Name
Papers
Collaborators
X. SEAN WANG
157
234
Citations 
PageRank 
Referers 
2598
382.56
4756
Referees 
References 
2230
1893
Search Limit
1001000
Title
Citations
PageRank
Year
Demonstration of Accelerating Machine Learning Inference Queries with Correlative Proxy Models.00.342022
Optimizing Machine Learning Inference Queries with Correlative Proxy Models.00.342022
Learning-Based Optimization for Online Approximate Query Processing00.342022
Staged query graph generation based on answer type for question answering over knowledge base00.342022
Optimizing Machine Learning Inference Queries with Correlative Proxy Models.00.342022
A Smart Framework for Fine-Grained Microphone Acoustic Permission Management00.342021
An Agile Sample Maintenance Approach for Agile Analytics00.342020
POLYTOPE: a flexible sampling system for answering exploratory queries10.342020
senDroid: Auditing Sensor Access in Android System-Wide10.372020
Answering unique topic queries with dynamic threshold.00.342019
A Full-Spectrum Blockchain-as-a-Service for Business Collaboration10.352019
An Automatic Illustration Recommendation System.00.342019
DESC: enabling secure data exchange based on smart contracts.70.602018
Finding maximal ranges with unique topics in a text database.10.352018
Unique Topic Query Processing On Cloud00.342018
A System for Exploratory Analysis in Cloud00.342018
Entity Suggestion with Conceptual Expanation.10.352017
Camera-Recognizable and Human-Invisible Labelling for Privacy Protection00.342016
Semi-Homogenous Generalization: Improving Homogenous Generalization for Privacy Preservation in Cloud Computing.30.402016
revDroid: Code Analysis of the Side Effects after Dynamic Permission Revocation of Android Apps.80.482016
Converting Spatiotemporal Data Among Heterogeneous Granularity Systems10.402016
Editorial for the special issue on advanced information systems for the Web00.342014
Large Scale Real-time Ridesharing with Service Guarantee on Road Networks.00.342014
Cost-Based Optimization Of Logical Partitions For A Query Workload In A Hadoop Data Warehouse00.342014
Cost-Based Join Algorithm Selection In Hadoop20.362014
How to share data securely00.342013
Vetting undesirable behaviors in android apps with permission use analysis1343.692013
Tracking the Dynamic Distribution of People in Indoor Space with Noisy Partitioning Sensors00.342012
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies632.422011
Reusing Relational Queries for Intuitive Decision Optimization80.812011
Panel: research agenda for data and application security00.342011
In-Device Spatial Cloaking for Mobile User Privacy Assisted by the Cloud151.192010
Finding One-Of Probably Nearest Neighbors with Minimum Location Updates00.342010
Evaluating privacy threats in released database views by symmetric indistinguishability20.362009
Privacy in Location-Based Applications, Research Issues and Emerging Trends [This book was partially born out of the First International Workshop on Privacy in Location-Based Applications (PiLBA 2008) held in Malaga, Spain, in October 2008, in conjunction with the 13th European Symposium on Research in Computer Security]90.542009
ProvidentHider: An Algorithm to Preserve Historical k-Anonymity in LBS150.712009
AnonTwist: Nearest Neighbor Querying with Both Location Privacy and K-anonymity for Mobile Users100.632009
Anonymity and Historical-Anonymity in Location-Based Services230.882009
A decisions query language (DQL): high-level abstraction for mathematical programming over databases100.882009
Proactive and reactive multi-dimensional histogram maintenance for selectivity estimation30.402008
Mining partial periodic correlations in time series80.482008
On the Impact of User Movement Simulations in the Evaluation of LBS Privacy- Preserving Techniques110.672008
Authorization in trust management: Features and foundations331.512008
Proceedings of the 1st International Workshop on Privacy in Location-Based Applications, Malaga, Spain, October 9, 200880.842008
Continually answering constraint k-NN queries in unstructured P2P systems00.342008
Risk management for distributed authorization60.482007
A Weighted Moving Average-based Approach for Cleaning Sensor Data351.652007
Adaptive-Size Reservoir Sampling over Data Streams200.812007
Global Visualizaiton and Comparision of DNA Sequences by Use of Three-Dimensional Trajectories00.342007
The Role of Quasi-identifiers in k-Anonymity Revisited60.662006
  • 1
  • 2