Benjamin C. M. Fung

According to our database1, Benjamin C. M. Fung authored at least 90 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2019
Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybernetics, 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian & Low-Resource Lang. Inf. Process., 2019

I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer.
CoRR, 2019

ER-AE: Differentially-private Text Generation for Authorship Anonymization.
CoRR, 2019

Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning.
IEEE Access, 2019

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction.
IEEE Access, 2019

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation.
IEEE Access, 2019

Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care.
IEEE Access, 2019

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Medical Concept Embedding with Multiple Ontological Representations.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Learning Phenotypes and Dynamic Patient Representations via RNN Regularized Collective Non-Negative Tensor Factorization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Differentially private multidimensional data publishing.
Knowl. Inf. Syst., 2018

Improving interpretations of topic modeling in microblogs.
JASIST, 2018

Opportunistic mining of top-n high utility patterns.
Inf. Sci., 2018

SafePath: Differentially-private publishing of passenger trajectories in transportation systems.
Comput. Networks, 2018

Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Investigating the relation between lexical smells and change- and fault-proneness: an empirical study.
Software Quality Journal, 2017

Revealing determinant factors for early breast cancer recurrence by decision tree.
Information Systems Frontiers, 2017

2016
Mining High Utility Patterns in One Phase without Generating Candidates.
IEEE Trans. Knowl. Data Eng., 2016

Privacy-preserving data mashup model for trading person-specific information.
Electron. Commer. Res. Appl., 2016

Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Panel: The State of Data: Invited Paper from panelists.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

A Study of Children Facial Recognition for Privacy in Smart TV.
Proceedings of the Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 2016

2015
Anonymizing Social Network Data for Maximal Frequent-Sharing Pattern Mining.
Proceedings of the Recommendation and Search in Social Networks, 2015

A Visualizable Evidence-Driven Approach for Authorship Attribution.
ACM Trans. Inf. Syst. Secur., 2015

Mining known attack patterns from security-related events.
PeerJ Computer Science, 2015

Product customization of tablet computers based on the information of online reviews by customers.
J. Intelligent Manufacturing, 2015

Preface.
Fundam. Inform., 2015

E-mail authorship attribution using customized associative classification.
Digital Investigation, 2015

Scalable code clone search for malware analysis.
Digital Investigation, 2015

Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Parallel Eclat for Opportunistic Mining of Frequent Itemsets.
Proceedings of the Database and Expert Systems Applications, 2015

Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

2014
Correlated network data publication via differential privacy.
VLDB J., 2014

\(m\) -Privacy for Collaborative Data Publishing.
IEEE Trans. Knowl. Data Eng., 2014

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Sec. Comput., 2014

Analyzing topics and authors in chat logs for crime investigation.
Knowl. Inf. Syst., 2014

Quantifying the costs and benefits of privacy-preserving health data publishing.
J. Biomed. Informatics, 2014

Privacy-preserving trajectory stream publishing.
Data Knowl. Eng., 2014

BinClone: Detecting Code Clones in Malware.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Privacy-Preserving Medical Reports Publishing for Cluster Analysis.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Privacy-preserving heterogeneous health data sharing.
JAMIA, 2013

A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013

Privacy-preserving trajectory data publishing by local suppression.
Inf. Sci., 2013

Subject-based semantic document clustering for digital forensic investigations.
Data Knowl. Eng., 2013

Modeling, extraction, and transformation of semantics in computer aided engineering systems.
Adv. Eng. Informatics, 2013

Preserving privacy and frequent sharing patterns for social network data publishing.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Service-Oriented Architecture for High-Dimensional Private Data Mashup.
IEEE Trans. Services Computing, 2012

Mining criminal networks from unstructured text documents.
Digital Investigation, 2012

Privacy Preserving Record Linkage via grams Projections
CoRR, 2012

Mining Criminal Networks from Chat Log.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Differentially private transit data publication: a case study on the montreal transportation system.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Direct Discovery of High Utility Itemsets without Candidate Generation.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Frequent grams based embedding for privacy preserving record linkage.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Anonymity meets game theory: secure data integration with malicious participants.
VLDB J., 2011

Publishing Set-Valued Data via Differential Privacy.
PVLDB, 2011

Differentially Private Trajectory Data Publication
CoRR, 2011

Verification of data pattern for interactive privacy preservation model.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards discovering criminal communities from textual data.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Differentially private data release for data mining.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Service-oriented architecture for sharing private spatial-temporal data.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data.
TKDD, 2010

Mining writeprints from anonymous e-mails for forensic investigation.
Digital Investigation, 2010

Privacy-preserving data publishing: A survey of recent developments.
ACM Comput. Surv., 2010

e-mail authorship verification for forensic investigation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Anonymizing data with quasi-sensitive attribute values.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Hierarchical Document Clustering.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy-preserving data publishing for cluster analysis.
Data Knowl. Eng., 2009

Privacy protection for RFID data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Anonymizing healthcare data: a case study on the blood transfusion service.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Service-Oriented Architecture for Privacy-Preserving Data Mashup.
Proceedings of the IEEE International Conference on Web Services, 2009

Preserving Privacy for Location-Based Services with Continuous Queries.
Proceedings of IEEE International Conference on Communications, 2009

Privacy-preserving data mashup.
Proceedings of the EDBT 2009, 2009

Walking in the crowd: anonymizing trajectory data for pattern analysis.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Anonymizing location-based RFID data.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2009

2008
A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Publishing Sensitive Transactions for Itemset Utility.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

An Efficient Hybrid Hierarchical Document Clustering Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Anonymity for continuous data publishing.
Proceedings of the EDBT 2008, 2008

2007
Privacy Preserving Data Portals.
Proceedings of the Encyclopedia of Portal Technologies and Applications (2 Volumes), 2007

Anonymizing Classification Data for Privacy Preservation.
IEEE Trans. Knowl. Data Eng., 2007

Handicapping attacker's confidence: an alternative to k -anonymization.
Knowl. Inf. Syst., 2007

2006
Document Clustering Method Based on Frequent Co-occurring Words.
Proceedings of the 20st Pacific Asia Conference on Language, Information and Computation, 2006

Anonymizing sequential releases.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

2005
Integrating Private Databases for Data Analysis.
Proceedings of the Intelligence and Security Informatics, 2005

Template-Based Privacy Preservation in Classification Problems.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Top-Down Specialization for Information and Privacy Preservation.
Proceedings of the 21st International Conference on Data Engineering, 2005

2003
Hierarchical Document Clustering using Frequent Itemsets.
Proceedings of the Third SIAM International Conference on Data Mining, 2003


  Loading...