According to our database1, Xiaoyun He authored at least 18 papers between 2008 and 2019.
Legend:Book In proceedings Article PhD thesis Other
国家电网边缘计算信息系统安全风险评估方法研究 (Research on Security Risk Assessment Method of State Grid Edge Computing Information System).
Mining Public Opinion about Economic Issues: Twitter and the U.S. Presidential Election.
Fault-tolerant tile mining.
Expert Syst. Appl., 2018
Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site.
The Effects of Consumer Engagement Behavior on the Growth of Social Media Brand Community: Evidence from an SME.
ShadowPWD: practical browser-based password manager with a security token.
Proceedings of the ACM Turing 50th Celebration Conference, 2017
Catch a Fad or Capture a Value?: Social Media Leverage in SMEs.
What Makes Video Ads Viral: Quantifying the Impact of Marketer- and User-Generated Content.
Proceedings of the 22nd Americas Conference on Information Systems, 2016
Structure-aware graph anonymization.
Web Intell. Agent Syst., 2012
Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012
Secure construction and publication of contingency tables from distributed data.
J. Comput. Secur., 2011
Privacy Preserving Integration of Health Care Data.
Int. J. Comput. Model. Algorithms Medicine, 2010
Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010
Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009
Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009
Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008