Jinbao Wang

According to our database1, Jinbao Wang authored at least 28 papers between 2005 and 2018.

Collaborative distances:



In proceedings 
PhD thesis 


On csauthors.net:


Automatic Pearl Classification Machine Based on a Multistream Convolutional Neural Network.
IEEE Trans. Industrial Electronics, 2018

Truthful Incentive Mechanisms for Geographical Position Conflicting Mobile Crowdsensing Systems.
IEEE Trans. Comput. Social Systems, 2018

Achieving the Optimal k-Anonymity for Content Privacy in Interactive Cyberphysical Systems.
Security and Communication Networks, 2018

Protecting query privacy with differentially private k-anonymity in location-based services.
Personal and Ubiquitous Computing, 2018

Finding k-Dominant G-Skyline Groups on High Dimensional Data.
IEEE Access, 2018

Cognitive Approach for Location Privacy Protection.
IEEE Access, 2018

Retrieving the Relative Kernel Dataset from Big Sensory Data for Continuous Query.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

iKey: An Intelligent Key System Based on Efficient Inclination Angle Sensing Techniques.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Detecting Top-k Active Inter-Community Jumpers in Dynamic Information Networks.
Proceedings of the Database Systems for Advanced Applications, 2018

Defend the Clique-based Attack for Data Privacy.
Proceedings of the Combinatorial Optimization and Applications, 2018

Aggregate Query Processing on Incomplete Data.
Proceedings of the Web and Big Data - Second International Joint Conference, 2018

Achieving Effective $k$ -Anonymity for Query Privacy in Location-Based Services.
IEEE Access, 2017

Differential Privacy Preserving Genomic Data Releasing via Factor Graph.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Addressing the Threats of Inference Attacks on Traits and Genotypes from Individual Genomic Data.
Proceedings of the Bioinformatics Research and Applications - 13th International Symposium, 2017

Near-Complete Privacy Protection: Cognitive Optimal Strategy in Location-Based Services.
Proceedings of the 2017 International Conference on Identification, 2017

The Roles of Social Network Mavens.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Differentially Private k-Anonymity: Achieving Query Privacy in Location-Based Services.
Proceedings of the International Conference on Identification, 2016

An Efficient Social Event Invitation Framework Based on Historical Data of Smart Devices.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

Efficient String Similarity Search on Disks.
Proceedings of the Intelligent Computation in Big Data Era, 2015

Answering Spatial Approximate Keyword Queries in Disks.
Proceedings of the Web Technologies and Applications - 17th Asia-PacificWeb Conference, 2015

Efficient Skyline Computation on Big Data.
IEEE Trans. Knowl. Data Eng., 2013

TJJE: An efficient algorithm for top-k join on massive data.
Inf. Sci., 2013

Ad-hoc aggregate query processing algorithms based on bit-store for query intensive applications in cloud computing.
Future Generation Comp. Syst., 2013

Ad Hoc Aggregation Query Processing Algorithms Based on Bit-Store in Data Intensive Cloud.
Proceedings of the 2011 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2011

Dirty Data Management in Cloud Database.
Proceedings of the Grid and Cloud Database Management, 2011

Indexing multi-dimensional data in a cloud system.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2010

Feature extraction method of fractional cosine and sine transform for speaker recognition.
Proceedings of the 12th IEEE International Conference on Electronics, 2005

Speaker Recognition Using Features Derived from Fractional Fourier Transform.
Proceedings of the Fourth IEEE Workshop on Automatic Identification Advanced Technologies (AutoID 2005), 2005