poor community preservation. Motivated by this, we...

10.1109/icdm50108.2020.00184 article EN 2021 IEEE International Conference on Data Mining (ICDM) 2020-11-01

Let S be an n-character string terminated with unique smallest sentinel, its suffix array SA(S) is of pointers for all the suffixes in sorted lexicographically ascending order. Specially, Burrows-Wheeler transform building efficient compression solutions can quickly computed by fast sorting based on construction algorithms (SACAs). The existing well-known practical linear SACAs are those two contemporarily reported 2003 Karkkainen and Sanders (KS) (J. Karkkaiinen P. Sanders, 2003) Ko Aluru...

10.1109/dcc.2008.61 article EN DCC 2008-03-01

The goal of privacy-preserving social graph publishing is to protect individual privacy while preserving utility. Node nearest neighbor structure a crucial utility as it the basis for many analysis tasks. Most existing methods with differential focus on degree distribution yet neglect maintenance connections between nodes' neighbors. Moreover, they require massive noise added mask change single edge, thereby rendering poor structure. As result, tough preserve high under privacy. To tackle...

10.1109/access.2023.3297437 article EN cc-by-nc-nd IEEE Access 2023-01-01

Many real-world networks can be represented as weighted graphs, where weights represent the closeness or importance of relationships between node pairs. Sharing these graphs is beneficial for many applications while potentially leading to privacy breaches. Variants deep learning approaches have been developed synthetic graph publishing, but privacy-preserving (especially graph) publishing has not fully addressed. To bridge this gap, we propose WDP-GAN, a generative adversarial network (GAN)...

10.1109/tnsm.2023.3280916 article EN IEEE Transactions on Network and Service Management 2023-05-30

Supplying data augmentation to conversational question answering (CQA) can effectively improve model performance. However, there is less improvement from single-turn datasets in CQA due the distribution gap between and multi-turn datasets. On other hand, while numerous are available, we have not utilized them effectively. To solve this problem, propose a novel method convert The proposed consists of three parts, namely, QA pair Generator, Reassembler, Rewriter. Given sample consisting...

10.48550/arxiv.2312.16511 preprint EN other-oa arXiv (Cornell University) 2023-01-01

10.1007/s11390-021-1270-7 article EN Journal of Computer Science and Technology 2023-11-30

The goal of privacy-preserving social graph publishing is to protect individual privacy while preserving data utility. Community structure, which an important global pattern nodes, a crucial utility as it serves fundamental operations for many analysis tasks. Yet, most existing methods with differential (DP) commonly fall in edge-DP sacrifice security exchange Moreover, they reconstruct graphs from the local feature-extraction resulting poor community preservation. Motivated by this, we...

10.48550/arxiv.2101.01450 preprint EN other-oa arXiv (Cornell University) 2021-01-01
Coming Soon ...