Wei Song

Orcid: 0000-0002-9218-6361

Affiliations:
  • Wuhan University, Computer School, State Key Laboratory of Software Engineering, China
  • Virginia Polytechnic Institute and State University, Department of Computer Science, Blacksburg, VA, USA
  • Huazhong University of Science and Technology, China (PhD 2008)


According to our database1, Wei Song authored at least 31 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Differentially private trajectory event streams publishing under data dependence constraints.
Inf. Sci., February, 2024

2023
A New Reconstruction Attack: User Latent Vector Leakage in Federated Recommendation.
Proceedings of the Database Systems for Advanced Applications, 2023

2022
Weakly supervised setting for learning concept prerequisite relations using multi-head attention variational graph auto-encoders.
Knowl. Based Syst., 2022

Public integrity verification for data sharing in cloud with asynchronous revocation.
Digit. Commun. Networks, 2022

Learning Concept Prerequisite Relations from Educational Data via Multi-Head Attention Variational Graph Auto-Encoders.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Secure Access Control for eHealth Data in Emergency Rescue Case based on Traceable Attribute-Based Encryption.
Proceedings of the IEEE International Conference on Trust, 2022

How to Share Medical Data Belonging to Multiple Owners in a Secure Manner.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Privacy-Preserving Polynomial Evaluation over Spatio-Temporal Data on an Untrusted Cloud Server.
Proceedings of the Database Systems for Advanced Applications, 2021

A Reasonable Data Pricing Mechanism for Personal Data Transactions with Privacy Concern.
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021

GRHAM: Towards Group Recommendation Using Hierarchical Attention Mechanism.
Proceedings of the Web and Big Data - 5th International Joint Conference, 2021

Friend Relationships Recommendation Algorithm in Online Education Platform.
Proceedings of the Web Information Systems and Applications, 2021

2020
Predicting MOOCs Dropout with a Deep Model.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Learning Ability Community for Personalized Knowledge Tracing.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Enabling Efficient Multi-keyword Search Over Fine-Grained Authorized Healthcare Blockchain System.
Proceedings of the Web and Big Data - 4th International Joint Conference, 2020

Efficient Patient-Friendly Medical Blockchain System Based on Attribute-Based Encryption.
Proceedings of the Web Information Systems and Applications, 2020

2019
Select the Best for Me: Privacy-Preserving Polynomial Evaluation Algorithm over Road Network.
Proceedings of the Database Systems for Advanced Applications, 2019

Adaptive Authorization Access Method for Medical Cloud Data Based on Attribute Encryption.
Proceedings of the Web Information Systems and Applications, 2019

2018
一种面向密文基因数据的子序列外包查询方法 (Subsequence Outsourcing Query Method over Encrypted Genomic Data).
计算机科学, 2018

基于差分隐私的多源数据关联规则挖掘方法 (Mining Method of Association Rules Based on Differential Privacy).
计算机科学, 2018

2017
Publicly Verifiable Computation of Polynomials Over Outsourced Data With Multiple Sources.
IEEE Trans. Inf. Forensics Secur., 2017

A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications.
J. Parallel Distributed Comput., 2017

Tell me the truth: Practically public authentication for outsourced databases with multi-user modification.
Inf. Sci., 2017

Privacy-preserving pattern matching over encrypted genetic data in cloud computing.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

2015
A Full-Text Retrieval Algorithm for Encrypted Data in Cloud Storage Applications.
Proceedings of the Natural Language Processing and Chinese Computing - 4th CCF Conference, 2015

Inverted index based multi-keyword public-key searchable encryption with strong privacy guarantee.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Efficient privacy-preserved data query over ciphertext in cloud computing.
Secur. Commun. Networks, 2014

Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective.
Sci. China Inf. Sci., 2014

Query Authentication over Cloud Data from Multiple Contributors.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2011
A privacy policy conflict detection method for multi-owner privacy data protection.
Electron. Commer. Res., 2011

HTPR*-Tree: An Efficient Index for Moving Objects to Support Predictive Query and Partial History Query.
Proceedings of the Web-Age Information Management, 2011


  Loading...