Guang Xiang

According to our database1, Guang Xiang authored at least 22 papers between 2004 and 2014.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.



In proceedings 
PhD thesis 




A secure K-automorphism privacy preserving approach with high data utility in social networks.
Security and Communication Networks, 2014

Extracting Events with Informal Temporal References in Personal Histories in Online Communities.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

Microblogs as Parallel Corpora.
Proceedings of the 51st Annual Meeting of the Association for Computational Linguistics, 2013

Sparse Multi-Task Learning for Detecting Influential Nodes in an Implicit Diffusion Network.
Proceedings of the Twenty-Seventh AAAI Conference on Artificial Intelligence, 2013

Sparse Linear Influence Model for Hot User Selection on Mining a Social Network.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

Leveraging high-level and low-level features for multimedia event detection.
Proceedings of the 20th ACM Multimedia Conference, MM '12, Nara, Japan, October 29, 2012

A Supervised Approach to Predict Company Acquisition with Factual and Topic Features Using Profiles and News Articles on TechCrunch.
Proceedings of the Sixth International Conference on Weblogs and Social Media, 2012

Improving Relative-Entropy Pruning using Statistical Significance.
Proceedings of the COLING 2012, 2012

Detecting offensive tweets via topical feature discovery over a large scale twitter corpus.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

Comparing classification algorithm for mouse dynamics based user identification.
Proceedings of the IEEE Fifth International Conference on Biometrics: Theory, 2012

CANTINA+: A Feature-Rich Machine Learning Framework for Detecting Phishing Web Sites.
ACM Trans. Inf. Syst. Secur., 2011

Smartening the crowds: computational techniques for improving human verification to fight phishing scams.
Proceedings of the Symposium On Usable Privacy and Security, 2011

Modeling people's place naming preferences in location sharing.
Proceedings of the UbiComp 2010: Ubiquitous Computing, 12th International Conference, 2010

A Hierarchical Adaptive Probabilistic Approach for Zero Hour Phish Detection.
Proceedings of the Computer Security, 2010

A hybrid phish detection approach by identity discovery and keywords retrieval.
Proceedings of the 18th International Conference on World Wide Web, 2009

Summarizing BBC Rushes the Informedia Way.
Proceedings of the TRECVID 2007 workshop participants notebook papers, 2007

Clever clustering vs. simple speed-up for summarizing rushes.
Proceedings of the 1st ACM Workshop on Video Summarization, 2007

Correlating Alerts with a Data Mining Based Approach.
Proceedings of the 2005 IEEE International Conference on e-Technology, e-Commerce, and e-Services (EEE 2005), 29 March, 2005

An Intrusion Detection and Response Cooperation Model Based on XML Message Exchange.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A Hybrid Machine Learning/Statistical Model of Grid Security.
Proceedings of the Grid and Cooperative Computing, 2004

Credential Trustworthiness-Based Trust Evaluation in Grid.
Proceedings of the Grid and Cooperative Computing, 2004

Reputation-Aware Contract-Supervised Grid Computing.
Proceedings of the Grid and Cooperative Computing, 2004