Остановите войну!
for scientists:
default search action
Wendy Hui Wang
- > Home > Persons > Wendy Hui Wang
Publications
- 2024
- [c62]Junjie Chen, Jiahao Li, Chen Song, Bin Li, Qingcai Chen, Hongchang Gao, Wendy Hui Wang, Zenglin Xu, Xinghua Shi:
Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks. AAAI 2024: 11338-11345 - 2023
- [j21]Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang:
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. Proc. Priv. Enhancing Technol. 2023(4): 149-169 (2023) - [c61]Xiuling Wang, Wendy Hui Wang:
Link Membership Inference Attacks against Unsupervised Graph Representation Learning. ACSAC 2023: 477-491 - [c60]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. ICDM 2023: 980-985 - [c59]Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang:
Certified Edge Unlearning for Graph Neural Networks. KDD 2023: 2606-2617 - [i11]Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning:
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. CoRR abs/2310.12350 (2023) - 2022
- [c58]Da Zhong, Haipei Sun, Jun Xu, Neil Zhenqiang Gong, Wendy Hui Wang:
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures. AsiaCCS 2022: 959-974 - [c57]Kun Wu, Jacob Erickson, Wendy Hui Wang, Yue Ning:
Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding. ASONAM 2022: 171-175 - [c56]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CCS 2022: 2871-2884 - [c55]Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang:
Towards Fair and Robust Classification. EuroS&P 2022: 356-376 - [c54]Xiuling Wang, Wendy Hui Wang:
Providing Item-side Individual Fairness for Deep Recommender Systems. FAccT 2022: 117-127 - [c53]Yanying Li, Xiuling Wang, Yue Ning, Hui Wang:
FairLP: Towards Fair Link Prediction on Social Network Graphs. ICWSM 2022: 628-639 - [i10]Xiuling Wang, Wendy Hui Wang:
Group Property Inference Attacks Against Graph Neural Networks. CoRR abs/2209.01100 (2022) - 2021
- [j20]Boxiang Dong, Zhengzhang Chen, Lu-An Tang, Haifeng Chen, Hui Wang, Kai Zhang, Ying Lin, Zhichun Li:
Anomalous Event Sequence Detection. IEEE Intell. Syst. 36(3): 5-13 (2021) - [j19]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
CorrectMR: Authentication of Distributed SQL Execution on MapReduce. IEEE Trans. Knowl. Data Eng. 33(3): 897-908 (2021) - [j18]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. IEEE Trans. Knowl. Data Eng. 33(4): 1601-1618 (2021) - [c52]Junjie Chen, Wendy Hui Wang, Hongchang Gao, Xinghua Shi:
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks. KDD 2021: 127-137 - [c51]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services. ECML/PKDD (2) 2021: 583-598 - [c50]Junjie Chen, Wendy Hui Wang, Xinghua Shi:
Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data. PSB 2021 - [c49]Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Wendy Hui Wang, Ting Yu:
CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. RAID 2021: 205-219 - [c48]Haipei Sun, Yiding Yang, Yanying Li, Huihui Liu, Xinchao Wang, Wendy Hui Wang:
Automating Fairness Configurations for Machine Learning. WWW (Companion Volume) 2021: 193-201 - [i9]Boxiang Dong, Wendy Hui Wang, Aparna S. Varde, Dawei Li, Bharath K. Samanthula, Weifeng Sun, Liang Zhao:
Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss. CoRR abs/2103.09713 (2021) - [i8]Boxiang Dong, Bo Zhang, Wendy Hui Wang:
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version). CoRR abs/2107.00495 (2021) - 2020
- [j17]Boxiang Dong, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
Authenticated Outlier Mining for Outsourced Databases. IEEE Trans. Dependable Secur. Comput. 17(2): 222-235 (2020) - [c47]Bo Zhang, Boxiang Dong, Haipei Sun, Wendy Hui Wang:
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. CODASPY 2020: 121-132 - [c46]Yanying Li, Haipei Sun, Wendy Hui Wang:
Towards Fair Truth Discovery from Biased Crowdsourced Answers. KDD 2020: 599-607 - [c45]Yanying Li, Yue Ning, Rong Liu, Ying Wu, Wendy Hui Wang:
Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending. WWW (Companion Volume) 2020: 733-742 - [i7]Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang:
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack. CoRR abs/2001.08855 (2020) - 2019
- [c44]Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Wendy Hui Wang, Ting Yu:
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. CCS 2019: 703-717 - 2018
- [j16]Boxiang Dong, Wendy Hui Wang:
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model. Data Knowl. Eng. 116: 1-20 (2018) - [j15]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. Proc. VLDB Endow. 12(4): 362-375 (2018) - [c43]Haipei Sun, Boxiang Dong, Wendy Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE BigData 2018: 488-497 - [c42]Haipei Sun, Boxiang Dong, Bo Zhang, Wendy Hui Wang, Murat Kantarcioglu:
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. ICDE 2018: 377-388 - [c41]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
AssureMR: Verifiable SQL Execution on MapReduce. ICDE 2018: 1228-1231 - [i6]Haipei Sun, Boxiang Dong, Hui Wang, Ting Yu, Zhan Qin:
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. CoRR abs/1808.08181 (2018) - [i5]Bo Zhang, Boxiang Dong, Hui Wang:
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. CoRR abs/1808.08313 (2018) - [i4]Yanying Li, Haipei Sun, Boxiang Dong, Wendy Hui Wang:
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. CoRR abs/1808.09545 (2018) - 2017
- [c40]Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen:
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. CIKM 2017: 707-715 - [c39]Bo Zhang, Boxiang Dong, Wendy Hui Wang:
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations. DBSec 2017: 311-324 - [c38]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [c37]Boxiang Dong, Wendy Hui Wang:
Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases. ICDE 2017: 721-732 - [c36]Boxiang Dong, Wendy Hui Wang:
EARRING: Efficient Authentication of Outsourced Record Matching. IRI 2017: 225-234 - 2016
- [j14]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm. IEEE Trans. Serv. Comput. 9(1): 18-32 (2016) - [c34]Boxiang Dong, Wendy Hui Wang, Jie Yang:
Secure Data Outsourcing with Adversarial Data Dependency Constraints. BigDataSecurity/HPSC/IDS 2016: 73-78 - [c33]Anna Monreale, Wendy Hui Wang:
Privacy-Preserving Outsourcing of Data Mining. COMPSAC Workshops 2016: 583-588 - [c32]Boxiang Dong, Wendy Hui Wang:
ARM: Authenticated Approximate Record Matching for Outsourced Databases. IRI 2016: 591-600 - [i3]Boxiang Dong, Wendy Hui Wang:
Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. CoRR abs/1603.00893 (2016) - [i2]Boxiang Dong, Hui Wang:
Efficient Authentication of Outsourced String Similarity Search. CoRR abs/1603.02727 (2016) - [i1]Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Haifeng Chen, Guofei Jiang:
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems. CoRR abs/1608.02639 (2016) - 2015
- [j13]Wendy Hui Wang, Ruilin Liu:
Hiding outliers into crowd: Privacy-preserving data publishing with outliers. Data Knowl. Eng. 100: 94-115 (2015) - [c31]Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining. SDM 2015: 244-252 - 2014
- [j12]Hongbo Liu, Hui Wang, Yingying Chen, Dayong Jia:
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks. ACM Trans. Sens. Networks 10(3): 49:1-49:37 (2014) - [c30]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
PraDa: Privacy-preserving Data-Deduplication-as-a-Service. CIKM 2014: 1559-1568 - [c29]Ruilin Liu, Guan Wang, Wendy Hui Wang, Flip Korn:
iCoDA: Interactive and exploratory data completeness analysis. ICDE 2014: 1226-1229 - [c28]Ruilin Liu, Wendy Hui Wang, Changhe Yuan:
Result Integrity Verification of Outsourced Bayesian Network Structure Learning. SDM 2014: 713-721 - 2013
- [j11]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, Timos K. Sellis:
Optimizing XML queries: Bitmapped materialized views vs. indexes. Inf. Syst. 38(6): 863-884 (2013) - [j10]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases. IEEE Syst. J. 7(3): 385-395 (2013) - [j8]Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu:
Neighborhood prediction based decentralized key management for mobile wireless networks. Wirel. Networks 19(6): 1387-1406 (2013) - [c27]Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Preserving Distributed Movement Data Aggregation. AGILE Conf. 2013: 225-245 - [c26]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Result Integrity Verification of Outsourced Frequent Itemset Mining. DBSec 2013: 258-265 - [c25]Boxiang Dong, Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee. ICDM 2013: 1025-1030 - [c24]Ruilin Liu, Philippos Mordohai, Wendy Hui Wang, Hui Xiong:
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers. SDM 2013: 632-640 - [c23]Francesca Pratesi, Anna Monreale, Hui Wang, Salvatore Rinzivillo, Dino Pedreschi, Gennady L. Andrienko, Natalia V. Andrienko:
Privacy-Aware Distributed Mobility Data Analytics. SEBD 2013: 329-342 - 2012
- [c21]Flip Korn, Ruilin Liu, Wendy Hui Wang:
Understanding Data Completeness in Network Monitoring Systems. ICDM 2012: 359-368 - [c20]Ruilin Liu, Wendy Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo:
AUDIO: An Integrity Auditing Framework of Outlier-Mining-as-a-Service Systems. ECML/PKDD (2) 2012: 1-18 - [c19]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. SEBD 2012: 233-242 - 2011
- [j6]Wendy Hui Wang, Ruilin Liu:
Privacy-preserving publishing microdata with full functional dependencies. Data Knowl. Eng. 70(3): 249-268 (2011) - [j5]Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Trajectory anonymity in publishing personal mobility data. SIGKDD Explor. 13(1): 30-42 (2011) - [j4]Ruilin Liu, Xiuyuan Zheng, Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks. Wirel. Networks 17(8): 1833-1850 (2011) - [c18]Wendy Hui Wang, Ruilin Liu, Dimitri Theodoratos, Xiaoying Wu:
Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems. SSDBM 2011: 109-128 - [p2]Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang:
Privacy-Preserving Data Mining from Outsourced Databases. Computers, Privacy and Data Protection 2011: 411-426 - 2010
- [j3]Yingying Chen, Wendy Hui Wang, Xiuyuan Zheng, Jie Yang:
A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks. EURASIP J. Wirel. Commun. Netw. 2010 (2010) - [c16]Chih-Cheng Chang, Brian Thompson, Wendy Hui Wang, Danfeng Yao:
Towards publishing recommendation data with predictive anonymization. AsiaCCS 2010: 24-35 - [c15]Angela Bonifati, Wendy Hui Wang, Ruilin Liu:
SPac: a distributed, peer-to-peer, secure and privacy-aware social space. CIKM 2010: 1953-1954 - [c14]Wendy Hui Wang, Ruilin Liu:
Privacy-Preserving Publishing Data with Full Functional Dependencies. DASFAA (2) 2010: 176-183 - [c13]Angela Bonifati, Ruilin Liu, Wendy Hui Wang:
Distributed and Secure Access Control in P2P Databases. DBSec 2010: 113-129 - [c12]Hongbo Liu, Wendy Hui Wang, Yingying Chen:
Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks. DCOSS 2010: 201-215 - [c11]Ruilin Liu, Wendy Hui Wang:
Privacy-preserving data publishing. ICDE Workshops 2010: 305-308 - [c10]Xiuyuan Zheng, Wendy Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu:
A decentralized key management scheme via neighborhood prediction in mobile wireless networks. MASS 2010: 51-60 - 2009
- [c9]Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang:
Answering XML queries using materialized views revisited. CIKM 2009: 475-484 - [c8]Ruilin Liu, Wendy Hui Wang:
Integrity Verification of Outsourced XML Databases. CSE (3) 2009: 207-212 - [c7]Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Wendy Hui Wang:
Anonymizing moving objects: how to hide a MOB in a crowd? EDBT 2009: 72-83 - [c6]Wendy Hui Wang, Ruilin Liu:
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers. EDBT 2009: 624-635 - 2007
- [j1]Nicolas Bruno, Wendy Hui Wang:
The Threshold Algorithm: From Middleware Systems to the Relational Engine. IEEE Trans. Knowl. Data Eng. 19(4): 523-537 (2007) - [p1]Wendy Hui Wang, Divesh Srivastava, Laks V. S. Lakshmanan, SungRan Cho, Sihem Amer-Yahia:
Optimizing Tree Pattern Queries over Secure XML Databases. Secure Data Management in Decentralized Systems 2007: 127-165 - 2006
- [c4]Wendy Hui Wang, Laks V. S. Lakshmanan:
Efficient Secure Query Evaluation over Encrypted XML Databases. VLDB 2006: 127-138 - [c3]Laks V. S. Lakshmanan, Wendy Hui Wang, Zheng (Jessica) Zhao:
Answering Tree Pattern Queries Using Views. VLDB 2006: 571-582 - [c2]Wendy Hui Wang, Laks V. S. Lakshmanan:
Probabilistic privacy analysis of published views. WPES 2006: 81-84 - 2004
- [c1]Laks V. S. Lakshmanan, Ganesh Ramesh, Wendy Hui Wang, Zheng (Jessica) Zhao:
On Testing Satisfiability of Tree Pattern Queries. VLDB 2004: 120-131
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-26 20:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint