Jie Wang

Affiliations:
  • Indiana University Northwest, Gary, IN, USA
  • Minnesota State University, Computer Science Department, Mankato, MN, USA (former)
  • University of Kentucky, Department of Computer Science, Lexington, KY, USA (PhD 2008)
  • Southeast University, School of Economics and Management, Nanjing, China (former)


According to our database1, Jie Wang authored at least 29 papers between 1990 and 2015.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2015
Confluent Supersymmetric Partners of Quantum Systems Emerging from the Spheroidal Equation.
Symmetry, 2015

Constrained matrix factorization for financial data clustering.
Intell. Data Anal., 2015

2014
A study of reliability patterns by simultaneous clustering: a matrix factorization approach.
Proceedings of the 2014 ACM Southeast Regional Conference, Kennesaw, GA, USA, March 28, 2014

2013
Discovering the rating pattern of online reviewers through data coclustering.
Proceedings of the 2013 IEEE International Conference on Intelligence and Security Informatics, 2013

Mining Online Book Reviews for Sentimental Clustering.
Proceedings of the 27th International Conference on Advanced Information Networking and Applications Workshops, 2013

2012
A hierarchical model of e-government service capability: An empirical analysis.
Gov. Inf. Q., 2012

Constrained Nonnegative Matrix Factorization based Data Distortion Techniques - Study of Data Privacy and Utility.
Proceedings of the DATA 2012, 2012

Stock Trend Extraction via Matrix Factorization.
Proceedings of the Advanced Data Mining and Applications, 8th International Conference, 2012

2010
Towards real-time performance of data privacy protection.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2010

2009
Matrix Decomposition Techniques for Data Privacy.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

The widely shared definition of e-Government: An exploratory study.
Electron. Libr., 2009

Privacy Preservation in Social Networks with Sensitive Edge Weights.
Proceedings of the SIAM International Conference on Data Mining, 2009

Generalized random rotation perturbation for vertically partitioned data sets.
Proceedings of the IEEE Symposium on Computational Intelligence and Data Mining, 2009

2008
A novel data distortion approach via selective SSVD for privacy protection.
Int. J. Inf. Comput. Secur., 2008

Wavelet-Based Data Perturbation for Simultaneous Privacy-Preserving and Statistics-Preserving.
Proceedings of the Workshops Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

Towards Real-time Performance of Data Value Hiding for Frequent Data Updates.
Proceedings of the 2008 IEEE International Conference on Granular Computing, 2008

2007
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2007

Simultaneous Pattern and Data Hiding in Unsupervised Learning.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
Singular value decomposition based data distortion strategy for privacy protection.
Knowl. Inf. Syst., 2006

A general meshsize fourth-order compact difference discretization scheme for 3D Poisson equation.
Appl. Math. Comput., 2006

High order compact computation and nonuniform grids for streamfunction vorticity equations.
Appl. Math. Comput., 2006

Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation.
Proceedings of the 2006 International Conference on Information & Knowledge Engineering, 2006

NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets.
Proceedings of the Workshops Proceedings of the 6th IEEE International Conference on Data Mining (ICDM 2006), 2006

2005
Data Distortion for Privacy Protection in a Terrorist Analysis System.
Proceedings of the Intelligence and Security Informatics, 2005

2004
Support Vector Machine Approach for Partner Selection of Virtual Enterprises.
Proceedings of the Computational and Information Science, First International Symposium, 2004

1994
Asymptotic analysis for closed multiclass queueing networks in critical usage.
Queueing Syst. Theory Appl., 1994

Monte Carlo Summation and Integration Applied to Multiclass Queuing Networks.
J. ACM, 1994

1993
Asymptotically Optimal Importance Sampling for Product-Form Queuing Networks.
ACM Trans. Model. Comput. Simul., 1993

1990
Solving product form stochastic networks with Monte Carlo summation.
Proceedings of the 22th Winter Simulation Conference, 1990


  Loading...