default search action
Wendy Hui Wang
Person information
- affiliation: Stevens Institute of Technology, Hoboken, NJ, USA
Other persons with the same name
- Hui Wang — disambiguation page
- Hui Wang 0001 — Queen's University Belfast, UK (and 1 more)
- Hui Wang 0002 — Nanchang Institute of Technology, Jiangxi Province Key Laboratory of Water Information Cooperative Sensing and Intelligent Processing / School of Information Engineering, China (and 1 more)
- Hui Wang 0003 — Brown University
- Hui Wang 0004 — Tsinghua University, Department of Electronic Engineering, TNList, Beijing, China
- Hui Wang 0005 — University of Southern California
- Hui Wang 0006 — Pohang University of Science and Technology, Korea
- Hui Wang 0007 — Affymetrix, Inc.
- Hui Wang 0008 — University of Minnesota
- Hui Wang 0009 — National University of Singapore
- Hui Wang 0010 — University of Queensland
- Hui Wang 0011 (aka: Jessie Hui Wang) — Tsinghua University, Network Research Center / TNList, Beijing, China (and 1 more)
- Hui Wang 0012 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China
- Hui Wang 0014 — Rice University, Houston, TX, USA
- Hui Wang 0015 — Henan University of Technology, Zhengzhou, China (and 1 more)
- Hui Wang 0016 — University of Science and Technology Beijing, Department of Applied Mathematics, China
- Hui Wang 0017 — Chinese Academy of Sciences, Institute of Electronics, Department of Space Microwave Remote Sensing System, Beijing, China
- Hui Wang 0018 — Shijiazhuang Tiedao University, School of Information Science and Technology, China (and 1 more)
- Hui Wang 0019 — Zhejiang University, Department of Biosystems Engineering, China
- Hui Wang 0020 — Hangzhou Dianzi University, China (and 1 more)
- Hui Wang 0021 — Shanghai Institute of Technology, School of Computer Science Information and Engineering, China (and 2 more)
- Hui Wang 0022 — Shenzhen Institute of Information Technology, Shenzhen, China (and 2 more)
- Hui Wang 0023 — Stanford University, Department of Electrical Engineering, CA, USA (and 1 more)
- Hui Wang 0024 — Yanshan University, College of Electrical Engineering, Qinhuangdao, China
- Hui Wang 0025 — Tongji University, College of Electronics and Information Engineering, Shanghai, China
- Hui Wang 0026 — Ningbo University, Department of Electrical Engineering and Computer Science, China (and 1 more)
- Hui Wang 0027 — Shanghai Maritime Univerisity, College of Art and Sciences, China
- Hui Wang 0028 — China University of Petroleum (East China), Qingdao, China (and 1 more)
- Hui Wang 0029 — Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- Hui Wang 0030 — National University of Defense Technology, College of Systems Engineering, Changsha, China (and 1 more)
- Hui Wang 0031 — Shandong University, MOE Key Laboratory of Power System Intelligent Dispatch and Control, Jinan, China
- Hui Wang 0032 — Southeast University, School of Instrument Science and Engineering, Nanjing, China (and 1 more)
- Hui Wang 0033 — Shenzhen Institute of Information Technology, China (and 1 more)
- Hui Wang 0034 — Air Force Engineering University, Department of Basic Science, Xi'an, China
- Hui Wang 0035 — Florida State University, Tallahassee, FL, USA
- Hui Wang 0036 — Chinese Academy of Sciences, Shanghai Advanced Research Institute, China (and 1 more)
- Hui Wang 0037 — Shanghai Jiao Tong University, Department of Computer Science and Engineering, Lab. of Cryptology and Computer Security, China
- Hui Wang 0038 — Radford University, Department of Information Technology, VA, USA (and 1 more)
- Hui Wang 0039 — University of Dayton, Department of Civil and Environmental Engineering, OH, USA (and 2 more)
- Hui Wang 0040 — Changchun University of Technology, College of Computer Science and Engineering, China (and 1 more)
- Hui Wang 0041 — Tianjin University, School of Precision Instrument and Opto-Electronics Engineering, China
- Hui Wang 0042 — Southwest Jiaotong University, School of Physical Science and Technology, MoE Key Laboratory of Advanced Technologies of Materials, Chengdu, China
- Hui Wang 0043 — China Three Gorges University, College of Computer and Information Technology, Yichang, China
- Hui Wang 0044 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China
- Hui Wang 0045 — Shanghai Jiao Tong University, School of Software, Digital ART Lab., China
- Hui Wang 0046 — University of Nevada, Medical Physics Program, Las Vegas, NV, USA (and 1 more)
- Hui Wang 0047 — Jilin University, School of Mechanical and Aerospace Engineering, Changchun, China
- Hui Wang 0048 — Chinese Academy of Forestry, Research Institute of Forestry New Technology / Research Institute of Wood Industry, Beijing, China (and 1 more)
- Hui Wang 0049 — Southern University of Science and Technology, Department of Electrical and Electronic Engineering, Shenzhen, China
- Hui Wang 0050 — Chongqing University, College of Computer Science, MoE Key Laboratory of Dependable Service Computing in Cyber Physical Society, China
- Hui Wang 0051 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Laboratory of Human-Machine Intelligence-Synergy Systems, China
- Hui Wang 0052 — Jiangxi Transportation Institute, Nanchang, China (and 1 more)
- Hui Wang 0053 — Leiden University, Leiden Institute of Advanced Computer Science, Leiden, Netherlands (and 1 more)
- Hui Wang 0054 — University of Aizu, School of Computer Science and Engineering, Biomedical Information Technology Laboratory, Aizuwakamatsu, Japan
- Hui Wang 0055 — Wuhan University of Technology, School of Mechanical and Electronic Engineering, Wuhan, China
- Hui Wang 0056 — Hunan University of Science and Engineering, College of Economic and Management, Yongzhou, China (and 1 more)
- Hui Wang 0057 — State Grid Corporation Customer Service Center, Nanjing, China
- Hui Wang 0058 — Minzu University of China, School of Information Engineering, Beijing, China
- Hui Wang 0059 — Dalian Maritime University, School of Maritime Economics and Management, Dalian, China
- Hui Wang 0060 — Massachusetts General Hospital & Harvard Medical School, Department of Radiology, Center for Biomedical Imaging, Charlestown, MA, USA (and 1 more)
- Hui Wang 0061 — Zhejiang University of Technology, College of Computer Science and Technology, Hangzhou, China (and 1 more)
- Hui Wang 0062 — Nanjing University of Information Science and Technology, School of Mathematics and Statistics, Nanjing, China (and 2 more)
- Hui Wang 0063 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China
- Hui Wang 0064 — Dalian University of Technology, China (and 1 more)
- Hui Wang 0065 — Huazhong Agricultural University, College of Informatics, Hubei Key Laboratory of Agricultural Bioinformatics, Wuhan, China
- Hui Wang 0066 — Institute of Earthquake Science, China Earthquake Administration, Beijing, China
- Hui Wang 0067 — Shanghai Jiao Tong University, Department of Physics, Shanghai, China
- Hui Wang 0068 — York University, Department of Computer Science and Engineering, Toronto, Canada
- Hui Wang 0069 — Central South University, School of Automation, Changsha, China
- Hui Wang 0070 — Communication University of China, School of Information Engineering, Beijing, China
- Hui Wang 0071 — Henan Polytechnic University, School of Computer Science and Technology, School of Software, China
- Hui Wang 0072 — Renmin University, School of Information, China
- Hui Wang 0073 — Pengcheng Laboratory, Shenzhen, China (and 1 more)
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j27]Shiyu Liu, Jinglong Luo, Yehong Zhang, Hui Wang, Yue Yu, Zenglin Xu:
Efficient privacy-preserving Gaussian process via secure multi-party computation. J. Syst. Archit. 151: 103134 (2024) - [j26]Zicong Hong, Xiaoyu Qiu, Jian Lin, Wuhui Chen, Yue Yu, Hui Wang, Song Guo, Wen Gao:
Intelligence-Endogenous Management Platform for Computing and Network Convergence. IEEE Netw. 38(4): 166-173 (2024) - [j25]Jiahang Zhou, Yanyu Chen, Zicong Hong, Wuhui Chen, Yue Yu, Tao Zhang, Hui Wang, Chuanfu Zhang, Zibin Zheng:
Training and Serving System of Foundation Models: A Comprehensive Survey. IEEE Open J. Comput. Soc. 5: 107-119 (2024) - [j24]Xiuling Wang, Wendy Hui Wang:
GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning. Proc. Priv. Enhancing Technol. 2024(3): 165-185 (2024) - [j23]Xiuling Wang, Wendy Hui Wang:
Subgraph Structure Membership Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2024(4): 268-290 (2024) - [c69]Junjie Chen, Jiahao Li, Chen Song, Bin Li, Qingcai Chen, Hongchang Gao, Wendy Hui Wang, Zenglin Xu, Xinghua Shi:
Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks. AAAI 2024: 11338-11345 - [c68]Jinglong Luo, Yehong Zhang, Zhuo Zhang, Jiaqi Zhang, Xin Mu, Hui Wang, Yue Yu, Zenglin Xu:
SecFormer: Fast and Accurate Privacy-Preserving Inference for Transformer Models via SMPC. ACL (Findings) 2024: 13333-13348 - [c67]Da Zhong, Xiuling Wang, Zhichao Xu, Jun Xu, Wendy Hui Wang:
Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution. CIKM 2024: 3433-3442 - [c66]Zhuo Zhang, Jintao Huang, Xiangjing Hu, Jingyuan Zhang, Yating Zhang, Hui Wang, Yue Yu, Qifan Wang, Lizhen Qu, Zenglin Xu:
Revisiting Data Reconstruction Attacks on Real-world Dataset for Federated Natural Language Understanding. LREC/COLING 2024: 14080-14091 - [c65]Shiyu Liu, Wei Shi, Zenglin Xu, Shaogao Lv, Yehong Zhang, Hui Wang:
Meta-Learning via PAC-Bayesian with Data-Dependent Prior: Generalization Bounds from Local Entropy. IJCAI 2024: 4578-4586 - [c64]Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu:
Revisiting Black-box Ownership Verification for Graph Neural Networks. SP 2024: 2478-2496 - [i17]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Xin Mu, Hui Wang, Yue Yu, Zenglin Xu:
SecFormer: Towards Fast and Accurate Privacy-Preserving Inference for Large Language Models. CoRR abs/2401.00793 (2024) - [i16]Jiahang Zhou, Yanyu Chen, Zicong Hong, Wuhui Chen, Yue Yu, Tao Zhang, Hui Wang, Chuanfu Zhang, Zibin Zheng:
Training and Serving System of Foundation Models: A Comprehensive Survey. CoRR abs/2401.02643 (2024) - [i15]Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao:
Differentially Private Federated Learning: A Systematic Review. CoRR abs/2405.08299 (2024) - 2023
- [j22]Dun Zeng, Siqi Liang, Xiangjing Hu, Hui Wang, Zenglin Xu:
FedLab: A Flexible Federated Learning Framework. J. Mach. Learn. Res. 24: 100:1-100:7 (2023) - [j21]Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2023(4): 149-169 (2023) - [c63]Zhuo Zhang, Xiangjing Hu, Jingyuan Zhang, Yating Zhang, Hui Wang, Lizhen Qu, Zenglin Xu:
FEDLEGAL: The First Real-World Federated Learning Benchmark for Legal NLP. ACL (1) 2023: 3492-3507 - [c62]Xiuling Wang, Wendy Hui Wang:
Link Membership Inference Attacks against Unsupervised Graph Representation Learning. ACSAC 2023: 477-491 - [c61]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. ICDM 2023: 980-985 - [c60]Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang:
Certified Edge Unlearning for Graph Neural Networks. KDD 2023: 2606-2617 - [c59]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Shuang Qin, Hui Wang, Yue Yu, Zenglin Xu:
Practical privacy-preserving Gaussian process regression via secret sharing. UAI 2023: 1315-1325 - [i14]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Shuang Qin, Hui Wang, Yue Yu, Zenglin Xu:
Practical Privacy-Preserving Gaussian Process Regression via Secret Sharing. CoRR abs/2306.14498 (2023) - [i13]Shiyu Liu, Shaogao Lv, Dun Zeng, Zenglin Xu, Hui Wang, Yue Yu:
Personalized Federated Learning via Amortized Bayesian Meta-Learning. CoRR abs/2307.02222 (2023) - [i12]Zicong Hong, Xiaoyu Qiu, Jian Lin, Wuhui Chen, Yue Yu, Hui Wang, Song Guo, Wen Gao:
Intelligence-Endogenous Management Platform for Computing and Network Convergence. CoRR abs/2308.03450 (2023) - [i11]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. CoRR abs/2310.12350 (2023) - 2022
- [c58]Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. AsiaCCS 2022: 959-974 - [c57]Kun Wu, Jacob Erickson, Wendy Hui Wang, Yue Ning:
Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding. ASONAM 2022: 171-175 - [c56]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CCS 2022: 2871-2884 - [c55]Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang:
Towards Fair and Robust Classification. EuroS&P 2022: 356-376 - [c54]Xiuling Wang, Wendy Hui Wang:
Providing Item-side Individual Fairness for Deep Recommender Systems. FAccT 2022: 117-127 - [c53]Yanying Li, Xiuling Wang, Yue Ning, Hui Wang:
FairLP: Towards Fair Link Prediction on Social Network Graphs. ICWSM 2022: 628-639 - [i10]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CoRR abs/2209.01100 (2022) - 2021
- [j20]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [j19]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
CorrectMR: Authentication of Distributed SQL Execution on MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 897-908 (2021) - [j18]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Trans. Knowl. Data Eng. 33(4): 1601-1618 (2021) - [c52]Junjie Chen, Wendy Hui Wang, Hongchang Gao, Xinghua Shi:
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks. KDD 2021: 127-137 - [c51]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services. ECML/PKDD (2) 2021: 583-598 - [c50]Junjie Chen, Wendy Hui Wang, Xinghua Shi:
Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. PSB 2021 - [c49]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c48]Haipei Sun, Yiding Yang, Yanying Li, Huihui Liu, Xinchao Wang, Wendy Hui Wang:
Automating Fairness Configurations for Machine Learning. WWW (Companion Volume) 2021: 193-201 - [i9]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - [i8]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version). CoRR abs/2107.00495 (2021) - 2020
- [j17]Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 17(2): 222-235 (2020) - [c47]Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. CODASPY 2020: 121-132 - [c46]Yanying Li, Haipei Sun, Wendy Hui Wang:
Towards Fair Truth Discovery from Biased Crowdsourced Answers. KDD 2020: 599-607 - [c45]Yanying Li, Yue Ning, Rong Liu, Ying Wu, Wendy Hui Wang:
Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending. WWW (Companion Volume) 2020: 733-742 - [i7]Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang:
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. CoRR abs/2001.08855 (2020)
2010 – 2019
- 2019
- [c44]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - 2018
- [j16]Boxiang Dong, Wendy Hui Wang:
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model. Data Knowl. Eng. 116: 1-20 (2018) - [j15]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. Proc. VLDB Endow. 12(4): 362-375 (2018) - [c43]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c42]Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, Murat Kantarcioglu:
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. ICDE 2018: 377-388 - [c41]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
AssureMR: Verifiable SQL Execution on MapReduce. ICDE 2018: 1228-1231 - [i6]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i5]Bo Zhang, Boxiang Dong, Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. CoRR abs/1808.08313 (2018) - [i4]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. CoRR abs/1808.09545 (2018) - 2017
- [c40]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [c39]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. DBSec 2017: 311-324 - [c38]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [c37]Boxiang Dong, Wendy Hui Wang:
Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases. ICDE 2017: 721-732 - [c36]Boxiang Dong, Wendy Hui Wang:
EARRING: Efficient Authentication of Outsourced Record Matching. IRI 2017: 225-234 - 2016
- [j14]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm. IEEE Trans. Serv. Comput. 9(1): 18-32 (2016) - [c35]Yijin Li, Wendy Hui Wang:
Similarity Recoverable, Format-Preserving String Encryption. APWeb (2) 2016: 439-443 - [c34]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c33]Anna Monreale, Wendy Hui Wang:
Privacy-Preserving Outsourcing of Data Mining. COMPSAC Workshops 2016: 583-588 - [c32]Boxiang Dong, Wendy Hui Wang:
ARM: Authenticated Approximate Record Matching for Outsourced Databases. IRI 2016: 591-600 - [i3]Boxiang Dong, Wendy Hui Wang:
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. CoRR abs/1603.00893 (2016) - [i2]Boxiang Dong, Hui Wang:
Efficient Authentication of Outsourced String Similarity Search. CoRR abs/1603.02727 (2016) - [i1]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - 2015
- [j13]Wendy Hui Wang, Ruilin Liu:
Hiding outliers into crowd: Privacy-preserving data publishing with outliers. Data Knowl. Eng. 100: 94-115 (2015) - [c31]Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining. SDM 2015: 244-252 - 2014
- [j12]Hongbo Liu, Hui Wang, Yingying Chen, Dayong Jia:
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks. ACM Trans. Sens. Networks 10(3): 49:1-49:37 (2014) - [c30]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
PraDa: Privacy-preserving Data-Deduplication-as-a-Service. CIKM 2014: 1559-1568 - [c29]Ruilin Liu, Guan Wang, Wendy Hui Wang, Flip Korn:
iCoDA: Interactive and exploratory data completeness analysis. ICDE 2014: 1226-1229 - [c28]Ruilin Liu, Wendy Hui Wang, Changhe Yuan:
Result Integrity Verification of Outsourced Bayesian Network Structure Learning. SDM 2014: 713-721 - 2013
- [j11]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, Timos K. Sellis:
Optimizing XML queries: Bitmapped materialized views vs. indexes. Inf. Syst. 38(6): 863-884 (2013) - [j10]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases. IEEE Syst. J. 7(3): 385-395 (2013) - [j9]Juan Li, Hui Wang, Samee Ullah Khan, Qingrui Li, Albert Y. Zomaya:
A Fully Distributed Scheme for Discovery of Semantic Relationships. IEEE Trans. Serv. Comput. 6(4): 457-469 (2013) - [j8]Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu:
Neighborhood prediction based decentralized key management for mobile wireless networks. Wirel. Networks 19(6): 1387-1406 (2013) - [c27]Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Preserving Distributed Movement Data Aggregation. AGILE Conf. 2013: 225-245 - [c26]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. DBSec 2013: 258-265 - [c25]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030 - [c24]Ruilin Liu, Philippos Mordohai, Wendy Hui Wang, Hui Xiong:
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers. SDM 2013: 632-640 - [c23]Francesca Pratesi, Anna Monreale, Hui Wang, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Aware Distributed Mobility Data Analytics. SEBD 2013: 329-342 - 2012
- [j7]Juan Li, Hui Wang, Samee Ullah Khan:
A Semantics-based Approach to Large-Scale Mobile Social Networking. Mob. Networks Appl. 17(2): 192-205 (2012) - [c22]Wendy Hui Wang:
Integrity verification of cloud-hosted data analytics computations. Cloud-I 2012: 5 - [c21]Flip Korn, Ruilin Liu, Wendy Hui Wang:
Understanding Data Completeness in Network Monitoring Systems. ICDM 2012: 359-368 - [c20]Ruilin Liu, Wendy Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
AUDIO: An Integrity Auditing Framework of Outlier-Mining-as-a-Service Systems. ECML/PKDD (2) 2012: 1-18 - [c19]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. SEBD 2012: 233-242 - 2011
- [j6]Wendy Hui Wang, Ruilin Liu:
Privacy-preserving publishing microdata with full functional dependencies. Data Knowl. Eng. 70(3): 249-268 (2011) - [j5]Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Trajectory anonymity in publishing personal mobility data. SIGKDD Explor. 13(1): 30-42 (2011) - [j4]Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks. Wirel. Networks 17(8): 1833-1850 (2011) - [c18]Wendy Hui Wang, Ruilin Liu, Dimitri Theodoratos, Xiaoying Wu:
Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems. SSDBM 2011: 109-128 - [c17]Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala:
Semantics-Enhanced Privacy Recommendation for Social Networking Sites. TrustCom 2011: 226-233 - [p2]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Data Mining from Outsourced Databases. Computers, Privacy and Data Protection 2011: 411-426 - 2010
- [j3]Yingying Chen, Wendy Hui Wang, Xiuyuan Zheng, Jie Yang:
A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j2]Wendy Hui Wang:
Privacy-Preserving Data Sharing in Cloud Computing. J. Comput. Sci. Technol. 25(3): 401-414 (2010) - [c16]Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao:
Towards publishing recommendation data with predictive anonymization. AsiaCCS 2010: 24-35 - [c15]Angela Bonifati, Wendy Hui Wang, Ruilin Liu:
SPac: a distributed, peer-to-peer, secure and privacy-aware social space. CIKM 2010: 1953-1954 - [c14]Wendy Hui Wang, Ruilin Liu:
Privacy-Preserving Publishing Data with Full Functional Dependencies. DASFAA (2) 2010: 176-183 - [c13]Angela Bonifati, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. DBSec 2010: 113-129 - [c12]Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. DCOSS 2010: 201-215 - [c11]Ruilin Liu, Wendy Hui Wang:
Privacy-preserving data publishing. ICDE Workshops 2010: 305-308 - [c10]Xiuyuan Zheng, Wendy Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu:
A decentralized key management scheme via neighborhood prediction in mobile wireless networks. MASS 2010: 51-60
2000 – 2009
- 2009
- [c9]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang:
Answering XML queries using materialized views revisited. CIKM 2009: 475-484 - [c8]Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced XML Databases. CSE (3) 2009: 207-212 - [c7]Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Anonymizing moving objects: how to hide a MOB in a crowd? EDBT 2009: 72-83 - [c6]Wendy Hui Wang, Ruilin Liu:
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers. EDBT 2009: 624-635 - 2008
- [c5]Wendy Hui Wang:
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss. COMAD 2008: 150-161 - 2007
- [j1]Nicolas Bruno, Wendy Hui Wang:
The Threshold Algorithm: From Middleware Systems to the Relational Engine. IEEE Trans. Knowl. Data Eng. 19(4): 523-537 (2007) - [p1]Wendy Hui Wang, Divesh Srivastava, Laks V. S. Lakshmanan, SungRan Cho, Sihem Amer-Yahia:
Optimizing Tree Pattern Queries over Secure XML Databases. Secure Data Management in Decentralized Systems 2007: 127-165 - 2006
- [c4]Wendy Hui Wang, Laks V. S. Lakshmanan:
Efficient Secure Query Evaluation over Encrypted XML Databases. VLDB 2006: 127-138 - [c3]Laks V. S. Lakshmanan, Wendy Hui Wang, Zheng (Jessica) Zhao:
Answering Tree Pattern Queries Using Views. VLDB 2006: 571-582 - [c2]Wendy Hui Wang, Laks V. S. Lakshmanan:
Probabilistic privacy analysis of published views. WPES 2006: 81-84 - 2004
- [c1]Laks V. S. Lakshmanan, Ganesh Ramesh, Wendy Hui Wang, Zheng (Jessica) Zhao:
On Testing Satisfiability of Tree Pattern Queries. VLDB 2004: 120-131
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 20:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint