Name
Affiliation
Papers
WENDY HUI WANG
Stevens Institute of Technology, Castle Point on Hudson, Hoboken, NJ 07030, USA
31
Collaborators
Citations 
PageRank 
55
133
13.82
Referers 
Referees 
References 
372
799
418
Search Limit
100799
Title
Citations
PageRank
Year
Group Property Inference Attacks Against Graph Neural Networks00.342022
VeriDL: Integrity Verification of Outsourced Deep Learning Services00.342021
CorrectMR: Authentication of Distributed SQL Execution on MapReduce10.362021
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks00.342021
Automating Fairness Configurations for Machine Learning00.342021
Anomalous Event Sequence Detection10.342021
AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data00.342020
Fairness of Classification Using Users’ Social Relationships in Online Peer-To-Peer Lending00.342020
Towards Fair Truth Discovery from Biased Crowdsourced Answers20.372020
Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers10.342018
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.00.342018
Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.30.392017
EARRING: Efficient Authentication of Outsourced Record Matching00.342017
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-mining-as-a-service Paradigm40.402016
Leveraging Crowd for Game-based Learning: A Case Study of Privacy Education Game Design and Evaluation by Crowdsourcing.00.342016
Similarity Recoverable, Format-Preserving String Encryption.00.342016
ARM: Authenticated Approximate Record Matching for Outsourced Databases00.342016
Secure Data Outsourcing with Adversarial Data Dependency Constraints00.342016
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining.10.372015
Hiding outliers into crowd: Privacy-preserving data publishing with outliers00.342015
iCoDA: Interactive and exploratory data completeness analysis00.342014
Result Integrity Verification of Outsourced Bayesian Network Structure Learning.20.372014
PraDa: Privacy-preserving Data-Deduplication-as-a-Service30.392014
Privacy-Preserving Distributed Movement Data Aggregation.80.762013
Integrity Verification Of Outsourced Frequent Itemset Mining With Deterministic Guarantee00.342013
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers.60.492013
Optimizing XML queries: Bitmapped materialized views vs. indexes40.382013
Result integrity verification of outsourced frequent itemset mining40.462013
A decentralized key management scheme via neighborhood prediction in mobile wireless networks30.402010
Anonymizing moving objects: how to hide a MOB in a crowd?742.402009
Answering XML queries using materialized views revisited160.532009