Xiangliang Zhang

According to our database1, Xiangliang Zhang authored at least 104 papers between 2004 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Protecting multi-party privacy in location-aware social point-of-interest recommendation.
World Wide Web, 2019

Precise Target Selection Techniques in Handheld Augmented Reality Interfaces.
IEEE Access, 2019

Co-Embedding Attributed Networks.
Proceedings of the Twelfth ACM International Conference on Web Search and Data Mining, 2019

A Novel Framework for Node/Edge Attributed Graph Embedding.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

Special issue: Mobile web data analytics (part II).
Web Intelligence, 2018

Special issue: Mobile Web Data Analytics (part I).
Web Intelligence, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs.
IEEE Trans. Knowl. Data Eng., 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intelligent Transportation Systems, 2018

Transfer collaborative filtering from multiple sources via consensus regularization.
Neural Networks, 2018

Abstracting massive data for lightweight intrusion detection in computer networks.
Inf. Sci., 2018

Exploiting reject option in classification for social discrimination control.
Inf. Sci., 2018

Efficient evaluation of shortest travel-time path queries through spatial mashups.
GeoInformatica, 2018

Efficient task assignment in spatial crowdsourcing with worker and task privacy protection.
GeoInformatica, 2018

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Generation Comp. Syst., 2018

DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access, 2018

A Privacy-Preserving Framework for Trust-Oriented Point-of-Interest Recommendation.
IEEE Access, 2018

Camel: Content-Aware and Meta-path Augmented Metric Learning for Author Identification.
Proceedings of the 2018 World Wide Web Conference on World Wide Web, 2018

Randomizing SVM Against Adversarial Attacks Under Uncertainty.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Dynamic Embeddings for User Profiling in Twitter.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Multi-label Learning with Highly Incomplete Data via Collaborative Embedding.
Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2018

Task-Guided and Semantic-Aware Ranking for Academic Author-Paper Correlation Inference.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

Mining Streaming and Temporal Data: from Representation to Knowledge.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

MOSS-5: A Fast Method of Approximating Counts of 5-Node Graphlets in Large Graphs (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

KDE-Track: An Efficient Dynamic Density Estimator for Data Streams (Extended Abstract).
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Spatio-Temporal Attention based Recurrent Neural Network for Next Location Prediction.
Proceedings of the IEEE International Conference on Big Data, 2018

Mining top-k Popular Datasets via a Deep Generative Model.
Proceedings of the IEEE International Conference on Big Data, 2018

WalkRanker: A Unified Pairwise Ranking Model With Multiple Relations for Item Recommendation.
Proceedings of the Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
An effective suggestion method for keyword search of databases.
World Wide Web, 2017

KDE-Track: An Efficient Dynamic Density Estimator for Data Streams.
IEEE Trans. Knowl. Data Eng., 2017

The Interaction Between Schema Matching and Record Matching in Data Integration.
IEEE Trans. Knowl. Data Eng., 2017

Delve: A Dataset-Driven Scholarly Search and Analysis System.
SIGKDD Explorations, 2017

Approximately Counting Triangles in Large Graph Streams Including Edge Duplicates with a Fixed Memory Usage.
PVLDB, 2017

Privacy-Preserving Task Assignment in Spatial Crowdsourcing.
J. Comput. Sci. Technol., 2017

Web-ADARE: A web-aided data repairing system.
Neurocomputing, 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Generation Comp. Syst., 2017

An up-to-date comparison of state-of-the-art classification algorithms.
Expert Syst. Appl., 2017

ESearch: Incorporating Text Corpus and Structured Knowledge for Open Domain Entity Search.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Collaborative User Network Embedding for Social Recommender Systems.
Proceedings of the 2017 SIAM International Conference on Data Mining, 2017

Delve: A Data Set Retrieval and Document Analysis System.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2017

Modeling Temporal Behavior of Awards Effect on Viewership of Movies.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

The Interaction Between Schema Matching and Record Matching in Data Integration (Extended Abstract).
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

When Differential Privacy Meets Randomized Perturbation: A Hybrid Approach for Privacy-Preserving Recommender System.
Proceedings of the Database Systems for Advanced Applications, 2017

ImWalkMF: Joint matrix factorization and implicit walk integrative learning for recommendation.
Proceedings of the 2017 IEEE International Conference on Big Data, BigData 2017, 2017

Marmite: Spreading Malicious File Reputation Through Download Graphs.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Optimizing Cost of Continuous Overlapping Queries over Data Streams by Filter Adaption.
IEEE Trans. Knowl. Data Eng., 2016

Large margin classification with indefinite similarities.
Machine Learning, 2016

Modeling and predicting AD progression by regression analysis of sequential clinical data.
Neurocomputing, 2016

Detecting Anomaly in Traffic Flow from Road Similarity Analysis.
Proceedings of the Web-Age Information Management - 17th International Conference, 2016

Is Attribute-Based Zero-Shot Learning an Ill-Posed Strategy?
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2016

Learning from Your Network of Friends: A Trajectory Representation Learning Model Based on Online Social Ties.
Proceedings of the IEEE 16th International Conference on Data Mining, 2016

TRIP: An interactive retrieving-inferring data imputation approach.
Proceedings of the 32nd IEEE International Conference on Data Engineering, 2016

CrowdAidRepair: A Crowd-Aided Interactive Data Repairing Method.
Proceedings of the Database Systems for Advanced Applications, 2016

Content-Agnostic Malware Detection in Heterogeneous Malicious Distribution Graph.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

Minimizing User Involvement for Learning Human Mobility Patterns from Location Traces.
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
Addressing Instance Ambiguity in Web Harvesting.
Proceedings of the 18th International Workshop on Web and Databases, 2015

A PCA-Based Change Detection Framework for Multidimensional Data Streams: Change Detection in Multidimensional Data Streams.
Proceedings of the 21th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2015

A Scalable Community Detection Algorithm for Large Graphs Using Stochastic Block Models.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Efficient Active Learning of Halfspaces via Query Synthesis.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Maximum error-bounded Piecewise Linear Representation for online stream approximation.
VLDB J., 2014

Data Stream Clustering With Affinity Propagation.
IEEE Trans. Knowl. Data Eng., 2014

Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Information Forensics and Security, 2014

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks.
Knowl.-Based Syst., 2014

Exploring the significance of human mobility patterns in social link prediction.
Proceedings of the Symposium on Applied Computing, 2014

Anti-discrimination Analysis Using Privacy Attack Strategies.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2014

TideWatch: Fingerprinting the cyclicality of big data workloads.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Overcoming Semantic Drift in Information Extraction.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

A New Study of Two Divergence Metrics for Change Detection in Data Streams.
Proceedings of the ECAI 2014 - 21st European Conference on Artificial Intelligence, 18-22 August 2014, Prague, Czech Republic, 2014

Cost Reduction for Web-Based Data Imputation.
Proceedings of the Database Systems for Advanced Applications, 2014

Adding Robustness to Support Vector Machines Against Adversarial Reverse Engineering.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Support vector machines with indefinite kernels.
Proceedings of the Sixth Asian Conference on Machine Learning, 2014

2013
Foreword to the Special Focus on Mathematics, Data and Knowledge.
Mathematics in Computer Science, 2013

Securing Recommender Systems Against Shilling Attacks Using Social-Based Clustering.
J. Comput. Sci. Technol., 2013

Video Quality Prediction over Wireless 4G.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2013

Controlling Attribute Effect in Linear Regression.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Local correlation detection with linearity enhancement in streaming data.
Proceedings of the 22nd ACM International Conference on Information and Knowledge Management, 2013

2012
Understanding and analyzing network traffic.
IEEE Network, 2012

Modeling and Clustering Users with Evolving Profiles in Usage Streams.
Proceedings of the 19th International Symposium on Temporal Representation and Reasoning, 2012

Virtual machine migration in an over-committed cloud.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

Discovering Highly Informative Feature Set over High Dimensions.
Proceedings of the IEEE 24th International Conference on Tools with Artificial Intelligence, 2012

A direction Change-based algorithm for polygonal approximation.
Proceedings of the 21st International Conference on Pattern Recognition, 2012

Multiplicative Algorithms for Constrained Non-negative Matrix Factorization.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Decision Theory for Discrimination-Aware Classification.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Efficient estimation of dynamic density functions with an application to outlier detection.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

A Mouse-Trajectory Based Model for Predicting Query-URL Relevance.
Proceedings of the Twenty-Sixth AAAI Conference on Artificial Intelligence, 2012

2011
Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Network, 2011

High-speed web attack detection through extracting exemplars from HTTP traffic.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Analysis and Modeling of Social Influence in High Performance Computing Workloads.
Proceedings of the Euro-Par 2011 Parallel Processing - 17th International Conference, 2011

2010
Abstracting Audit Data for Lightweight Intrusion Detection.
Proceedings of the Information Systems Security - 6th International Conference, 2010

K-AP: Generating Specified K Clusters by Efficient Affinity Propagation.
Proceedings of the ICDM 2010, 2010

Adaptively detecting changes in Autonomic Grid Computing.
Proceedings of the 2010 11th IEEE/ACM International Conference on Grid Computing, 2010

Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Constructing attribute weights from computer audit data for effective intrusion detection.
Journal of Systems and Software, 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Network and Computer Applications, 2009

Toward autonomic grids: analyzing the job flow with affinity streaming.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Attribute Normalization in Network Intrusion Detection.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Multi-scale Real-Time Grid Monitoring with Job Stream Mining.
Proceedings of the 9th IEEE/ACM International Symposium on Cluster Computing and the Grid, 2009

2008
Processing of massive audit data streams for real-time anomaly intrusion detection.
Computer Communications, 2008

Distributed and Incremental Clustering Based on Weighted Affinity Propagation.
Proceedings of the STAIRS 2008, 2008

Data Streaming with Affinity Propagation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2008

2007
Toward Behavioral Modeling of a Grid System: Mining the Logging and Bookkeeping Files.
Proceedings of the Workshops Proceedings of the 7th IEEE International Conference on Data Mining (ICDM 2007), 2007

2006
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Computers & Security, 2006

2004
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004


  Loading...