Simulation of database-valued Markov chains using SimSQL Z Cai, Z Vagena, L Perez, S Arumugam, PJ Haas, C Jermaine Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013 | 116 | 2013 |
Facilitating real-time graph mining Z Cai, D Logothetis, G Siganos Proceedings of the fourth international workshop on Cloud data management, 1-8, 2012 | 79 | 2012 |
A comparison of platforms for implementing and running very large scale machine learning algorithms Z Cai, ZJ Gao, S Luo, LL Perez, Z Vagena, C Jermaine Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014 | 75 | 2014 |
Declarative recursive computation on an rdbms, or, why you should use a database for distributed machine learning D Jankov, S Luo, B Yuan, Z Cai, J Zou, C Jermaine, ZJ Gao arXiv preprint arXiv:1904.11121, 2019 | 66 | 2019 |
The latent community model for detecting sybil attacks in social networks Z Cai, C Jermaine Proc. NDSS, 2012 | 66 | 2012 |
Evaluating network security with two-layer attack graphs A Xie, Z Cai, C Tang, J Hu, Z Chen 2009 Annual Computer Security Applications Conference, 127-136, 2009 | 46 | 2009 |
Sorcery: Could we make P2P content sharing systems robust to deceivers? E Zhai, R Chen, Z Cai, L Zhang, EK Lua, H Sun, S Qing, L Tang, Z Cheny 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009 | 31 | 2009 |
Declarative recursive computation on an RDBMS: or, why you should use a database for distributed machine learning D Jankov, S Luo, B Yuan, Z Cai, J Zou, C Jermaine, ZJ Gao ACM SIGMOD Record 49 (1), 43-50, 2020 | 22 | 2020 |
Bring order to online social networks R Chen, EK Lua, Z Cai 2011 Proceedings IEEE infocom, 541-545, 2011 | 16 | 2011 |
A secure routing and aggregation protocol with low energy cost for sensor networks N Gui, R Chen, Z Cai, J Hu, Z Chen 2009 International Symposium on Information Engineering and Electronic …, 2009 | 15 | 2009 |
A holistic mechanism against file pollution in peer-to-peer networks Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009 | 15 | 2009 |
Social trust and reputation in online social networks EK Lua, R Chen, Z Cai 2011 IEEE 17th International conference on parallel and distributed systems …, 2011 | 12 | 2011 |
The pairwise Gaussian random field for high-dimensional data imputation Z Cai, C Jermaine, Z Vagena, D Logothetis, LL Perez 2013 IEEE 13th International Conference on Data Mining, 61-70, 2013 | 9 | 2013 |
SpamResist: making peer-to-peer tagging systems robust to spam E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009 | 7 | 2009 |
An adjacency matrixes-based model for network security analysis A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen 2010 IEEE International Conference on Communications, 1-5, 2010 | 5 | 2010 |
SKIP: A secure key issuing scheme for peer-to-peer networks C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen 2009 Fifth International Conference on Networking and Services, 296-302, 2009 | 5 | 2009 |
Very large scale bayesian inference using mcdb Z Cai, Z Vagena, C Jermaine, P Haas Big Learn Workshop, Advances in Neural Information Processing Systems, 2011 | 2 | 2011 |
Using Hive to perform medium-scale data analysis N Pansare, Z Cai | 2 | 2010 |
Very large scale Bayesian machine learning Z Cai Rice University, 2014 | 1 | 2014 |
Green: Towards a pollution-free peer-to-peer content sharing service R Chen, EK Lua, Z Cai, J Crowcroft, Z Chen arXiv preprint arXiv:1108.1343, 2011 | 1 | 2011 |