Keke Chen

Orcid: 0009-0006-2985-8918

According to our database1, Keke Chen authored at least 88 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A novel image encryption algorithm based on coupled map lattices model.
Multim. Tools Appl., January, 2024

2023
DisguisedNets: Secure Image Outsourcing for Confidential Model Training in Clouds.
ACM Trans. Internet Techn., August, 2023

Confidential High-Performance Computing in the Public Cloud.
IEEE Internet Comput., 2023

Adaptive Domain Inference Attack.
CoRR, 2023

SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments.
CoRR, 2023

A Comparative Study of Image Disguising Methods for Confidential Outsourced Learning.
CoRR, 2023

Foreground/Background-Masked Interaction Learning for Spatio-temporal Action Detection.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Thinking Like Sonographers: A Deep CNN Model for Diagnosing Gout from Musculoskeletal Ultrasound.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2023, 2023

Demo: SGX-MR-Prot: Efficient and Developer-Friendly Access-Pattern Protection in Trusted Execution Environments.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

Demo: Image Disguising for Scalable GPU-accelerated Confidential Deep Learning.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

GAN-Based Domain Inference Attack.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Making Your Program Oblivious: A Comparative Study for Side-channel-Safe Confidential Computing.
Proceedings of the 16th IEEE International Conference on Cloud Computing, 2023

2021
Design and implementation of a virtual ARINC 653 simulation platform.
Simul., 2021

SGX-MR: Regulating Dataflows for Protecting Access Patterns of Data-Intensive SGX Applications.
Proc. Priv. Enhancing Technol., 2021

Confidential machine learning on untrusted platforms: a survey.
Cybersecur., 2021

Class-Specific Affinity based Weakly Supervised Semantic Segmentation with Neutral Region Exploration.
Proceedings of the International Joint Conference on Neural Networks, 2021

Weakly Supervised Semantic Segmentation with Patch-Based Metric Learning Enhancement.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2021, 2021

Scalable Sequence Clustering for Large-Scale Immune Repertoire Analysis.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

Image Disguising for Protecting Data and Model Confidentiality in Outsourced Deep Learning.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2019
PrivateGraph: Privacy-Preserving Spectral Analysis of Encrypted Graphs in the Cloud.
IEEE Trans. Knowl. Data Eng., 2019

Shilling attack based on item popularity and rated item correlation against collaborative filtering.
Int. J. Mach. Learn. Cybern., 2019

Disguised-Nets: Image Disguising for Privacy-preserving Deep Learning.
CoRR, 2019

Knowledge Graph Enhanced Community Detection and Characterization.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

Multi-region Coverage Path Planning for Heterogeneous Unmanned Aerial Vehicles Systems.
Proceedings of the 13th IEEE International Conference on Service-Oriented System Engineering, 2019

Who Should Be the Captain This Week?Leveraging Inferred Diversity-Enhanced Crowd Wisdom for a Fantasy Premier League Captain Prediction.
Proceedings of the Thirteenth International Conference on Web and Social Media, 2019

Confidential Boosting with Random Linear Classifiers for Outsourced User-Generated Data.
Proceedings of the Computer Security - ESORICS 2019, 2019

2018
RASP-Boost: Confidential Boosting-Model Learning with Perturbed Data in the Cloud.
IEEE Trans. Cloud Comput., 2018

Toward Practical Privacy-Preserving Analytics for IoT and Cloud-Based Healthcare Systems.
IEEE Internet Comput., 2018

SPIN: cleaning, monitoring, and querying image streams generated by ground-based telescopes for space situational awareness.
Int. J. Data Sci. Anal., 2018

Towards Practical Privacy-Preserving Analytics for IoT and Cloud Based Healthcare Systems.
CoRR, 2018

Privacy-Preserving Boosting with Random Linear Classifiers for Learning from User-Generated Data.
CoRR, 2018

Shilling Attack Detection Using Rated Item Correlation for Collaborative Filtering.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2018

Unsupervised Shilling Attack Detection Model Based on Rated Item Correlation Analysis.
Proceedings of the 2018 International Conference on Machine Learning and Cybernetics, 2018

Privacy-Preserving Boosting with Random Linear Classifiers.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Image Disguising for Privacy-preserving Deep Learning.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Adaptive training instance selection for cross-domain emotion identification.
Proceedings of the International Conference on Web Intelligence, 2017

PrivateGraph: A Cloud-Centric System for Spectral Analysis of Large Encrypted Graphs.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Tweet Properly: Analyzing Deleted Tweets to Understand and Identify Regrettable Ones.
Proceedings of the 25th International Conference on World Wide Web, 2016

DynaEgo: Privacy-Preserving Collaborative Filtering Recommender System Based on Social-Aware Differential Privacy.
Proceedings of the Information and Communications Security - 18th International Conference, 2016

Privacy-Preserving Spectral Analysis of Large Graphs in Public Clouds.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

COLT: COnstrained Lineage Tree Generation from sequence data.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
Identifying Regrettable Messages from Tweets.
Proceedings of the 24th International Conference on World Wide Web Companion, 2015

Scalable Euclidean Embedding for Big Data.
Proceedings of the 8th IEEE International Conference on Cloud Computing, 2015

2014
CRESP: Towards Optimal Resource Provisioning for MapReduce Computing in Public Clouds.
IEEE Trans. Parallel Distributed Syst., 2014

Building Confidential and Efficient Query Services in the Cloud with RASP Data Perturbation.
IEEE Trans. Knowl. Data Eng., 2014

RASP-QS: Efficient and Confidential Query Services in the Cloud.
Proc. VLDB Endow., 2014

Optimizing star-coordinate visualization models for effective interactive cluster exploration on big data.
Intell. Data Anal., 2014

Toward Optimal Resource Provisioning for Economical and Green MapReduce Computing in the Cloud.
Proceedings of the Large Scale and Big Data - Processing and Management., 2014

2013
PerturBoost: Practical Confidential Classifier Learning in the Cloud.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Secure Computation of Top-K Eigenvectors for Shared Matrices in the Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
CloudVista: Interactive and Economical Visual Cluster Analysis for Big Data in the Cloud.
Proc. VLDB Endow., 2012

Secure MapReduce Power Iteration in the Cloud
CoRR, 2012

Mining Privacy Settings to Find Optimal Privacy-Utility Tradeoffs for Social Network Services.
Proceedings of the 2012 International Conference on Privacy, 2012

Privacy preserving boosting in the cloud with secure half-space queries.
Proceedings of the ACM Conference on Computer and Communications Security, 2012

2011
Ranking function adaptation with boosting trees.
ACM Trans. Inf. Syst., 2011

Geometric data perturbation for privacy preserving outsourced data mining.
Knowl. Inf. Syst., 2011

On Security of the Utility Preserving RASP Encryption.
IACR Cryptol. ePrint Arch., 2011

CloudVista: Visual Cluster Exploration for Extreme Scale Data in the Cloud.
Proceedings of the Scientific and Statistical Database Management, 2011

Flying under the radar: maintaining control of kernel without changing kernel code or persistent data structures.
Proceedings of the 7th Cyber Security and Information Intelligence Research Workshop, 2011

RASP: efficient multidimensional range query on attack-resilient encrypted databases.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

Towards Optimal Resource Provisioning for Running MapReduce Programs in Public Clouds.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
SCALE: a scalable framework for efficiently clustering transactional data.
Data Min. Knowl. Discov., 2010

Cross-Market Model Adaptation with Pairwise Preference Data for Web Search Ranking.
Proceedings of the COLING 2010, 2010

2009
HE-Tree: a framework for detecting changes in clustering structure for categorical data streams.
VLDB J., 2009

Privacy-Preserving Multiparty Collaborative Mining with Geometric Data Perturbation.
IEEE Trans. Parallel Distributed Syst., 2009

"Best K": critical clustering structures in categorical datasets.
Knowl. Inf. Syst., 2009

Determining the best K.
Data Knowl. Eng., 2009

VisGBT: Visually analyzing evolving datasets for adaptive learning.
Proceedings of the 5th International Conference on Collaborative Computing: Networking, 2009

On domain similarity and effectiveness of adapting-to-rank.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
A Survey of Multiplicative Perturbation for Privacy-Preserving Data Mining.
Proceedings of the Privacy-Preserving Data Mining - Models and Algorithms, 2008

Adapting ranking functions to user preference.
Proceedings of the 24th International Conference on Data Engineering Workshops, 2008

Trada: tree based ranking function adaptation.
Proceedings of the 17th ACM Conference on Information and Knowledge Management, 2008

2007
Model Formulation: A Document Clustering and Ranking System for Exploring MEDLINE Citations.
J. Am. Medical Informatics Assoc., 2007

A regression framework for learning ranking functions using relative relevance judgments.
Proceedings of the SIGIR 2007: Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, 2007

Towards Attack-Resilient Geometric Data Perturbation.
Proceedings of the Seventh SIAM International Conference on Data Mining, 2007

Space adaptation: privacy-preserving multiparty collaborative mining with geometric perturbation.
Proceedings of the Twenty-Sixth Annual ACM Symposium on Principles of Distributed Computing, 2007

A General Boosting Method and its Application to Learning Ranking Functions for Web Search.
Proceedings of the Advances in Neural Information Processing Systems 20, 2007

2006
Geometric Methods for Mining Large and Possibly Private Datasets.
PhD thesis, 2006

iVIBRATE: Interactive visualization-based framework for clustering large datasets.
ACM Trans. Inf. Syst., 2006

Detecting the Change of Clustering Structure in Categorical Data Streams.
Proceedings of the Sixth SIAM International Conference on Data Mining, 2006

Efficiently clustering transactional data with weighted coverage density.
Proceedings of the 2006 ACM CIKM International Conference on Information and Knowledge Management, 2006

2005
The "Best K" for Entropy-based Categorical Data Clustering.
Proceedings of the 17th International Conference on Scientific and Statistical Database Management, 2005

Privacy Preserving Data Classification with Rotation Perturbation.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

2004
VISTA: validating and refining clusters via visualization.
Inf. Vis., 2004

ClusterMap: labeling clusters in large datasets via visualization.
Proceedings of the 2004 ACM CIKM International Conference on Information and Knowledge Management, 2004

2003
A Visual Framework Invites Human into the Clustering Process.
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003

Cluster Rendering of Skewed Datasets via Visualization.
Proceedings of the 2003 ACM Symposium on Applied Computing (SAC), 2003

Validating and Refining Clusters via Visual Rendering.
Proceedings of the 3rd IEEE International Conference on Data Mining (ICDM 2003), 2003


  Loading...