Wendy Hui Wang

According to our database1, Wendy Hui Wang authored at least 52 papers between 2004 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
Data Knowl. Eng., 2018

AssureMR: Verifiable SQL Execution on MapReduce.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

2017
EARRING: Efficient Authentication of Outsourced Record Matching.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.
IEEE Trans. Services Computing, 2016

ARM: Authenticated Approximate Record Matching for Outsourced Databases.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Privacy-Preserving Outsourcing of Data Mining.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Similarity Recoverable, Format-Preserving String Encryption.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Hiding outliers into crowd: Privacy-preserving data publishing with outliers.
Data Knowl. Eng., 2015

Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

2014
Result Integrity Verification of Outsourced Bayesian Network Structure Learning.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

iCoDA: Interactive and exploratory data completeness analysis.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

PraDa: Privacy-preserving Data-Deduplication-as-a-Service.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wireless Networks, 2013

Optimizing XML queries: Bitmapped materialized views vs. indexes.
Inf. Syst., 2013

Privacy-Aware Distributed Mobility Data Analytics.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013

Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Result Integrity Verification of Outsourced Frequent Itemset Mining.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Privacy-Preserving Distributed Movement Data Aggregation.
Proceedings of the Geographic Information Science at the Heart of Europe, 2013

2012
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases.
Proceedings of the Twentieth Italian Symposium on Advanced Database Systems, 2012

AUDIO: An Integrity Auditing Framework of Outlier-Mining-as-a-Service Systems.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

Understanding Data Completeness in Network Monitoring Systems.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Integrity verification of cloud-hosted data analytics computations.
Proceedings of the 1st International Workshop on Cloud Intelligence (colocated with VLDB 2012), 2012

2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wireless Networks, 2011

Trajectory anonymity in publishing personal mobility data.
SIGKDD Explorations, 2011

Privacy-preserving publishing microdata with full functional dependencies.
Data Knowl. Eng., 2011

Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems.
Proceedings of the Scientific and Statistical Database Management, 2011

Privacy-Preserving Data Mining from Outsourced Databases.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
Privacy-Preserving Data Sharing in Cloud Computing.
J. Comput. Sci. Technol., 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wireless Comm. and Networking, 2010

A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Privacy-preserving data publishing.
Proceedings of the Workshops Proceedings of the 26th International Conference on Data Engineering, 2010

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

Distributed and Secure Access Control in P2P Databases.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Privacy-Preserving Publishing Data with Full Functional Dependencies.
Proceedings of the Database Systems for Advanced Applications, 2010

SPac: a distributed, peer-to-peer, secure and privacy-aware social space.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Towards publishing recommendation data with predictive anonymization.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the EDBT 2009, 2009

Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers.
Proceedings of the EDBT 2009, 2009

Integrity Verification of Outsourced XML Databases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Answering XML queries using materialized views revisited.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss.
Proceedings of the 14th International Conference on Management of Data, 2008

2007
Optimizing Tree Pattern Queries over Secure XML Databases.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

The Threshold Algorithm: From Middleware Systems to the Relational Engine.
IEEE Trans. Knowl. Data Eng., 2007

2006
Probabilistic privacy analysis of published views.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Efficient Secure Query Evaluation over Encrypted XML Databases.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Answering Tree Pattern Queries Using Views.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

2004
On Testing Satisfiability of Tree Pattern Queries.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, Toronto, Canada, August 31, 2004


  Loading...