Xiaoyang Sean Wang

According to our database1, Xiaoyang Sean Wang
  • authored at least 152 papers between 1986 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2017
Privacy Threats in Location-Based Services.
Proceedings of the Encyclopedia of GIS., 2017

Socialized policy administration.
Computers & Security, 2017

Entity Suggestion with Conceptual Expanation.
Proceedings of the Twenty-Sixth International Joint Conference on Artificial Intelligence, 2017

An Adaptive Data Partitioning Scheme for Accelerating Exploratory Spark SQL Queries.
Proceedings of the Database Systems for Advanced Applications, 2017

2016
Semi-Homogenous Generalization: Improving Homogenous Generalization for Privacy Preservation in Cloud Computing.
J. Comput. Sci. Technol., 2016

Special Issue Editorial.
Data Science and Engineering, 2016

Converting spatiotemporal data among multiple granularity systems.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Camera-Recognizable and Human-Invisible Labelling for Privacy Protection.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

On Implementing a Text-Database-as-a-Service.
Proceedings of the IEEE International Conference on Web Services, 2016

Converting spatiotemporal data Among heterogeneous granularity systems.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Entity Suggestion by Example using a Conceptual Taxonomy.
CoRR, 2015

2014
Editorial for the special issue on advanced information systems for the Web.
World Wide Web, 2014

Evaluation of Range Queries With Predicates on Moving Objects.
IEEE Trans. Knowl. Data Eng., 2014

Large Scale Real-time Ridesharing with Service Guarantee on Road Networks.
PVLDB, 2014

Cost-Based Join Algorithm Selection in Hadoop.
Proceedings of the Web Information Systems Engineering - WISE 2014, 2014

Cost-Based Optimization of Logical Partitions for a Query Workload in a Hadoop Data Warehouse.
Proceedings of the Web Technologies and Applications - 16th Asia-Pacific Web Conference, 2014

2013
Large Scale Real-time Ridesharing with Service Guarantee on Road Networks
CoRR, 2013

Regional Co-locations of Arbitrary Shapes.
Proceedings of the Advances in Spatial and Temporal Databases, 2013

How to Share Data Securely.
Proceedings of the Web Engineering - 13th International Conference, 2013

LogKV: Exploiting Key-Value Stores for Log Processing.
Proceedings of the CIDR 2013, 2013

Vetting undesirable behaviors in android apps with permission use analysis.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

AppIntent: analyzing sensitive data transmission in android for privacy leakage detection.
Proceedings of the 2013 ACM SIGSAC Conference on Computer and Communications Security, 2013

2012
Supporting Agile Organizations with a Decision Guidance Query Language.
J. of Management Information Systems, 2012

Tracking the Dynamic Distribution of People in Indoor Space with Noisy Partitioning Sensors.
Proceedings of the 13th IEEE International Conference on Mobile Data Management, 2012

2011
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies.
VLDB J., 2011

Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets
CoRR, 2011

Reusing Relational Queries for Intuitive Decision Optimization.
Proceedings of the 44th Hawaii International International Conference on Systems Science (HICSS-44 2011), 2011

Panel: research agenda for data and application security.
Proceedings of the First ACM Conference on Data and Application Security and Privacy, 2011

2010
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
CoRR, 2010

In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

Finding One-Of Probably Nearest Neighbors with Minimum Location Updates.
Proceedings of the Eleventh International Conference on Mobile Data Management, 2010

2009
Time Series Query.
Proceedings of the Encyclopedia of Database Systems, 2009

Temporal Granularity.
Proceedings of the Encyclopedia of Database Systems, 2009

Evaluating privacy threats in released database views by symmetric indistinguishability.
Journal of Computer Security, 2009

Energy-Efficient Dynamic Spatial Resolution Control for Wireless Sensor Clusters.
IJDSN, 2009

A decisions query language (DQL): high-level abstraction for mathematical programming over databases.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2009

AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users.
Proceedings of the MDM 2009, 2009

ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS.
Proceedings of the MDM 2009, 2009

Privacy-Aware Proximity Based Services.
Proceedings of the MDM 2009, 2009

Anonymity and Historical-Anonymity in Location-Based Services.
Proceedings of the Privacy in Location-Based Applications, 2009

2008
Privacy Threats in Location-Based Services.
Proceedings of the Encyclopedia of GIS., 2008

Privacy Protection through Anonymity in Location-based Services.
Proceedings of the Handbook of Database Security - Applications and Trends, 2008

Mining partial periodic correlations in time series.
Knowl. Inf. Syst., 2008

Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation.
Journal of Systems and Software, 2008

Continually Answering Constraint k - NN Queries in Unstructured P2P Systems.
J. Comput. Sci. Technol., 2008

Aggregation in sensor networks with a user-provided quality of service goal.
Inf. Sci., 2008

Authorization in trust management: Features and foundations.
ACM Comput. Surv., 2008

How Anonymous Is k-Anonymous? Look at Your Quasi-ID.
Proceedings of the Secure Data Management, 5th VLDB Workshop, 2008

Decision-Guidance Management Systems (DGMS): Seamless Integration of Data Acquisition, Learning, Prediction and Optimization.
Proceedings of the 41st Hawaii International International Conference on Systems Science (HICSS-41 2008), 2008

On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques.
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, 2008

2007
Spatial generalisation algorithms for LBS privacy preservation.
J. Location Based Services, 2007

Risk management for distributed authorization.
Journal of Computer Security, 2007

Supporting Temporal Reasoning by Mapping Calendar Expressions to Minimal Periodic Sets.
J. Artif. Intell. Res., 2007

Reservoir Sampling over Memory-Limited Stream Joins.
Proceedings of the 19th International Conference on Scientific and Statistical Database Management, 2007

Adaptive-Size Reservoir Sampling over Data Streams.
Proceedings of the 19th International Conference on Scientific and Statistical Database Management, 2007

Anonymity in Location-Based Services: Towards a General Framework.
Proceedings of the 8th International Conference on Mobile Data Management (MDM 2007), 2007

A Weighted Moving Average-based Approach for Cleaning Sensor Data.
Proceedings of the 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), 2007

2006
Looking into the seeds of time: Discovering temporal patterns in large transaction sets.
Inf. Sci., 2006

Trust but verify: Authorization for web services.
Comput. Syst. Sci. Eng., 2006

The Role of Quasi-identifiers in k-Anonymity Revisited
CoRR, 2006

Finding the Plateau in an Aggregated Time Series.
Proceedings of the Advances in Web-Age Information Management, 2006

k-Anonymity in Databases with Timestamped Data.
Proceedings of the 13th International Symposium on Temporal Representation and Reasoning (TIME 2006), 2006

Indistinguishability: The Other Aspect of Privacy.
Proceedings of the Secure Data Management, Third VLDB Workshop, SDM 2006, Seoul, Korea, 2006

Location-aware key predistribution scheme for wide area wireless sensor networks.
Proceedings of the 4th ACM Workshop on Security of ad hoc and Sensor Networks, 2006

Answering Constrained k-NN Queries in Unstructured P2P Systems.
Proceedings of the Databases, 2006

2005
Continuous Similarity-Based Queries on Streaming Time Series.
IEEE Trans. Knowl. Data Eng., 2005

Evaluating Trigger Conditions on Streaming Time Series with User-given Quality Requirements.
J. UCS, 2005

Information Release Control: A Learning-Based Architecture.
J. Data Semantics, 2005

Checking for k-Anonymity Violation by Views.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Protecting Privacy Against Location-Based Personal Identification.
Proceedings of the Secure Data Management, 2005

Quality-driven evaluation of trigger conditions on streaming time series.
Proceedings of the 2005 ACM Symposium on Applied Computing (SAC), 2005

A predictive QoS control strategy for wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

Feature Selection for Building Cost-Effective Data Stream Classifiers.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Risk assessment in distributed authorization.
Proceedings of the 2005 ACM workshop on Formal methods in security engineering, 2005

2004
Reasoning with advanced policy rules and its application to access control.
Int. J. on Digital Libraries, 2004

Mapping Calendar Expressions into Periodical Granularities.
Proceedings of the 11th International Symposium on Temporal Representation and Reasoning (TIME 2004), 2004

Trust but verify: authorization for web services.
Proceedings of the 1st ACM Workshop On Secure Web Services, 2004

Condition Evaluation for Speculative Systems: a Streaming Time Series Case.
Proceedings of the Spatio-Temporal Database Management, 2004

Identifying Sensitive Associations in Databases for Release Control.
Proceedings of the Secure Data Management, VLDB 2004 Workshop, 2004

Expressing and Optimizing Similarity-Based Queries in SQL.
Proceedings of the Conceptual Modeling, 2004

Adaptive Enterprise Optimization Framework: AEO Server and AEO Studio.
Proceedings of the Principles and Practice of Constraint Programming, 2004

2003
Supporting Movement Pattern Queries in User-Specified Scales.
IEEE Trans. Knowl. Data Eng., 2003

Provisions and Obligations in Policy Rule Management.
J. Network Syst. Manage., 2003

Discovering calendar-based temporal association rules.
Data Knowl. Eng., 2003

Efficient Evaluation of Composite Correlations for Streaming Time Series.
Proceedings of the Advances in Web-Age Information Management, 2003

A Learning-based Approach to Information Release Control.
Proceedings of the Integrity and Internal Control in Information Systems VI, 2003

Using Triangle Inequality to Efficiently Process Continuous Queries on High-Dimensional Streaming Time Series.
Proceedings of the 15th International Conference on Scientific and Statistical Database Management (SSDBM 2003), 2003

A learning-based approach to estimate statistics of operators in continuous queries: a case study.
Proceedings of the 8th ACM SIGMOD workshop on Research issues in data mining and knowledge discovery, 2003

An Open XML IP Search Portal Prototype.
Proceedings of the International Conference on Embedded Systems and Applications, 2003

Intrusion Detection in Distributed Systems - An Abstraction-Based Approach
Advances in Information Security 9, Springer, 2003

2002
High-Dimensional Nearest Neighbor Search with Remote Data Centers.
Knowl. Inf. Syst., 2002

Enhancing Profiles for Anomaly Detection Using Time Granularities.
Journal of Computer Security, 2002

Managing Scientific Metadata Using XML.
IEEE Internet Computing, 2002

Temporal Reasoning in Workflow Systems.
Distributed and Parallel Databases, 2002

Design and implementation of a decentralized prototype system for detecting distributed attacks.
Computer Communications, 2002

An Algebraic Representation of Calendars.
Ann. Math. Artif. Intell., 2002

Solving multi-granularity temporal constraint networks.
Artif. Intell., 2002

Provisions and Obligations in Policy Management and Security Applications.
Proceedings of the VLDB 2002, 2002

Continually evaluating similarity-based pattern queries on a streaming time series.
Proceedings of the 2002 ACM SIGMOD International Conference on Management of Data, 2002

Optimizing relational store for e-catalog queries: a data mining approach.
Proceedings of the 2002 ACM Symposium on Applied Computing (SAC), 2002

Obligation Monitoring in Policy Management.
Proceedings of the 3rd International Workshop on Policies for Distributed Systems and Networks (POLICY 2002), 2002

Improving the Performance of Continuous Queries on Fast Data Streams: Time Series Case.
Proceedings of the 2002 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2002

Evaluating continuous nearest neighbor queries for streaming time series via pre-fetching.
Proceedings of the 2002 ACM CIKM International Conference on Information and Knowledge Management, 2002

Auditing Interval-Based Inference.
Proceedings of the Advanced Information Systems Engineering, 14th International Conference, 2002

2001
Indexing very high-dimensional sparse and quasi-sparse vectors for similarity searches.
VLDB J., 2001

Abstraction-based intrusion detection in distributed environments.
ACM Trans. Inf. Syst. Secur., 2001

Discovering Calendar-based Temporal Association Rules.
Proceedings of the Eigth International Symposium on Temporal Representation and Reasoning, 2001

An XML-Based Distributed Metadata Server (DIMES) Supporting Earth Science Metadata.
Proceedings of the 13th International Conference on Scientific and Statistical Database Management, 2001

Minimizing Agent Synchronization in Workflow Systems with Temporal Constraints.
Proceedings of the Nono Convegno Nazionale Sistemi Evoluti per Basi di Dati, 2001

2000
Modeling requests among cooperating intrusion detection systems.
Computer Communications, 2000

Discovering Sequential Patterns from Non-Uniform Databases.
Proceedings of the Web-Age Information Management, First International Conference, 2000

Value Range Queries on Earth Science Data via Histogram Clustering.
Proceedings of the Temporal, 2000

Discovering Temporal Patterns in Multiple Granularities.
Proceedings of the Temporal, 2000

Free Schedules for Free Agents in Workflow Systems.
Proceedings of the Seventh International Workshop on Temporal Representation and Reasoning, 2000

Supporting Content-Based Searches on Time Series via Approximation.
Proceedings of the 12th International Conference on Scientific and Statistical Database Management, 2000

CARDS: A Distributed System for Detecting Coordinated Attacks.
Proceedings of the Information Security for Global Information Infrastructures, 2000

Multilevel Filtering for High Dimensional Nearest Neighbor Search.
Proceedings of the 2000 ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery, 2000

Constraints, Inference Channels and Secure Databases.
Proceedings of the Principles and Practice of Constraint Programming, 2000

Supporting Subseries Nearest Neighbor Search via Approximation.
Proceedings of the 2000 ACM CIKM International Conference on Information and Knowledge Management, 2000

Time granularities in databases, data mining, and temporal reasoning.
Springer, ISBN: 978-3-540-66997-5, 2000

1999
Deriving Orthogonality to Optimize the Search for Summary Data.
Inf. Syst., 1999

Remote Data Access via the SIESIP Distributed Information System.
SSDBM, 1999

1998
Discovering Frequent Event Patterns with Multiple Granularities in Time Sequences.
IEEE Trans. Knowl. Data Eng., 1998

Temporal Semantic Assumptions and Their Use in Databases.
IEEE Trans. Knowl. Data Eng., 1998

Regular Sequence Operations and Their Use in Database Queries.
J. Comput. Syst. Sci., 1998

Temporal Mediators: Supporting Uniform Accesses to Heterogeneous Temporal Information.
International Journal on Artificial Intelligence Tools, 1998

Incremental View Maintenance By Base Relation Tagging in Distributed Databases.
Distributed and Parallel Databases, 1998

Mining Temporal Relationships with Multiple Granularities in Time Sequences.
IEEE Data Eng. Bull., 1998

A General Framework for Time Granularity and Its Application to Temporal Reasoning.
Ann. Math. Artif. Intell., 1998

A Pyramid Data Model for Supporting Content-Based Browsing and Knowledge Discovery.
Proceedings of the 10th International Conference on Scientific and Statistical Database Management, 1998

Information Technology Implementation for a Distributed Data System Serving Earth Scientists: Seasonal to Interannual ESIP.
Proceedings of the 10th International Conference on Scientific and Statistical Database Management, 1998

Abstraction-Based Misuse Detection: High-Level Specifications and Adaptable Strategies.
Proceedings of the 11th IEEE Computer Security Foundations Workshop, 1998

Supporting Fast Search in Time Series for Movement Patterns in Multiple Scales.
Proceedings of the 1998 ACM CIKM International Conference on Information and Knowledge Management, 1998

1997
Logical Design for Temporal Databases with Multiple Granularities.
ACM Trans. Database Syst., 1997

Information Systems Research at George Mason University.
SIGMOD Record, 1997

The Virtual Domain Application Data Center: Serving Interdisciplinary Earth Scientists.
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997

Temporal Database Bibliography Update.
Temporal Databases, Dagstuhl, 1997

An Architecture for Supporting Interoperability among Temporal Databases.
Temporal Databases, Dagstuhl, 1997

A Glossary of Time Granularity Concepts.
Temporal Databases, Dagstuhl, 1997

Satisfiability of Quantitative Temporal Constraints with Multiple Granularities.
Proceedings of the Principles and Practice of Constraint Programming - CP97, Third International Conference, Linz, Austria, October 29, 1997

1996
A General Framework and Reasoning Model for Time Granularity.
Proceedings of the Third International Workshop on Temporal Representation and Reasoning, 1996

Optimizing Statistical Queries by Exploiting Orthogonality and Interval Properties of Grouping Relations.
Proceedings of the Eighth International Conference on Scientific and Statistical Database Management, 1996

Testing Complex Temporal Relationships Involving Multiple Granularities and Its Application to Data Mining.
Proceedings of the Fifteenth ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1996

A Data Model for Supporting On-Line Analytical Processing.
Proceedings of the CIKM '96, Proceedings of the Fifth International Conference on Information and Knowledge Management, November 12, 1996

1995
Temporal Modules: An Approach Toward Federated Temporal Databases.
Inf. Sci., 1995

Semantic Assumptions and Query Evaluation in Temporal Databases.
Proceedings of the 1995 ACM SIGMOD International Conference on Management of Data, 1995

Algebraic Query Languages on Temporal Databases with Multiple Time Granularities.
Proceedings of the CIKM '95, Proceedings of the 1995 International Conference on Information and Knowledge Management, November 28, 1995

1993
Content-Related Interval Queries on Object Histories
Inf. Comput., March, 1993

Temporal Modules: An Approach Toward Federated Temporal Databases.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

1992
Pattern Matching by Rs-Operations: Toward a Unified Approach to Querying Sequenced Data.
Proceedings of the Eleventh ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems, 1992

1986
Specification Methodology: An Integrated Relational Approach.
Softw., Pract. Exper., 1986


  Loading...