Ke Wang

According to our database1, Ke Wang authored at least 112 papers between 1999 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2019
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks.
IACR Cryptology ePrint Archive, 2019

Relationship Prediction in Dynamic Heterogeneous Information Networks.
Proceedings of the Advances in Information Retrieval, 2019

Class Indistinguishability for Outsourcing Equality Conjunction Search.
Proceedings of the Cloud Computing - CLOUD 2019, 2019

Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019

2018
Privacy Preserving Group Nearest Neighbor Search.
Proceedings of the 21th International Conference on Extending Database Technology, 2018

Secure Top-k Inner Product Retrieval.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

2017
READS: A Random Walk Approach for Efficient and Accurate Dynamic SimRank.
PVLDB, 2017

Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Trip Recommendation Meets Real-World Constraints: POI Availability, Diversity, and Traveling Time Uncertainty.
ACM Trans. Inf. Syst., 2016

TopicSketch: Real-Time Bursty Topic Detection from Twitter.
IEEE Trans. Knowl. Data Eng., 2016

Mining High Utility Patterns in One Phase without Generating Candidates.
IEEE Trans. Knowl. Data Eng., 2016

POI recommendation through cross-region collaborative filtering.
Knowl. Inf. Syst., 2016

Continuous similarity search for evolving queries.
Knowl. Inf. Syst., 2016

Generalized bucketization scheme for flexible privacy settings.
Inf. Sci., 2016

2015
Neighborhood randomization for link privacy in social network analysis.
World Wide Web, 2015

Reconstruction Privacy: Enabling Statistical Learning.
Proceedings of the 18th International Conference on Extending Database Technology, 2015

Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Modelling cascades over time in microblogs.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

KeyLabel algorithms for keyword search in large graphs.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Sensitive Disclosures under Differential Privacy Guarantees.
Proceedings of the 2015 IEEE International Congress on Big Data, New York City, NY, USA, June 27, 2015

Are Features Equally Representative? A Feature-Centric Recommendation.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Latent Tunnel Based Information Propagation in Microblog Networks.
Proceedings of the Social Network Analysis - Community Detection and Evolution, 2014

Small sum privacy and large sum utility in data publishing.
Journal of Biomedical Informatics, 2014

Latent Factor Transition for Dynamic Collaborative Filtering.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks.
Proceedings of the Advances in Information Retrieval, 2014

2013
Introduction to the Special Issue ACM SIGKDD 2012.
TKDD, 2013

A new approach for maximizing bichromatic reverse nearest neighbor search.
Knowl. Inf. Syst., 2013

Privacy-preserving trajectory data publishing by local suppression.
Inf. Sci., 2013

Collective spatial keyword queries: a distance owner-driven approach.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2013

TopicSketch: Real-Time Bursty Topic Detection from Twitter.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Information propagation in microblog networks.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Inferential or Differential: Privacy Laws Dictate
CoRR, 2012

Small Count Privacy and Large Count Utility in Data Publishing
CoRR, 2012

Randomization Resilient To Sensitive Reconstruction
CoRR, 2012

Direct Discovery of High Utility Itemsets without Candidate Generation.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Limiting link disclosure in social network analysis through subgraph-wise perturbation.
Proceedings of the 15th International Conference on Extending Database Technology, 2012

2011
Can the Utility of Anonymized Data be Used for Privacy Breaches?
TKDD, 2011

genBlastG: using BLAST searches to build homologous gene models.
Bioinformatics, 2011

Extracting Interpretable Features for Early Classification on Time Series.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

2010
Privacy-preserving data publishing: A survey of recent developments.
ACM Comput. Surv., 2010

An Effective Clustering Approach to Web Query Log Anonymization
CoRR, 2010

An Effective Clustering Approach to Web Query Log Anonymization.
Proceedings of the SECRYPT 2010, 2010

Publishing Skewed Sensitive Microdata.
Proceedings of the SIAM International Conference on Data Mining, 2010

Fast and Accurate Gene Prediction by Decision Tree Classification.
Proceedings of the SIAM International Conference on Data Mining, 2010

Probabilistic Inference Protection on Anonymized Data.
Proceedings of the ICDM 2010, 2010

Anonymizing Temporal Data.
Proceedings of the ICDM 2010, 2010

Global privacy guarantee in serial data publishing.
Proceedings of the 26th International Conference on Data Engineering, 2010

2009
Hierarchical Document Clustering.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Anonymization-based attacks in privacy-preserving data publishing.
ACM Trans. Database Syst., 2009

Online Skyline Analysis with Dynamic Preferences on Nominal Attributes.
IEEE Trans. Knowl. Data Eng., 2009

PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining.
Knowl. Inf. Syst., 2009

(alpha, k)-anonymous data publishing.
J. Intell. Inf. Syst., 2009

Privacy-preserving data publishing for cluster analysis.
Data Knowl. Eng., 2009

Anonymization with Worst-Case Distribution-Based Background Knowledge
CoRR, 2009

Can the Utility of Anonymized Data be used for Privacy Breaches?
CoRR, 2009

Preserving Individual Privacy in Serial Data Publishing
CoRR, 2009

FF-Anonymity: When Quasi-identifiers Are Missing.
Proceedings of the 25th International Conference on Data Engineering, 2009

Privacy-preserving data mashup.
Proceedings of the EDBT 2009, 2009

Online anonymity for personalized web services.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Privacy-Preserving Data Stream Classification.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Computing Join Aggregates Over Private Tables.
IJDWM, 2008

Anonymizing transaction databases for publication.
Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2008

A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Publishing Sensitive Transactions for Itemset Utility.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics.
Proceedings of the EDBT 2008, 2008

Anonymity for continuous data publishing.
Proceedings of the EDBT 2008, 2008

2007
Anonymizing Classification Data for Privacy Preservation.
IEEE Trans. Knowl. Data Eng., 2007

Handicapping attacker's confidence: an alternative to k -anonymization.
Knowl. Inf. Syst., 2007

Answering ad hoc aggregate queries from data streams using prefix aggregate trees.
Knowl. Inf. Syst., 2007

Privacy-enhancing personalized web search.
Proceedings of the 16th International Conference on World Wide Web, 2007

Minimality Attack in Privacy Preserving Data Publishing.
Proceedings of the 33rd International Conference on Very Large Data Bases, 2007

Maintaining K-Anonymity against Incremental Updates.
Proceedings of the 19th International Conference on Scientific and Statistical Database Management, 2007

Mining favorable facets.
Proceedings of the 13th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2007

Computing Join Aggregates over Private Tables.
Proceedings of the Data Warehousing and Knowledge Discovery, 9th International Conference, 2007

2006
Discovering Frequent Closed Partial Orders from Strings.
IEEE Trans. Knowl. Data Eng., 2006

Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach.
J. Intell. Inf. Syst., 2006

(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

Anonymizing sequential releases.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

Mining Actionable Patterns by Role Models.
Proceedings of the 22nd International Conference on Data Engineering, 2006

Classification spanning correlated data streams.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

Classification Spanning Private Databases.
Proceedings of the Proceedings, 2006

2005
Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification.
IEEE Trans. Knowl. Data Eng., 2005

Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining.
IEEE Trans. Knowl. Data Eng., 2005

Data Mining for Inventory Item Selection with Cross-Selling Considerations.
Data Min. Knowl. Discov., 2005

Mining Customer Value: From Association Rules to Direct Marketing.
Data Min. Knowl. Discov., 2005

Building Decision Trees on Records Linked through Key References.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Pushing Feature Selection Ahead Of Join.
Proceedings of the 2005 SIAM International Conference on Data Mining, 2005

Integrating Private Databases for Data Analysis.
Proceedings of the Intelligence and Security Informatics, 2005

Template-Based Privacy Preservation in Classification Problems.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Efficiently Mining Frequent Closed Partial Orders.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Mining Patterns That Respond to Actions.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Privacy-Preserving Frequent Pattern Mining across Private Databases.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Top-Down Specialization for Information and Privacy Preservation.
Proceedings of the 21st International Conference on Data Engineering, 2005

2004
Mining Constrained Gradients in Large Databases.
IEEE Trans. Knowl. Data Eng., 2004

Bottom-Up Generalization: A Data Mining Solution to Privacy Protection.
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004

Scalable sequential pattern mining for biological sequences.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
Mining Changes of Classification by Correspondence Tracing.
Proceedings of the Third SIAM International Conference on Data Mining, 2003

Hierarchical Document Clustering using Frequent Itemsets.
Proceedings of the Third SIAM International Conference on Data Mining, 2003

Mining unexpected rules by pushing user dynamics.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

Frequent-subsequence-based prediction of outer membrane proteins.
Proceedings of the Ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 24, 2003

MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003

Mining Customer Value: From Association Rules to Direct Marketing.
Proceedings of the 19th International Conference on Data Engineering, 2003

Pushing Aggregate Constraints by Divide-and-Approximate.
Proceedings of the 19th International Conference on Data Engineering, 2003

2002
CubeExplorer: online exploration of data cubes.
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002

Mining Association Rules from Stars.
Proceedings of the 2002 IEEE International Conference on Data Mining (ICDM 2002), 2002

Profit Mining: From Patterns to Actions.
Proceedings of the Advances in Database Technology, 2002

2001
Mining Multi-Dimensional Constrained Gradients in Data Cubes.
Proceedings of the VLDB 2001, 2001

Efficient Computation of Iceberg Cubes with Complex Measures.
Proceedings of the 2001 ACM SIGMOD international conference on Management of data, 2001

Hierarchical Classification of Real Life Documents.
Proceedings of the First SIAM International Conference on Data Mining, 2001

Multi-Dimensional Sequential Pattern Mining.
Proceedings of the 2001 ACM CIKM International Conference on Information and Knowledge Management, 2001

2000
Growing decision trees on support-less association rules.
Proceedings of the sixth ACM SIGKDD international conference on Knowledge discovery and data mining, 2000

1999
Building Hierarchical Classifiers Using Class Proximity.
Proceedings of the VLDB'99, 1999


  Loading...