Xi He

According to our database1, Xi He authored at least 45 papers between 2006 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Resilient and Fast State Estimation for Energy Internet: A Data-Based Approach.
IEEE Trans. Industrial Informatics, 2019

A Basin Stability Based Metric for Ranking the Transient Stability of Generators.
IEEE Trans. Industrial Informatics, 2019

Dual-Functional Dynamic Voltage Restorer to Limit Fault Current.
IEEE Trans. Industrial Electronics, 2019

PrivateSQL: A Differentially Private SQL Query Engine.
PVLDB, 2019

Investigating Statistical Privacy Frameworks from the Perspective of Hypothesis Testing.
PoPETs, 2019

Design of Algorithms under Policy-Aware Local Differential Privacy: Utility-Privacy Trade-offs.
CoRR, 2019

Outis: Crypto-Assisted Differential Privacy on Untrusted Servers.
CoRR, 2019

Privacy Changes Everything.
Proceedings of the Heterogeneous Data Management, Polystores, and Analytics for Healthcare, 2019

APEx: Accuracy-Aware Differentially Private Data Exploration.
Proceedings of the 2019 International Conference on Management of Data, 2019

2018
Analyzing Your Location Data with Provable Privacy Guarantees.
Proceedings of the Handbook of Mobile Data Privacy., 2018

ShrinkWrap: Efficient SQL Query Processing in Differentially Private Data Federations.
PVLDB, 2018

An X-band bandpass WR-90 filtering antenna with offset resonators.
IEICE Electronic Express, 2018

Efficient Distributed Hessian Free Algorithm for Large-scale Empirical Risk Minimization via Accumulating Sample Strategy.
CoRR, 2018

Shrinkwrap: Differentially-Private Query Processing in Private Data Federations.
CoRR, 2018

Cyber-Attacks in PMU-Based Power Network and Countermeasures.
IEEE Access, 2018

Sequential Graph Scanning Statistic for Change-point Detection.
Proceedings of the 52nd Asilomar Conference on Signals, Systems, and Computers, 2018

2017
MIMO antenna with working-frequency-accompanied isolation characteristic.
IEICE Electronic Express, 2017

Private Exploration Primitives for Data Cleaning.
CoRR, 2017

Scaling Private Record Linkage using Output Constrained Differential Privacy.
CoRR, 2017

Differential Privacy in the Wild: A Tutorial on Current Practices & Open Challenges.
Proceedings of the 2017 ACM International Conference on Management of Data, 2017

Optimal phase sequence of multi-circuit transmission lines on the same tower.
Proceedings of the 13th International Conference on Natural Computation, 2017

Composing Differential Privacy and Secure Computation: A Case Study on Scaling Private Record Linkage.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, Dallas, TX, USA, October 30, 2017

Distributed Hessian-Free Optimization for Deep Neural Network.
Proceedings of the Workshops of the The Thirty-First AAAI Conference on Artificial Intelligence, 2017

2016
Differential Privacy in the Wild: A tutorial on current practices & open challenges.
PVLDB, 2016

A Demonstration of VisDPT: Visual Exploration of Differentially Private Trajectories.
PVLDB, 2016

Large Scale Distributed Hessian-Free Optimization for Deep Neural Network.
CoRR, 2016

TennisMatchViz: A Tennis Match Visualization System.
Proceedings of the Visualization and Data Analysis 2016, 2016

2015
DPT: Differentially Private Trajectory Synthesis Using Hierarchical Reference Systems.
PVLDB, 2015

Dual Free SDCA for Empirical Risk Minimization with Adaptive Probabilities.
CoRR, 2015

Influencing Factors for Carbon Information Disclosure of Chinese Listed Companies Based on Network Media Data.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

GPU-based Parallel R-tree Construction and Querying.
Proceedings of the 2015 IEEE International Parallel and Distributed Processing Symposium Workshop, 2015

2014
Blowfish privacy: tuning privacy-utility trade-offs using policies.
Proceedings of the International Conference on Management of Data, 2014

Enhancing the information assurance and security (IAS) in CS education with mobile-device based hands-on labs.
Proceedings of the Innovation and Technology in Computer Science Education Conference 2014, 2014

2013
An equation-based Heap Sizing Rule.
Perform. Eval., 2013

Blowfish Privacy: Tuning Privacy-Utility Trade-offs using Policies.
CoRR, 2013

MapReduce Algorithms for GIS Polygonal Overlay Processing.
Proceedings of the 2013 IEEE International Symposium on Parallel & Distributed Processing, 2013

2012
A System for GIS Polygonal Overlay Computation on Linux Cluster - An Experience and Performance Report.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Design and implementation of a parallel priority queue on many-core architectures.
Proceedings of the 19th International Conference on High Performance Computing, 2012

2010
Cloud Computing: a Perspective Study.
New Generation Comput., 2010

Bayesian Decision Based Method for Assets Recognition of Risk Assessment.
Proceedings of the Sixth International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2010), 2010

Differential evolution with dynamic constraint-handling mechanism.
Proceedings of the IEEE Congress on Evolutionary Computation, 2010

2009
Towards Thermal Aware Workload Scheduling in a Data Center.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Power-aware scheduling of virtual machines in DVFS-enabled clusters.
Proceedings of the 2009 IEEE International Conference on Cluster Computing, August 31, 2009

Experiment and Workflow Management Using Cyberaide Shell.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

2006
Service Oriented Dynamic Decoupling Metrics.
Proceedings of the 2006 International Conference on Semantic Web & Web Services, 2006


  Loading...