Jie Wang

According to our database1, Jie Wang authored at least 21 papers between 1990 and 2012.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.



In proceedings 
PhD thesis 


On csauthors.net:


Constrained Nonnegative Matrix Factorization based Data Distortion Techniques - Study of Data Privacy and Utility.
Proceedings of the DATA 2012, 2012

Towards real-time performance of data privacy protection.

Matrix Decomposition Techniques for Data Privacy.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy Preservation in Social Networks with Sensitive Edge Weights.
Proceedings of the SIAM International Conference on Data Mining, 2009

Generalized random rotation perturbation for vertically partitioned data sets.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

A novel data distortion approach via selective SSVD for privacy protection.
IJICS, 2008

Wavelet-Based Data Perturbation for Simultaneous Privacy-Preserving and Statistics-Preserving.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Towards Real-time Performance of Data Value Hiding for Frequent Data Updates.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simultaneous Pattern and Data Hiding in Unsupervised Learning.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

Singular value decomposition based data distortion strategy for privacy protection.
Knowl. Inf. Syst., 2006

A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation.
Applied Mathematics and Computation, 2006

High order compact computation and nonuniform grids for streamfunction vorticity equations.
Applied Mathematics and Computation, 2006

Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006

NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

Data Distortion for Privacy Protection in a Terrorist Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005

Support Vector Machine Approach for Partner Selection of Virtual Enterprises.
Proceedings of the Computational and Information Science, First International Symposium, 2004

Asymptotic analysis for closed multiclass queueing networks in critical usage.
Queueing Syst., 1994

Monte Carlo Summation and Integration Applied to Multiclass Queuing Networks.
J. ACM, 1994

Asymptotically Optimal Importance Sampling for Product-Form Queuing Networks.
ACM Trans. Model. Comput. Simul., 1993

Solving product form stochastic networks with Monte Carlo summation.
Proceedings of the 22th Winter Simulation Conference, 1990