Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Roland Zumkeller
Maximilian Dürr
Dan Graur
Liangliang Shang
Yuan Liu
Chen Ma
Barbara Aquilani
Brian Reardon
Manoj Wadekar
Home
/
Author
/
WENDY HUI WANG
Author Info
Open Visualization
Name
Affiliation
Papers
WENDY HUI WANG
Stevens Institute of Technology, Castle Point on Hudson, Hoboken, NJ 07030, USA
31
Collaborators
Citations
PageRank
55
133
13.82
Referers
Referees
References
372
799
418
Search Limit
100
799
Publications (31 rows)
Collaborators (55 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
Group Property Inference Attacks Against Graph Neural Networks
0
0.34
2022
VeriDL: Integrity Verification of Outsourced Deep Learning Services
0
0.34
2021
CorrectMR: Authentication of Distributed SQL Execution on MapReduce
1
0.36
2021
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks
0
0.34
2021
Automating Fairness Configurations for Machine Learning
0
0.34
2021
Anomalous Event Sequence Detection
1
0.34
2021
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data
0
0.34
2020
Fairness of Classification Using Users’ Social Relationships in Online Peer-To-Peer Lending
0
0.34
2020
Towards Fair Truth Discovery from Biased Crowdsourced Answers
2
0.37
2020
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers
1
0.34
2018
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
0
0.34
2018
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
3
0.39
2017
EARRING: Efficient Authentication of Outsourced Record Matching
0
0.34
2017
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm
4
0.40
2016
Leveraging Crowd for Game-based Learning: A Case Study of Privacy Education Game Design and Evaluation by Crowdsourcing.
0
0.34
2016
Similarity Recoverable, Format-Preserving String Encryption.
0
0.34
2016
ARM: Authenticated Approximate Record Matching for Outsourced Databases
0
0.34
2016
Secure Data Outsourcing with Adversarial Data Dependency Constraints
0
0.34
2016
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining.
1
0.37
2015
Hiding outliers into crowd: Privacy-preserving data publishing with outliers
0
0.34
2015
iCoDA: Interactive and exploratory data completeness analysis
0
0.34
2014
Result Integrity Verification of Outsourced Bayesian Network Structure Learning.
2
0.37
2014
PraDa: Privacy-preserving Data-Deduplication-as-a-Service
3
0.39
2014
Privacy-Preserving Distributed Movement Data Aggregation.
8
0.76
2013
Integrity Verification Of Outsourced Frequent Itemset Mining With Deterministic Guarantee
0
0.34
2013
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers.
6
0.49
2013
Optimizing XML queries: Bitmapped materialized views vs. indexes
4
0.38
2013
Result integrity verification of outsourced frequent itemset mining
4
0.46
2013
A decentralized key management scheme via neighborhood prediction in mobile wireless networks
3
0.40
2010
Anonymizing moving objects: how to hide a MOB in a crowd?
74
2.40
2009
Answering XML queries using materialized views revisited
16
0.53
2009
1