Guang Xiang

According to our database1, Guang Xiang authored at least 22 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2014
A secure <i>K</i>-automorphism privacy preserving approach with high data utility in social networks.
Secur. Commun. Networks, 2014

2013
Extracting Events with Informal Temporal References in Personal Histories in Online Communities.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

Microblogs as Parallel Corpora.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

Sparse Multi-Task Learning for Detecting Influential Nodes in an Implicit Diffusion Network.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

2012
Sparse Linear Influence Model for Hot User Selection on Mining a Social Network.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Leveraging high-level and low-level features for multimedia event detection.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Improving Relative-Entropy Pruning using Statistical Significance.
Proceedings of the COLING 2012, 2012

Detecting offensive tweets via topical feature discovery over a large scale twitter corpus.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

2011
CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011

Smartening the crowds: computational techniques for improving human verification to fight phishing scams.
Proceedings of the Symposium On Usable Privacy and Security, 2011

2010
Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.
Proceedings of the Computer Security, 2010

2009
A hybrid phish detection approach by identity discovery and keywords retrieval.
Proceedings of the 18th International Conference on World Wide Web, 2009

2007
Summarizing BBC Rushes the Informedia Way.
Proceedings of the TRECVID 2007 workshop participants notebook papers, 2007

Clever clustering vs. simple speed-up for summarizing rushes.
Proceedings of the 1st ACM Workshop on Video Summarization, 2007

2005
Correlating Alerts with a Data Mining Based Approach.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

2004
An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

Credential Trustworthiness-Based Trust Evaluation in Grid.
Proceedings of the Grid and Cooperative Computing, 2004

Reputation-Aware Contract-Supervised Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004


  Loading...