Xiaoyun He

According to our database1, Xiaoyun He authored at least 19 papers between 2007 and 2018.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Mining Public Opinion about Economic Issues: Twitter and the U.S. Presidential Election.
IJSDS, 2018

Fault-tolerant tile mining.
Expert Syst. Appl., 2018

Mining Public Opinion about Economic Issues: Twitter and the U.S. Presidential Election.
CoRR, 2018

2017
Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site.
IJWBC, 2017

The Effects of Consumer Engagement Behavior on the Growth of Social Media Brand Community: Evidence from an SME.
IJEBR, 2017

ShadowPWD: practical browser-based password manager with a security token.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Catch a Fad or Capture a Value?: Social Media Leverage in SMEs.
JOEUC, 2016

What Makes Video Ads Viral: Quantifying the Impact of Marketer- and User-Generated Content.
Proceedings of the 22nd Americas Conference on Information Systems, 2016

2012
Structure-aware graph anonymization.
Web Intelligence and Agent Systems, 2012

Privacy Preserving Maximum-Flow Computation in Distributed Graphs.
Proceedings of the 2012 International Conference on Privacy, 2012

2011
Secure construction and publication of contingency tables from distributed data.
Journal of Computer Security, 2011

2010
Privacy Preserving Integration of Health Care Data.
IJCMAM, 2010

Reachability Analysis in Privacy-Preserving Perturbed Graphs.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

2009
Preserving Privacy in Social Networks: A Structure-Aware Approach.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Efficient Privacy-Preserving Link Discovery.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2009

Effective anonymization of query logs.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Privacy-preserving link discovery.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

Secure Construction of Contingency Tables from Distributed Data.
Proceedings of the Data and Applications Security XXII, 2008

2007
Privacy Preserving Integration of Health Care Data.
Proceedings of the AMIA 2007, 2007


  Loading...