Zhuhua Cai
Zhuhua Cai
Graduate Student, Rice University
Verified email at rice.edu - Homepage
Title
Cited by
Cited by
Year
Simulation of database-valued Markov chains using SimSQL
Z Cai, Z Vagena, L Perez, S Arumugam, PJ Haas, C Jermaine
Proceedings of the 2013 ACM SIGMOD International Conference on Management of …, 2013
682013
A comparison of platforms for implementing and running very large scale machine learning algorithms
Z Cai, ZJ Gao, S Luo, LL Perez, Z Vagena, C Jermaine
Proceedings of the 2014 ACM SIGMOD international conference on Management of …, 2014
552014
The latent community model for detecting sybil attacks in social networks
Z Cai, C Jermaine
Proc. NDSS, 2012
502012
Facilitating real-time graph mining
Z Cai, D Logothetis, G Siganos
Proceedings of the fourth international workshop on Cloud data management, 1-8, 2012
482012
Evaluating network security with two-layer attack graphs
A Xie, Z Cai, C Tang, J Hu, Z Chen
2009 Annual Computer Security Applications Conference, 127-136, 2009
322009
Sorcery: Could we make P2P content sharing systems robust to deceivers?
E Zhai, R Chen, Z Cai, L Zhang, EK Luax, H Sun, S Qing, L Tang, Z Cheny
2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 11-20, 2009
302009
Bring order to online social networks
R Chen, EK Lua, Z Cai
2011 Proceedings IEEE INFOCOM, 541-545, 2011
172011
A holistic mechanism against file pollution in peer-to-peer networks
Z Cai, R Chen, J Feng, C Tang, Z Chen, J Hu
Proceedings of the 2009 ACM symposium on Applied Computing, 28-34, 2009
152009
A secure routing and aggregation protocol with low energy cost for sensor networks
N Gui, R Chen, Z Cai, J Hu, Z Chen
2009 International Symposium on Information Engineering and Electronic …, 2009
112009
Social trust and reputation in online social networks
EK Lua, R Chen, Z Cai
2011 IEEE 17th International Conference on Parallel and Distributed Systems …, 2011
102011
SpamResist: making peer-to-peer tagging systems robust to spam
E Zhai, R Chen, EK Lua, L Zhang, H Sun, Z Cai, S Qing, Z Chen
GLOBECOM 2009-2009 IEEE Global Telecommunications Conference, 1-6, 2009
72009
The pairwise gaussian random field for high-dimensional data imputation
Z Cai, C Jermaine, Z Vagena, D Logothetis, LL Perez
2013 IEEE 13th International Conference on Data Mining, 61-70, 2013
52013
SKIP: A secure key issuing scheme for peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
2009 Fifth International Conference on Networking and Services, 296-302, 2009
52009
An adjacency matrixes-based model for network security analysis
A Xie, C Tang, N Gui, Z Cai, J Hu, Z Chen
2010 IEEE International Conference on Communications, 1-5, 2010
42010
Declarative recursive computation on an RDBMS: or, why you should use a database for distributed machine learning
D Jankov, S Luo, B Yuan, Z Cai, J Zou, C Jermaine, ZJ Gao
Proceedings of the VLDB Endowment 12 (7), 822-835, 2019
32019
Very large scale bayesian inference using mcdb
Z Cai, Z Vagena, C Jermaine, P Haas
Big Learn Workshop, Advances in Neural Information Processing Systems, 2011
22011
Very large scale Bayesian machine learning
Z Cai
12014
Green: Towards a pollution-free peer-to-peer content sharing service
R Chen, EK Lua, Z Cai, J Crowcroft, Z Chen
arXiv preprint arXiv:1108.1343, 2011
12011
Using Hive to perform medium-scale data analysis
N Pansare, Z Cai
12010
Securing key issuing in peer-to-peer networks
C Tang, R Chen, Z Cai, A Xie, J Hu, L Tang, Z Chen
Proceedings of the 2009 ACM symposium on Applied Computing, 84-85, 2009
2009
The system can't perform the operation now. Try again later.
Articles 1–20