default search action
Ke Wang 0001
Person information
- affiliation: Simon Fraser University, Burnaby, BC, Canada
- affiliation (former): Georgia Institute of Technology, Atlanta, GA, USA
Other persons with the same name
- Ke Wang — disambiguation page
- Ke Wang 0002 — Harbin Institute of Technology, Department of Mathematics, Weihai, China (and 1 more)
- Ke Wang 0003 — Hong Kong University of Science and Technology, Jockey Club Institute for Advanced Study, Hong Kong (and 2 more)
- Ke Wang 0004 — Shanghai University, School of Management, China (and 1 more)
- Ke Wang 0005 — Beijing University of Technology, College of Electronic and Control Engineering, China (and 2 more)
- Ke Wang 0006 — National University of Singapore, NUS Graduate School for Integrative Sciences and Engineering, Singapore
- Ke Wang 0007 — RMIT University, School of Engineering, Melbourne, Australia (and 1 more)
- Ke Wang 0008 — Chang'an University, School of Highway, Xi'an, China
- Ke Wang 0009 — Columbia University, New York, NY, USA
- Ke Wang 0010 — PLA University of Science and Technology, Department of Satellite Communications, Nanjing, China
- Ke Wang 0011 — University of Virginia, Department of Computer Science, Charlottesville, VA, USA
- Ke Wang 0012 — Intel (and 1 more)
- Ke Wang 0013 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering / MoE Key Laboratory of Universal Wireless Communications, China
- Ke Wang 0014 — Chinese Academy of Sciences, Institute of Electrical Engineering, Key Laboratory of Power Electronics and Electric Drive, Beijing, China
- Ke Wang 0015 — China Electric Power Research Institute, Electric Automation Department, Nanjing, China
- Ke Wang 0016 — Zhejiang University, Institute of Remote Sensing and Information System Application / College of Environmental and Resource Sciences, Hangzhou, China
- Ke Wang 0017 — Chongqing University, State Key Laboratory of Mechanical Transmission, China
- Ke Wang 0018 — Xian University of Architecture and Technology, School of Management, China
- Ke Wang 0019 — Nanjing University of Aeronautics and Astronautics, School of Electronic and Information Engineering, China
- Ke Wang 0020 — University of Glasgow, School of Engineering, UK
- Ke Wang 0021 — University of North Carolina, Department of Computer Science, Chapel Hill, NC, USA
- Ke Wang 0023 — China University of Geosciences, Wuhan, China (and 1 more)
- Ke Wang 0024 — Chongqing University, College of Computer Science, China
- Ke Wang 0025 — Zhejiang University of Technology, College of Information Engineering, China
- Ke Wang 0026 — Shanghai University, School of Mechatronic Engineering and Automation, China
- Ke Wang 0027 — Shandong University of Science and Technology, College of Geomatics, Qingdao, China
- Ke Wang 0028 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, Harbin, China
- Ke Wang 0029 — Harbin Institute of Technology, Instrument Science and Technology, China
- Ke Wang 0030 — George Washington University, Department of Electrical and Computer Engineering, Washington, DC, USA
- Ke Wang 0031 — Sichuan University, College of Mathematics, Chengdu, China
- Ke Wang 0032 — Hohai University, State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering, Nanjing, China
- Ke Wang 0033 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Ke Wang 0034 — Zhejiang University, Institute of VLSI Design, China
- Ke Wang 0035 — University of California Santa Barbara, Department of Statistics and Applied Probability, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c112]Amirhossein Ansari, Ke Wang, Pulei Xiong:
Out-of-Distribution Aware Classification for Tabular Data. CIKM 2024: 65-75 - [c111]Anandharaju Durai Raju, Ke Wang:
Low Carbon Footprint Training for 1D-CNNs with Temporal Max-Pooling. CIKM 2024: 549-559 - 2023
- [j46]Lovedeep Gondara, Ke Wang:
PubSub-ML: A Model Streaming Alternative to Federated Learning. Proc. Priv. Enhancing Technol. 2023(2): 464-479 (2023) - [j45]Yongjie Wang, Ke Wang, Cheng Long, Chunyan Miao:
Summarizing User-item Matrix By Group Utility Maximization. ACM Trans. Knowl. Discov. Data 17(6): 86:1-86:22 (2023) - [c110]Ziqi Xu, Debo Cheng, Jiuyong Li, Jixue Liu, Lin Liu, Ke Wang:
Disentangled Representation for Causal Mediation Analysis. AAAI 2023: 10666-10674 - [c109]Ziqi Xu, Jixue Liu, Debo Cheng, Jiuyong Li, Lin Liu, Ke Wang:
Disentangled Representation with Causal Constraints for Counterfactual Fairness. PAKDD (1) 2023: 471-482 - [c108]Ricardo Silva Carvalho, Theodore Vasiloudis, Oluwaseyi Feyisetan, Ke Wang:
TEM: High Utility Metric Differential Privacy on Text. SDM 2023: 883-890 - [i21]Ziqi Xu, Debo Cheng, Jiuyong Li, Jixue Liu, Lin Liu, Ke Wang:
Disentangled Representation for Causal Mediation Analysis. CoRR abs/2302.09694 (2023) - 2022
- [j44]Weipeng Lin, Ke Wang, Zhilin Zhang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Cheng Long, Chunyan Miao:
Towards Secure and Efficient Equality Conjunction Search Over Outsourced Databases. IEEE Trans. Cloud Comput. 10(2): 1445-1461 (2022) - [j43]Yonghui Xu, Shengjie Sun, Huiguo Zhang, Chang'an Yi, Yuan Miao, Dong Yang, Xiaonan Meng, Yi Hu, Ke Wang, Huaqing Min, Hengjie Song, Chuanyan Miao:
Time-Aware Graph Embedding: A Temporal Smoothness and Task-Oriented Approach. ACM Trans. Knowl. Discov. Data 16(3): 56:1-56:23 (2022) - [c107]Ricardo Silva Carvalho, Ke Wang, Lovedeep Singh Gondara:
Incorporating Item Frequency for Differentially Private Set Union. AAAI 2022: 9504-9511 - [c106]Anandharaju Durai Raju, Ke Wang:
LockBoost: Detecting Malware Binaries by Locking False Alarms. IJCNN 2022: 1-8 - [c105]Zhenlong Xu, Ziqi Xu, Jixue Liu, Debo Cheng, Jiuyong Li, Lin Liu, Ke Wang:
Assessing Classifier Fairness with Collider Bias. PAKDD (2) 2022: 262-276 - [c104]Lovedeep Gondara, Ke Wang, Ricardo Silva Carvalho:
Differentially Private Ensemble Classifiers for Data Streams. WSDM 2022: 325-333 - [i20]Ziqi Xu, Jixue Liu, Debo Cheng, Jiuyong Li, Lin Liu, Ke Wang:
Disentangled Representation with Causal Constraints for Counterfactual Fairness. CoRR abs/2208.09147 (2022) - 2021
- [j42]Yuncheng Wu, Ke Wang, Ruoyang Guo, Zhilin Zhang, Dan Zhao, Hong Chen, Cuiping Li:
Enhanced Privacy Preserving Group Nearest Neighbor Search. IEEE Trans. Knowl. Data Eng. 33(2): 459-473 (2021) - [c103]Yongjie Wang, Qinxu Ding, Ke Wang, Yue Liu, Xingyu Wu, Jinglong Wang, Yong Liu, Chunyan Miao:
The Skyline of Counterfactual Explanations for Machine Learning Decision Models. CIKM 2021: 2030-2039 - [c102]Lovedeep Gondara, Ricardo Silva Carvalho, Ke Wang:
Training Differentially Private Neural Networks with Lottery Tickets. ESORICS (2) 2021: 543-562 - [c101]Yongjie Wang, Ke Wang, Cheng Long, Chunyan Miao:
Summarizing User-Item Matrix By Group Utility Maximization. ICDM 2021: 1409-1414 - [i19]Anandharaju Durai Raju, Ke Wang:
Echelon: Two-Tier Malware Detection for Raw Executables to Reduce False Alarms. CoRR abs/2101.01015 (2021) - [i18]Lovedeep Gondara, Ke Wang, Ricardo Silva Carvalho:
Differentially Private Ensemble Classifiers for Data Streams. CoRR abs/2112.04640 (2021) - 2020
- [c100]Yue Wang, Ke Wang, Chunyan Miao:
Truth Discovery against Strategic Sybil Attack in Crowdsourcing. KDD 2020: 95-104 - [c99]Lovedeep Gondara, Ke Wang:
Differentially Private Survival Function Estimation. MLHC 2020: 271-291 - [c98]Jiaxi Tang, Hongyi Wen, Ke Wang:
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems. RecSys 2020: 318-327 - [c97]Lovedeep Gondara, Ke Wang:
Differentially Private Small Dataset Release Using Random Projections. UAI 2020: 639-648 - [c96]Ricardo Silva Carvalho, Ke Wang, Lovedeep Gondara, Chunyan Miao:
Differentially Private Top-k Selection via Stability on Unknown Domain. UAI 2020: 1109-1118 - [i17]Lovedeep Gondara, Ke Wang, Ricardo Silva Carvalho:
The Differentially Private Lottery Ticket Mechanism. CoRR abs/2002.11613 (2020) - [i16]Yonghui Xu, Shengjie Sun, Yuan Miao, Dong Yang, Xiaonan Meng, Yi Hu, Ke Wang, Hengjie Song, Chuanyan Miao:
Time-aware Graph Embedding: A temporal smoothness and task-oriented approach. CoRR abs/2007.11164 (2020) - [i15]Jiaxi Tang, Hongyi Wen, Ke Wang:
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems. CoRR abs/2008.04876 (2020) - [i14]Zhenlong Xu, Jixue Liu, Debo Cheng, Jiuyong Li, Lin Liu, Ke Wang:
Assessing the Fairness of Classifiers with Collider Bias. CoRR abs/2010.03933 (2020)
2010 – 2019
- 2019
- [c95]Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Practical Access Pattern Privacy by Combining PIR and Oblivious Shuffle. CIKM 2019: 1331-1340 - [c94]Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. SoCC 2019: 287-298 - [c93]Weipeng Lin, Ke Wang, Zhilin Zhang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Cheng Long:
Class Indistinguishability for Outsourcing Equality Conjunction Search. CLOUD 2019: 253-270 - [c92]Amin Milani Fard, Ebrahim Bagheri, Ke Wang:
Relationship Prediction in Dynamic Heterogeneous Information Networks. ECIR (1) 2019: 19-34 - [i13]Lovedeep Gondara, Ke Wang:
Differentially Private Survival Function Estimation. CoRR abs/1910.05108 (2019) - [i12]Zhilin Zhang, Ke Wang, Weipeng Lin, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Repeatable Oblivious Shuffling of Large Outsourced Data Blocks. IACR Cryptol. ePrint Arch. 2019: 71 (2019) - 2018
- [j41]Jun Chen, Yueguo Chen, Xiangling Zhang, Xiaoyong Du, Ke Wang, Ji-Rong Wen:
Entity set expansion with semantic features of knowledge graphs. J. Web Semant. 52-53: 33-44 (2018) - [c91]Zhilin Zhang, Ke Wang, Chen Lin, Weipeng Lin:
Secure Top-k Inner Product Retrieval. CIKM 2018: 77-86 - [c90]Ying Liu, Hui Peng, Yuncheng Wu, Juru Zeng, Hong Chen, Ke Wang, Weiling Lai, Cuiping Li:
Secure Data Aggregation with Integrity Verification in Wireless Sensor Networks. DASFAA (1) 2018: 717-733 - [c89]Yuncheng Wu, Ke Wang, Zhilin Zhang, Weipeng Lin, Hong Chen, Cuiping Li:
Privacy Preserving Group Nearest Neighbor Search. EDBT 2018: 277-288 - [c88]Jiaxi Tang, Ke Wang:
Ranking Distillation: Learning Compact Ranking Models With High Performance for Recommender System. KDD 2018: 2289-2298 - [c87]Lovedeep Gondara, Ke Wang:
MIDA: Multiple Imputation Using Denoising Autoencoders. PAKDD (3) 2018: 260-272 - [c86]Hongwei Liang, Ke Wang:
Top-k Route Search through Submodularity Modeling of Recurrent POI Features. SIGIR 2018: 545-554 - [c85]Jiaxi Tang, Ke Wang:
Personalized Top-N Sequential Recommendation via Convolutional Sequence Embedding. WSDM 2018: 565-573 - [i11]Lovedeep Gondara, Ke Wang:
Recovering Loss to Followup Information Using Denoising Autoencoders. CoRR abs/1802.04664 (2018) - [i10]Jiaxi Tang, Ke Wang:
Personalized Top-N Sequential Recommendation via Convolutional Sequence Embedding. CoRR abs/1809.07426 (2018) - [i9]Jiaxi Tang, Ke Wang:
Ranking Distillation: Learning Compact Ranking Models With High Performance for Recommender System. CoRR abs/1809.07428 (2018) - 2017
- [j40]Minhao Jiang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang:
READS: A Random Walk Approach for Efficient and Accurate Dynamic SimRank. Proc. VLDB Endow. 10(9): 937-948 (2017) - [c84]Lovedeep Gondara, Ke Wang:
Recovering loss to followup information using denoising autoencoders. IEEE BigData 2017: 1936-1945 - [c83]Weipeng Lin, Ke Wang, Zhilin Zhang, Hong Chen:
Revisiting Security Risks of Asymmetric Scalar Product Preserving Encryption and Its Variants. ICDCS 2017: 1116-1125 - [c82]Xiangling Zhang, Yueguo Chen, Jun Chen, Xiaoyong Du, Ke Wang, Ji-Rong Wen:
Entity Set Expansion via Knowledge Graphs. SIGIR 2017: 1101-1104 - [i8]Lovedeep Gondara, Ke Wang:
Multiple Imputation Using Deep Denoising Autoencoders. CoRR abs/1705.02737 (2017) - 2016
- [j39]Ke Wang, Peng Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Generalized bucketization scheme for flexible privacy settings. Inf. Sci. 348: 377-393 (2016) - [j38]Chenyi Zhang, Ke Wang:
POI recommendation through cross-region collaborative filtering. Knowl. Inf. Syst. 46(2): 369-387 (2016) - [j37]Xiaoning Xu, Chuancong Gao, Jian Pei, Ke Wang, Abdullah Al-Barakati:
Continuous similarity search for evolving queries. Knowl. Inf. Syst. 48(3): 649-678 (2016) - [j36]Junqiang Liu, Ke Wang, Benjamin C. M. Fung:
Mining High Utility Patterns in One Phase without Generating Candidates. IEEE Trans. Knowl. Data Eng. 28(5): 1245-1257 (2016) - [j35]Wei Xie, Feida Zhu, Jing Jiang, Ee-Peng Lim, Ke Wang:
TopicSketch: Real-Time Bursty Topic Detection from Twitter. IEEE Trans. Knowl. Data Eng. 28(8): 2216-2229 (2016) - [j34]Chenyi Zhang, Hongwei Liang, Ke Wang:
Trip Recommendation Meets Real-World Constraints: POI Availability, Diversity, and Traveling Time Uncertainty. ACM Trans. Inf. Syst. 35(1): 5:1-5:28 (2016) - [c81]Hongwei Liang, Ke Wang, Feida Zhu:
Mining social ties beyond homophily. ICDE 2016: 421-432 - 2015
- [j33]Loc Do, Hady Wirawan Lauw, Ke Wang:
Mining Revenue-Maximizing Bundling Configuration. Proc. VLDB Endow. 8(5): 593-604 (2015) - [j32]Shuaiqiang Wang, Yun Wu, Byron J. Gao, Ke Wang, Hady Wirawan Lauw, Jun Ma:
A Cooperative Coevolution Framework for Parallel Learning to Rank. IEEE Trans. Knowl. Data Eng. 27(12): 3152-3165 (2015) - [j31]Amin Milani Fard, Ke Wang:
Neighborhood randomization for link privacy in social network analysis. World Wide Web 18(1): 9-32 (2015) - [c80]Chenyi Zhang, Ke Wang, Ee-Peng Lim, Qinneng Xu, Jianling Sun, Hongkun Yu:
Are Features Equally Representative? A Feature-Centric Recommendation. AAAI 2015: 389-395 - [c79]Chao Han, Ke Wang:
Sensitive Disclosures under Differential Privacy Guarantees. BigData Congress 2015: 110-117 - [c78]Wei Xie, Feida Zhu, Siyuan Liu, Ke Wang:
Modelling cascades over time in microblogs. IEEE BigData 2015: 677-686 - [c77]Yue Wang, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
KeyLabel algorithms for keyword search in large graphs. IEEE BigData 2015: 857-864 - [c76]Chenyi Zhang, Hongwei Liang, Ke Wang, Jianling Sun:
Personalized Trip Recommendation with POI Availability and Uncertain Traveling Time. CIKM 2015: 911-920 - [c75]Ke Wang, Chao Han, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Philip S. Yu:
Reconstruction Privacy: Enabling Statistical Learning. EDBT 2015: 469-480 - [c74]Lei Dong, Xuan Chen, Jianxiang Zhu, Hong Chen, Ke Wang, Cuiping Li:
A Secure Collusion-Aware and Probability-Aware Range Query Processing in Tiered Sensor Networks. SRDS 2015: 110-119 - 2014
- [j30]Ada Wai-Chee Fu, Ke Wang, Raymond Chi-Wing Wong, Jia Wang, Minhao Jiang:
Small sum privacy and large sum utility in data publishing. J. Biomed. Informatics 50: 20-31 (2014) - [c73]Chenyi Zhang, Xueyi Zhao, Ke Wang, Jianling Sun:
Content + Attributes: A Latent Factor Model for Recommending Scientific Papers in Heterogeneous Academic Networks. ECIR 2014: 39-50 - [c72]Xiaoying Zhang, Hong Chen, Ke Wang, Hui Peng, Yongjian Fan, Deying Li:
Rotation-based privacy-preserving data aggregation in wireless sensor networks. ICC 2014: 4184-4189 - [c71]Chenyi Zhang, Ke Wang, Hongkun Yu, Jianling Sun, Ee-Peng Lim:
Latent Factor Transition for Dynamic Collaborative Filtering. SDM 2014: 452-460 - [p3]Chenyi Zhang, Jianling Sun, Ke Wang:
Latent Tunnel Based Information Propagation in Microblog Networks. Social Network Analysis 2014: 219-241 - 2013
- [j29]Rui Chen, Benjamin C. M. Fung, Noman Mohammed, Bipin C. Desai, Ke Wang:
Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231: 83-97 (2013) - [j28]Junqiang Liu, Ke Wang:
Anonymizing bag-valued sparse data by semantic similarity-based clustering. Knowl. Inf. Syst. 35(2): 435-461 (2013) - [j27]Yubao Liu, Raymond Chi-Wing Wong, Ke Wang, Zhijie Li, Cheng Chen, Zitong Chen:
A new approach for maximizing bichromatic reverse nearest neighbor search. Knowl. Inf. Syst. 36(1): 23-58 (2013) - [j26]Deepak Agarwal, Rich Caruana, Jian Pei, Ke Wang:
Introduction to the Special Issue ACM SIGKDD 2012. ACM Trans. Knowl. Discov. Data 7(3): 9:1-9:2 (2013) - [c70]Chenyi Zhang, Jianling Sun, Ke Wang:
Information propagation in microblog networks. ASONAM 2013: 190-196 - [c69]Wei Xie, Feida Zhu, Jing Jiang, Ee-Peng Lim, Ke Wang:
TopicSketch: Real-Time Bursty Topic Detection from Twitter. ICDM 2013: 837-846 - [c68]Cheng Long, Raymond Chi-Wing Wong, Ke Wang, Ada Wai-Chee Fu:
Collective spatial keyword queries: a distance owner-driven approach. SIGMOD Conference 2013: 689-700 - [c67]Peng Zhao, Xue Li, Ke Wang:
Feature Extraction from Micro-blogs for Comparison of Products and Services. WISE (1) 2013: 82-91 - 2012
- [j25]Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang:
Quality and Leniency in Online Collaborative Rating Systems. ACM Trans. Web 6(1): 4:1-4:27 (2012) - [c66]Amin Milani Fard, Ke Wang, Philip S. Yu:
Limiting link disclosure in social network analysis through subgraph-wise perturbation. EDBT 2012: 109-119 - [c65]Junqiang Liu, Ke Wang, Benjamin C. M. Fung:
Direct Discovery of High Utility Itemsets without Candidate Generation. ICDM 2012: 984-989 - [i7]Ke Wang, Chao Han, Ada Wai-Chee Fu:
Randomization Resilient To Sensitive Reconstruction. CoRR abs/1202.3179 (2012) - [i6]Ada Wai-Chee Fu, Jia Wang, Ke Wang, Raymond Chi-Wing Wong:
Small Count Privacy and Large Count Utility in Data Publishing. CoRR abs/1202.3253 (2012) - [i5]Ke Wang, Peng Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Inferential or Differential: Privacy Laws Dictate. CoRR abs/1202.3686 (2012) - 2011
- [j24]Rong She, Jeffrey Shih-Chieh Chu, Bora Uyar, Jun Wang, Ke Wang, Nansheng Chen:
genBlastG: using BLAST searches to build homologous gene models. Bioinform. 27(15): 2141-2143 (2011) - [j23]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Philip S. Yu, Jian Pei:
Can the Utility of Anonymized Data be Used for Privacy Breaches? ACM Trans. Knowl. Discov. Data 5(3): 16:1-16:24 (2011) - [c64]Shuaiqiang Wang, Byron J. Gao, Ke Wang, Hady Wirawan Lauw:
CCRank: Parallel Learning to Rank with Cooperative Coevolution. AAAI 2011: 1249-1254 - [c63]Zhengzheng Xing, Jian Pei, Philip S. Yu, Ke Wang:
Extracting Interpretable Features for Early Classification on Time Series. SDM 2011: 247-258 - [c62]Shuaiqiang Wang, Byron J. Gao, Ke Wang, Hady Wirawan Lauw:
Parallel learning to rank for information retrieval. SIGIR 2011: 1083-1084 - 2010
- [j22]Benjamin C. M. Fung, Ke Wang, Rui Chen, Philip S. Yu:
Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4): 14:1-14:53 (2010) - [c61]Junqiang Liu, Ke Wang:
On optimal anonymization for l+-diversity. ICDE 2010: 213-224 - [c60]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu:
Global privacy guarantee in serial data publishing. ICDE 2010: 956-959 - [c59]Junqiang Liu, Ke Wang:
Enforcing Vocabulary k-Anonymity by Semantic Similarity Based Clustering. ICDM 2010: 899-904 - [c58]Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-Chee Fu:
Anonymizing Temporal Data. ICDM 2010: 1109-1114 - [c57]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Probabilistic Inference Protection on Anonymized Data. ICDM 2010: 1127-1132 - [c56]Junqiang Liu, Ke Wang:
Anonymizing Transaction Data by Integrating Suppression and Generalization. PAKDD (1) 2010: 171-180 - [c55]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Publishing Skewed Sensitive Microdata. SDM 2010: 84-93 - [c54]Rong She, Jeffrey Shih-Chieh Chu, Ke Wang, Nansheng Chen:
Fast and Accurate Gene Prediction by Decision Tree Classification. SDM 2010: 790-801 - [c53]Amin Milani Fard, Ke Wang:
An Effective Clustering Approach to Web Query Log Anonymization. SECRYPT 2010: 109-119 - [p2]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates over Private Tables. Strategic Advancements in Utilizing Data Mining and Warehousing Technologies 2010: 256-276 - [i4]Amin Milani Fard, Ke Wang:
An Effective Clustering Approach to Web Query Log Anonymization. CoRR abs/1012.0663 (2010)
2000 – 2009
- 2009
- [j21]Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung:
Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) - [j20]Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang:
(alpha, k)-anonymous data publishing. J. Intell. Inf. Syst. 33(2): 209-234 (2009) - [j19]Xinghuo Zeng, Jian Pei, Ke Wang, Jinyan Li:
PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining. Knowl. Inf. Syst. 20(3): 375-391 (2009) - [j18]Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang:
Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009) - [j17]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei:
Anonymization-based attacks in privacy-preserving data publishing. ACM Trans. Database Syst. 34(2): 8:1-8:46 (2009) - [c52]Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu:
Online anonymity for personalized web services. CIKM 2009: 1497-1500 - [c51]Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung:
Privacy-preserving data mashup. EDBT 2009: 228-239 - [c50]Ke Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139 - [c49]Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang:
On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061 - [r1]Benjamin C. M. Fung, Ke Wang, Martin Ester:
Hierarchical Document Clustering. Encyclopedia of Data Warehousing and Mining 2009: 970-975 - [i3]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu:
Preserving Individual Privacy in Serial Data Publishing. CoRR abs/0903.0682 (2009) - [i2]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu:
Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755 (2009) - [i1]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Anonymization with Worst-Case Distribution-Based Background Knowledge. CoRR abs/0909.1127 (2009) - 2008
- [j16]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates Over Private Tables. Int. J. Data Warehous. Min. 4(4): 22-41 (2008) - [j15]Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang:
Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008) - [c48]Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei:
Anonymity for continuous data publishing. EDBT 2008: 264-275 - [c47]Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen:
OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667 - [c46]Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei:
Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 - [c45]Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi:
A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 - [c44]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu:
Anonymizing transaction databases for publication. KDD 2008: 767-775 - [p1]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei:
Privacy-Preserving Data Stream Classification. Privacy-Preserving Data Mining 2008: 487-510 - 2007
- [j14]Ke Wang, Benjamin C. M. Fung, Philip S. Yu:
Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007) - [j13]Moonjung Cho, Jian Pei, Ke Wang:
Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007) - [j12]Benjamin C. M. Fung, Ke Wang, Philip S. Yu:
Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) - [c43]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88 - [c42]Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang:
Mining favorable facets. KDD 2007: 804-813 - [c41]Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang:
Summarizing Review Scores of "Unequal" Reviewers. SDM 2007: 539-544 - [c40]Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang:
Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5 - [c39]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei:
Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554 - [c38]Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen:
Privacy-enhancing personalized web search. WWW 2007: 591-600 - 2006
- [j11]Irene Pekerskaya, Jian Pei, Ke Wang:
Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006) - [j10]Jian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu:
Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006) - [c37]Ke Wang, Yabo Xu, Rong She, Philip S. Yu:
Classification Spanning Private Databases. AAAI 2006: 293-298 - [c36]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei:
Classification spanning correlated data streams. CIKM 2006: 132-141 - [c35]Ke Wang, Yuelong Jiang, Alexander Tuzhilin:
Mining Actionable Patterns by Role Models. ICDE 2006: 16 - [c34]Ke Wang, Benjamin C. M. Fung:
Anonymizing sequential releases. KDD 2006: 414-423 - [c33]Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang:
Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630 - [c32]Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang:
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759 - 2005
- [j9]Ke Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung:
Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005) - [j8]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang:
Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005) - [j7]Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han:
Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005) - [j6]Senqiang Zhou, Ke Wang:
Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005) - [c31]Benjamin C. M. Fung, Ke Wang, Philip S. Yu:
Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216 - [c30]Ke Wang, Benjamin C. M. Fung, Philip S. Yu:
Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473 - [c29]Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang:
Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616 - [c28]Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu:
Mining Patterns That Respond to Actions. ICDM 2005: 669-672 - [c27]Jian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang:
Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756 - [c26]Ke Wang, Benjamin C. M. Fung, Guozhu Dong:
Integrating Private Databases for Data Analysis. ISI 2005: 171-182 - [c25]Rong She, Ke Wang, Yabo Xu, Philip S. Yu:
Pushing Feature Selection Ahead Of Join. SDM 2005: 536-540 - [c24]Ke Wang, Yabo Xu, Philip S. Yu, Rong She:
Building Decision Trees on Records Linked through Key References. SDM 2005: 576-580 - 2004
- [j5]Qiang Yang, Tianyi Li, Ke Wang:
Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004) - [j4]Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou:
Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004) - [c23]Ke Wang, Yabo Xu, Jeffrey Xu Yu:
Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187 - [c22]Ke Wang, Philip S. Yu, Sourav Chakraborty:
Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256 - 2003
- [j3]Qiang Yang, Tianyiian Li, Ke Wang:
Web-Log Cleaning for Constructing Sequential Classifiers. Appl. Artif. Intell. 17(5-6): 431-441 (2003) - [j2]Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman:
PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Res. 31(13): 3613-3617 (2003) - [j1]Ke Wang, Yu He, Jiawei Han:
Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003) - [c21]Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han:
Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302 - [c20]Ke Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang:
Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740 - [c19]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang:
MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378 - [c18]Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan:
Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255 - [c17]Rong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman:
Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445 - [c16]Benjamin C. M. Fung, Ke Wang, Martin Ester:
Hierarchical Document Clustering using Frequent Itemsets. SDM 2003: 59-70 - [c15]Ke Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu:
Mining Changes of Classification by Correspondence Tracing. SDM 2003: 95-106 - 2002
- [c14]Ke Wang, Senqiang Zhou, Jiawei Han:
Profit Mining: From Patterns to Actions. EDBT 2002: 70-87 - [c13]Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang:
Mining Association Rules from Stars. ICDM 2002: 322-329 - [c12]Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han:
Mining frequent item sets by opportunistic projection. KDD 2002: 229-238 - [c11]Ke Wang, Liu Tang, Jiawei Han, Junqiang Liu:
Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340 - [c10]Jiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang:
CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626 - 2001
- [c9]Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal:
Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88 - [c8]Sonny Han Seng Chee, Jiawei Han, Ke Wang:
RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151 - [c7]Ke Wang, Senqiang Zhou, Yu He:
Hierarchical Classification of Real Life Documents. SDM 2001: 1-16 - [c6]Jiawei Han, Jian Pei, Guozhu Dong, Ke Wang:
Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12 - [c5]Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang:
Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330 - [c4]Ian Tian-Yi Li, Qiang Yang, Ke Wang:
Classification Pruning for Web-request Prediction. WWW Posters 2001 - 2000
- [c3]Ke Wang, Senqiang Zhou, Yu He:
Growing decision trees on support-less association rules. KDD 2000: 265-269 - [c2]Ke Wang, Yu He, Jiawei Han:
Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52
1990 – 1999
- 1999
- [c1]Ke Wang, Senqiang Zhou, Shiang Chen Liew:
Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint