default search action
Wendy Hui Wang
Hui Wang 0013
Person information
- affiliation: Stevens Institute of Technology, Hoboken, NJ, USA
Other persons with the same name
- Hui Wang — disambiguation page
- Hui Wang 0001 — Queen's University Belfast, UK (and 1 more)
- Hui Wang 0002 — Nanchang Institute of Technology, Jiangxi Province Key Laboratory of Water Information Cooperative Sensing and Intelligent Processing / School of Information Engineering, China (and 1 more)
- Hui Wang 0003 — Brown University
- Hui Wang 0004 — Tsinghua University, Department of Electronic Engineering, TNList, Beijing, China
- Hui Wang 0005 — University of Southern California
- Hui Wang 0006 — Pohang University of Science and Technology, Korea
- Hui Wang 0007 — Affymetrix, Inc.
- Hui Wang 0008 — University of Minnesota
- Hui Wang 0009 — National University of Singapore
- Hui Wang 0010 — University of Queensland
- Hui Wang 0011 (aka: Jessie Hui Wang) — Tsinghua University, Network Research Center / TNList, Beijing, China (and 1 more)
- Hui Wang 0012 — Shanghai Jiao Tong University, Institute of Image Processing and Pattern Recognition, China
- Hui Wang 0014 — Rice University, Houston, TX, USA
- Hui Wang 0015 — Henan University of Technology, Zhengzhou, China (and 1 more)
- Hui Wang 0016 — University of Science and Technology Beijing, Department of Applied Mathematics, China
- Hui Wang 0017 — Chinese Academy of Sciences, Institute of Electronics, Department of Space Microwave Remote Sensing System, Beijing, China
- Hui Wang 0018 — Shijiazhuang Tiedao University, School of Information Science and Technology, China (and 1 more)
- Hui Wang 0019 — Zhejiang University, Department of Biosystems Engineering, China
- Hui Wang 0020 — Hangzhou Dianzi University, China (and 1 more)
- Hui Wang 0021 — Shanghai Institute of Technology, School of Computer Science Information and Engineering, China (and 2 more)
- Hui Wang 0022 — Shenzhen Institute of Information Technology, Shenzhen, China (and 2 more)
- Hui Wang 0023 — Stanford University, Department of Electrical Engineering, CA, USA (and 1 more)
- Hui Wang 0024 — Yanshan University, College of Electrical Engineering, Qinhuangdao, China
- Hui Wang 0025 — Tongji University, College of Electronics and Information Engineering, Shanghai, China
- Hui Wang 0026 — Ningbo University, Department of Electrical Engineering and Computer Science, China (and 1 more)
- Hui Wang 0027 — Shanghai Maritime Univerisity, College of Art and Sciences, China
- Hui Wang 0028 — China University of Petroleum (East China), Qingdao, China (and 1 more)
- Hui Wang 0029 — Southwest Jiaotong University, School of Information Science and Technology, Chengdu, China
- Hui Wang 0030 — National University of Defense Technology, College of Systems Engineering, Changsha, China (and 1 more)
- Hui Wang 0031 — Shandong University, MOE Key Laboratory of Power System Intelligent Dispatch and Control, Jinan, China
- Hui Wang 0032 — Southeast University, School of Instrument Science and Engineering, Nanjing, China (and 1 more)
- Hui Wang 0033 — Shenzhen Institute of Information Technology, China (and 1 more)
- Hui Wang 0034 — Air Force Engineering University, Department of Basic Science, Xi'an, China
- Hui Wang 0035 — Florida State University, Tallahassee, FL, USA
- Hui Wang 0036 — Chinese Academy of Sciences, Shanghai Advanced Research Institute, China (and 1 more)
- Hui Wang 0037 — Shanghai Jiao Tong University, Department of Computer Science and Engineering, Lab. of Cryptology and Computer Security, China
- Hui Wang 0038 — Radford University, Department of Information Technology, VA, USA (and 1 more)
- Hui Wang 0039 — University of Dayton, Department of Civil and Environmental Engineering, OH, USA (and 2 more)
- Hui Wang 0040 — Changchun University of Technology, College of Computer Science and Engineering, China (and 1 more)
- Hui Wang 0041 — Tianjin University, School of Precision Instrument and Opto-Electronics Engineering, China
- Hui Wang 0042 — Southwest Jiaotong University, School of Physical Science and Technology, MoE Key Laboratory of Advanced Technologies of Materials, Chengdu, China
- Hui Wang 0043 — China Three Gorges University, College of Computer and Information Technology, Yichang, China
- Hui Wang 0044 — Chinese Academy of Sciences, Aerospace Information Research Institute, Beijing, China
- Hui Wang 0045 — Shanghai Jiao Tong University, School of Software, Digital ART Lab., China
- Hui Wang 0046 — University of Nevada, Medical Physics Program, Las Vegas, NV, USA (and 1 more)
- Hui Wang 0047 — Jilin University, School of Mechanical and Aerospace Engineering, Changchun, China
- Hui Wang 0048 — Chinese Academy of Forestry, Research Institute of Forestry New Technology / Research Institute of Wood Industry, Beijing, China (and 1 more)
- Hui Wang 0049 — Southern University of Science and Technology, Department of Electrical and Electronic Engineering, Shenzhen, China
- Hui Wang 0050 — Chongqing University, College of Computer Science, MoE Key Laboratory of Dependable Service Computing in Cyber Physical Society, China
- Hui Wang 0051 — Chinese Academy of Sciences, Shenzhen Institutes of Advanced Technology, Laboratory of Human-Machine Intelligence-Synergy Systems, China
- Hui Wang 0052 — Jiangxi Transportation Institute, Nanchang, China (and 1 more)
- Hui Wang 0053 — Leiden University, Leiden Institute of Advanced Computer Science, Leiden, Netherlands (and 1 more)
- Hui Wang 0054 — University of Aizu, School of Computer Science and Engineering, Biomedical Information Technology Laboratory, Aizuwakamatsu, Japan
- Hui Wang 0055 — Wuhan University of Technology, School of Mechanical and Electronic Engineering, Wuhan, China
- Hui Wang 0056 — Hunan University of Science and Engineering, College of Economic and Management, Yongzhou, China (and 1 more)
- Hui Wang 0057 — State Grid Corporation Customer Service Center, Nanjing, China
- Hui Wang 0058 — Minzu University of China, School of Information Engineering, Beijing, China
- Hui Wang 0059 — Dalian Maritime University, School of Maritime Economics and Management, Dalian, China
- Hui Wang 0060 — Massachusetts General Hospital & Harvard Medical School, Department of Radiology, Center for Biomedical Imaging, Charlestown, MA, USA (and 1 more)
- Hui Wang 0061 — Zhejiang University of Technology, College of Computer Science and Technology, Hangzhou, China (and 1 more)
- Hui Wang 0062 — Nanjing University of Information Science and Technology, School of Mathematics and Statistics, Nanjing, China (and 2 more)
- Hui Wang 0063 — Southwest Jiaotong University, School of Electrical Engineering, Chengdu, China
- Hui Wang 0064 — Dalian University of Technology, China (and 1 more)
- Hui Wang 0065 — Huazhong Agricultural University, College of Informatics, Hubei Key Laboratory of Agricultural Bioinformatics, Wuhan, China
- Hui Wang 0066 — Institute of Earthquake Science, China Earthquake Administration, Beijing, China
- Hui Wang 0067 — Shanghai Jiao Tong University, Department of Physics, Shanghai, China
- Hui Wang 0068 — York University, Department of Computer Science and Engineering, Toronto, Canada
- Hui Wang 0069 — Central South University, School of Automation, Changsha, China
- Hui Wang 0070 — Communication University of China, School of Information Engineering, Beijing, China
- Hui Wang 0071 — Henan Polytechnic University, School of Computer Science and Technology, School of Software, China
- Hui Wang 0072 — Renmin University, School of Information, China
- Hui Wang 0073 — Pengcheng Laboratory, Shenzhen, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j27]Shiyu Liu, Jinglong Luo, Yehong Zhang, Hui Wang, Yue Yu, Zenglin Xu:
Efficient privacy-preserving Gaussian process via secure multi-party computation. J. Syst. Archit. 151: 103134 (2024) - [j26]Zicong Hong, Xiaoyu Qiu, Jian Lin, Wuhui Chen, Yue Yu, Hui Wang, Song Guo, Wen Gao:
Intelligence-Endogenous Management Platform for Computing and Network Convergence. IEEE Netw. 38(4): 166-173 (2024) - [j25]Jiahang Zhou, Yanyu Chen, Zicong Hong, Wuhui Chen, Yue Yu, Tao Zhang, Hui Wang, Chuanfu Zhang, Zibin Zheng:
Training and Serving System of Foundation Models: A Comprehensive Survey. IEEE Open J. Comput. Soc. 5: 107-119 (2024) - [j24]Xiuling Wang, Wendy Hui Wang:
GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning. Proc. Priv. Enhancing Technol. 2024(3): 165-185 (2024) - [j23]Xiuling Wang, Wendy Hui Wang:
Subgraph Structure Membership Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2024(4): 268-290 (2024) - [c69]Junjie Chen, Jiahao Li, Chen Song, Bin Li, Qingcai Chen, Hongchang Gao, Wendy Hui Wang, Zenglin Xu, Xinghua Shi:
Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks. AAAI 2024: 11338-11345 - [c68]Jinglong Luo, Yehong Zhang, Zhuo Zhang, Jiaqi Zhang, Xin Mu, Hui Wang, Yue Yu, Zenglin Xu:
SecFormer: Fast and Accurate Privacy-Preserving Inference for Transformer Models via SMPC. ACL (Findings) 2024: 13333-13348 - [c67]Da Zhong, Xiuling Wang, Zhichao Xu, Jun Xu, Wendy Hui Wang:
Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution. CIKM 2024: 3433-3442 - [c66]Zhuo Zhang, Jintao Huang, Xiangjing Hu, Jingyuan Zhang, Yating Zhang, Hui Wang, Yue Yu, Qifan Wang, Lizhen Qu, Zenglin Xu:
Revisiting Data Reconstruction Attacks on Real-world Dataset for Federated Natural Language Understanding. LREC/COLING 2024: 14080-14091 - [c65]Shiyu Liu, Wei Shi, Zenglin Xu, Shaogao Lv, Yehong Zhang, Hui Wang:
Meta-Learning via PAC-Bayesian with Data-Dependent Prior: Generalization Bounds from Local Entropy. IJCAI 2024: 4578-4586 - [c64]Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu:
Revisiting Black-box Ownership Verification for Graph Neural Networks. SP 2024: 2478-2496 - [i17]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Xin Mu, Hui Wang, Yue Yu, Zenglin Xu:
SecFormer: Towards Fast and Accurate Privacy-Preserving Inference for Large Language Models. CoRR abs/2401.00793 (2024) - [i16]Jiahang Zhou, Yanyu Chen, Zicong Hong, Wuhui Chen, Yue Yu, Tao Zhang, Hui Wang, Chuanfu Zhang, Zibin Zheng:
Training and Serving System of Foundation Models: A Comprehensive Survey. CoRR abs/2401.02643 (2024) - [i15]Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen, Yang Cao:
Differentially Private Federated Learning: A Systematic Review. CoRR abs/2405.08299 (2024) - 2023
- [j22]Dun Zeng, Siqi Liang, Xiangjing Hu, Hui Wang, Zenglin Xu:
FedLab: A Flexible Federated Learning Framework. J. Mach. Learn. Res. 24: 100:1-100:7 (2023) - [j21]Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2023(4): 149-169 (2023) - [c63]Zhuo Zhang, Xiangjing Hu, Jingyuan Zhang, Yating Zhang, Hui Wang, Lizhen Qu, Zenglin Xu:
FEDLEGAL: The First Real-World Federated Learning Benchmark for Legal NLP. ACL (1) 2023: 3492-3507 - [c62]Xiuling Wang, Wendy Hui Wang:
Link Membership Inference Attacks against Unsupervised Graph Representation Learning. ACSAC 2023: 477-491 - [c61]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. ICDM 2023: 980-985 - [c60]Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang:
Certified Edge Unlearning for Graph Neural Networks. KDD 2023: 2606-2617 - [c59]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Shuang Qin, Hui Wang, Yue Yu, Zenglin Xu:
Practical privacy-preserving Gaussian process regression via secret sharing. UAI 2023: 1315-1325 - [i14]Jinglong Luo, Yehong Zhang, Jiaqi Zhang, Shuang Qin, Hui Wang, Yue Yu, Zenglin Xu:
Practical Privacy-Preserving Gaussian Process Regression via Secret Sharing. CoRR abs/2306.14498 (2023) - [i13]Shiyu Liu, Shaogao Lv, Dun Zeng, Zenglin Xu, Hui Wang, Yue Yu:
Personalized Federated Learning via Amortized Bayesian Meta-Learning. CoRR abs/2307.02222 (2023) - [i12]Zicong Hong, Xiaoyu Qiu, Jian Lin, Wuhui Chen, Yue Yu, Hui Wang, Song Guo, Wen Gao:
Intelligence-Endogenous Management Platform for Computing and Network Convergence. CoRR abs/2308.03450 (2023) - [i11]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. CoRR abs/2310.12350 (2023) - 2022
- [c58]Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. AsiaCCS 2022: 959-974 - [c57]Kun Wu, Jacob Erickson, Wendy Hui Wang, Yue Ning:
Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding. ASONAM 2022: 171-175 - [c56]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CCS 2022: 2871-2884 - [c55]Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang:
Towards Fair and Robust Classification. EuroS&P 2022: 356-376 - [c54]Xiuling Wang, Wendy Hui Wang:
Providing Item-side Individual Fairness for Deep Recommender Systems. FAccT 2022: 117-127 - [c53]Yanying Li, Xiuling Wang, Yue Ning, Hui Wang:
FairLP: Towards Fair Link Prediction on Social Network Graphs. ICWSM 2022: 628-639 - [i10]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CoRR abs/2209.01100 (2022) - 2021
- [j20]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [j19]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
CorrectMR: Authentication of Distributed SQL Execution on MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 897-908 (2021) - [j18]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Trans. Knowl. Data Eng. 33(4): 1601-1618 (2021) - [c52]Junjie Chen, Wendy Hui Wang, Hongchang Gao, Xinghua Shi:
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks. KDD 2021: 127-137 - [c51]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services. ECML/PKDD (2) 2021: 583-598 - [c50]Junjie Chen, Wendy Hui Wang, Xinghua Shi:
Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. PSB 2021 - [c49]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c48]Haipei Sun, Yiding Yang, Yanying Li, Huihui Liu, Xinchao Wang, Wendy Hui Wang:
Automating Fairness Configurations for Machine Learning. WWW (Companion Volume) 2021: 193-201 - [i9]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - [i8]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version). CoRR abs/2107.00495 (2021) - 2020
- [j17]Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 17(2): 222-235 (2020) - [c47]Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. CODASPY 2020: 121-132 - [c46]Yanying Li, Haipei Sun, Wendy Hui Wang:
Towards Fair Truth Discovery from Biased Crowdsourced Answers. KDD 2020: 599-607 - [c45]Yanying Li, Yue Ning, Rong Liu, Ying Wu, Wendy Hui Wang:
Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending. WWW (Companion Volume) 2020: 733-742 - [i7]Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang:
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. CoRR abs/2001.08855 (2020)
2010 – 2019
- 2019
- [c44]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - 2018
- [j16]Boxiang Dong, Wendy Hui Wang:
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model. Data Knowl. Eng. 116: 1-20 (2018) - [j15]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. Proc. VLDB Endow. 12(4): 362-375 (2018) - [c43]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c42]Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, Murat Kantarcioglu:
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. ICDE 2018: 377-388 - [c41]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
AssureMR: Verifiable SQL Execution on MapReduce. ICDE 2018: 1228-1231 - [i6]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i5]Bo Zhang, Boxiang Dong, Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. CoRR abs/1808.08313 (2018) - [i4]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. CoRR abs/1808.09545 (2018) - 2017
- [c40]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [c39]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. DBSec 2017: 311-324 - [c38]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [c37]Boxiang Dong, Wendy Hui Wang:
Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases. ICDE 2017: 721-732 - [c36]Boxiang Dong, Wendy Hui Wang:
EARRING: Efficient Authentication of Outsourced Record Matching. IRI 2017: 225-234 - 2016
- [j14]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm. IEEE Trans. Serv. Comput. 9(1): 18-32 (2016) - [c35]Yijin Li, Wendy Hui Wang:
Similarity Recoverable, Format-Preserving String Encryption. APWeb (2) 2016: 439-443 - [c34]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c33]Anna Monreale, Wendy Hui Wang:
Privacy-Preserving Outsourcing of Data Mining. COMPSAC Workshops 2016: 583-588 - [c32]Boxiang Dong, Wendy Hui Wang:
ARM: Authenticated Approximate Record Matching for Outsourced Databases. IRI 2016: 591-600 - [i3]Boxiang Dong, Wendy Hui Wang:
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. CoRR abs/1603.00893 (2016) - [i2]Boxiang Dong, Hui Wang:
Efficient Authentication of Outsourced String Similarity Search. CoRR abs/1603.02727 (2016) - [i1]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - 2015
- [j13]Wendy Hui Wang, Ruilin Liu:
Hiding outliers into crowd: Privacy-preserving data publishing with outliers. Data Knowl. Eng. 100: 94-115 (2015) - [c31]Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining. SDM 2015: 244-252 - 2014
- [j12]Hongbo Liu, Hui Wang, Yingying Chen, Dayong Jia:
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks. ACM Trans. Sens. Networks 10(3): 49:1-49:37 (2014) - [c30]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
PraDa: Privacy-preserving Data-Deduplication-as-a-Service. CIKM 2014: 1559-1568 - [c29]Ruilin Liu, Guan Wang, Wendy Hui Wang, Flip Korn:
iCoDA: Interactive and exploratory data completeness analysis. ICDE 2014: 1226-1229 - [c28]Ruilin Liu, Wendy Hui Wang, Changhe Yuan:
Result Integrity Verification of Outsourced Bayesian Network Structure Learning. SDM 2014: 713-721 - 2013
- [j11]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, Timos K. Sellis:
Optimizing XML queries: Bitmapped materialized views vs. indexes. Inf. Syst. 38(6): 863-884 (2013) - [j10]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases. IEEE Syst. J. 7(3): 385-395 (2013) - [j9]Juan Li, Hui Wang, Samee Ullah Khan, Qingrui Li, Albert Y. Zomaya:
A Fully Distributed Scheme for Discovery of Semantic Relationships. IEEE Trans. Serv. Comput. 6(4): 457-469 (2013) - [j8]Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu:
Neighborhood prediction based decentralized key management for mobile wireless networks. Wirel. Networks 19(6): 1387-1406 (2013) - [c27]Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Preserving Distributed Movement Data Aggregation. AGILE Conf. 2013: 225-245 - [c26]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. DBSec 2013: 258-265 - [c25]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030 - [c24]Ruilin Liu, Philippos Mordohai, Wendy Hui Wang, Hui Xiong:
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers. SDM 2013: 632-640 - [c23]Francesca Pratesi, Anna Monreale, Hui Wang, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Aware Distributed Mobility Data Analytics. SEBD 2013: 329-342 - 2012
- [j7]Juan Li, Hui Wang, Samee Ullah Khan:
A Semantics-based Approach to Large-Scale Mobile Social Networking. Mob. Networks Appl. 17(2): 192-205 (2012) - [c22]Wendy Hui Wang:
Integrity verification of cloud-hosted data analytics computations. Cloud-I 2012: 5 - [c21]Flip Korn, Ruilin Liu, Wendy Hui Wang:
Understanding Data Completeness in Network Monitoring Systems. ICDM 2012: 359-368 - [c20]Ruilin Liu, Wendy Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
AUDIO: An Integrity Auditing Framework of Outlier-Mining-as-a-Service Systems. ECML/PKDD (2) 2012: 1-18 - [c19]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. SEBD 2012: 233-242 - 2011
- [j6]Wendy Hui Wang, Ruilin Liu:
Privacy-preserving publishing microdata with full functional dependencies. Data Knowl. Eng. 70(3): 249-268 (2011) - [j5]Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Trajectory anonymity in publishing personal mobility data. SIGKDD Explor. 13(1): 30-42 (2011) - [j4]Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks. Wirel. Networks 17(8): 1833-1850 (2011) - [c18]Wendy Hui Wang, Ruilin Liu, Dimitri Theodoratos, Xiaoying Wu:
Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems. SSDBM 2011: 109-128 - [c17]Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala:
Semantics-Enhanced Privacy Recommendation for Social Networking Sites. TrustCom 2011: 226-233 - [p2]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Data Mining from Outsourced Databases. Computers, Privacy and Data Protection 2011: 411-426 - 2010
- [j3]Yingying Chen, Wendy Hui Wang, Xiuyuan Zheng, Jie Yang:
A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [j2]Wendy Hui Wang:
Privacy-Preserving Data Sharing in Cloud Computing. J. Comput. Sci. Technol. 25(3): 401-414 (2010) - [c16]Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao:
Towards publishing recommendation data with predictive anonymization. AsiaCCS 2010: 24-35 - [c15]Angela Bonifati, Wendy Hui Wang, Ruilin Liu:
SPac: a distributed, peer-to-peer, secure and privacy-aware social space. CIKM 2010: 1953-1954 - [c14]Wendy Hui Wang, Ruilin Liu:
Privacy-Preserving Publishing Data with Full Functional Dependencies. DASFAA (2) 2010: 176-183 - [c13]Angela Bonifati, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. DBSec 2010: 113-129 - [c12]Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. DCOSS 2010: 201-215 - [c11]Ruilin Liu, Wendy Hui Wang:
Privacy-preserving data publishing. ICDE Workshops 2010: 305-308 - [c10]Xiuyuan Zheng, Wendy Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu:
A decentralized key management scheme via neighborhood prediction in mobile wireless networks. MASS 2010: 51-60
2000 – 2009
- 2009
- [c9]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang:
Answering XML queries using materialized views revisited. CIKM 2009: 475-484 - [c8]Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced XML Databases. CSE (3) 2009: 207-212 - [c7]Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Anonymizing moving objects: how to hide a MOB in a crowd? EDBT 2009: 72-83 - [c6]Wendy Hui Wang, Ruilin Liu:
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers. EDBT 2009: 624-635 - 2008
- [c5]Wendy Hui Wang:
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss. COMAD 2008: 150-161 - 2007
- [j1]Nicolas Bruno, Wendy Hui Wang:
The Threshold Algorithm: From Middleware Systems to the Relational Engine. IEEE Trans. Knowl. Data Eng. 19(4): 523-537 (2007) - [p1]Wendy Hui Wang, Divesh Srivastava, Laks V. S. Lakshmanan, SungRan Cho, Sihem Amer-Yahia:
Optimizing Tree Pattern Queries over Secure XML Databases. Secure Data Management in Decentralized Systems 2007: 127-165 - 2006
- [c4]