![]() | 2010 | |
---|---|---|
167 | ![]() ![]() ![]() ![]() ![]() ![]() | Yong Li, Ke Wang, Da-ke Chen: Multispectral and Panchromatic Images Fusion by Adaptive PCNN. MMM 2010: 120-129 |
166 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Cheng, Ke Wang, Xiuying Zhang: Implementation of a COM-based decision-tree model with VBA in ArcGIS. Expert Syst. Appl. 37(1): 12-17 (2010) |
2009 | ||
165 | ![]() ![]() ![]() ![]() ![]() ![]() | Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu: Online anonymity for personalized web services. CIKM 2009: 1497-1500 |
164 | ![]() ![]() ![]() ![]() ![]() ![]() | Qingzhu Wang, Ke Wang, Donghong An, Bo Chen, Miao Liu, Yingying Ying: Extracting the Coronary Artery in Angiographic Image Based on a Trous Wavelet of Rotary Gaussian with Adaptive Space Coefficient. CIS (1) 2009: 160-164 |
163 | ![]() ![]() ![]() ![]() ![]() ![]() | Chao Chen, Ke Wang, Yiqi Dai: A Novel Architecture for Enterprise Network Security. CIS (1) 2009: 537-541 |
162 | ![]() ![]() ![]() ![]() ![]() ![]() | Chao Chen, Ke Wang, Shuren Liao, Qiuyan Zhang, Yiqi Dai: A Novel Server-Based Application Execution Architecture. CSE (2) 2009: 678-683 |
161 | ![]() ![]() ![]() ![]() ![]() ![]() | Noman Mohammed, Benjamin C. M. Fung, Ke Wang, Patrick C. K. Hung: Privacy-preserving data mashup. EDBT 2009: 228-239 |
160 | ![]() ![]() ![]() ![]() ![]() ![]() | Jun Tang, Ke Wang, Xiaojuan Zhao: A Novel Constraint Handling Technique for Complex Portfolio Selection. FSKD (2) 2009: 156-160 |
159 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong: FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139 |
158 | ![]() ![]() ![]() ![]() ![]() ![]() | Rhonda Chaytor, Ke Wang, Patricia Brantingham: Fine-Grain Perturbation for Privacy Preserving Data Publishing. ICDM 2009: 740-745 |
157 | ![]() ![]() ![]() ![]() ![]() ![]() | Shu Wang, Ke Wang: Quasi-neutral Limit of the Drift-Diffusion Models for Semiconductors with PN-Junctions. ICNC (3) 2009: 542-546 |
156 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiao Nian Tang, Ke Wang, Gui Jun Nian, Dan Wang, Na Ni: Analysis and Realization of Data Hiding in Single Layer of BOR Multiwavelet Domain. IPCV 2009: 337-342 |
155 | ![]() ![]() ![]() ![]() ![]() ![]() | Binjie Xiao, Ke Wang, Weiqun Shu: A Framework for Software Performance Simulation Using Binary to C Translation. PACCS 2009: 602-605 |
154 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: On Mining Rating Dependencies in Online Collaborative Rating Networks. PAKDD 2009: 1054-1061 |
153 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Anonymization-based attacks in privacy-preserving data publishing. ACM Trans. Database Syst. 34(2): (2009) |
152 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu: Preserving Individual Privacy in Serial Data Publishing CoRR abs/0903.0682: (2009) |
151 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu: Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755: (2009) |
150 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu: Anonymization with Worst-Case Distribution-Based Background Knowledge CoRR abs/0909.1127: (2009) |
149 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Patrick C. K. Hung: Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) |
148 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Online Skyline Analysis with Dynamic Preferences on Nominal Attributes. IEEE Trans. Knowl. Data Eng. 21(1): 35-49 (2009) |
147 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymous data publishing. J. Intell. Inf. Syst. 33(2): 209-234 (2009) |
146 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinghuo Zeng, Jian Pei, Ke Wang, Jinyan Li: PADS: a simple yet effective pattern-aware dynamic search method for fast maximal frequent pattern mining. Knowl. Inf. Syst. 20(3): 375-391 (2009) |
2008 | ||
145 | ![]() ![]() ![]() ![]() ![]() ![]() | Wei Cheng, Ke Wang, Xiuying Zhang: A COM-Based Decision Tree Model Implemented in ArcGIS: A Case Study for Assessment of Soil Pollution in Fuyang, Zhejiang, China. CSSE (4) 2008: 190-193 |
144 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Anonymity for continuous data publishing. EDBT 2008: 264-275 |
143 | ![]() ![]() ![]() ![]() ![]() ![]() | Xinghuo Zeng, Matthew J. Nesbitt, Jian Pei, Ke Wang, Ismael A. Vergara, Nansheng Chen: OrthoCluster: a new tool for mining synteny blocks and applications in comparative genomics. EDBT 2008: 656-667 |
142 | ![]() ![]() ![]() ![]() ![]() ![]() | Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei: Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 |
141 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, James Nga-Kwok Liu, Weimin Ma: A Study on the Reliability of Case-Based Reasoning Systems. ICDM Workshops 2008: 60-68 |
140 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Lingyu Wang, Mourad Debbabi: A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 |
139 | ![]() ![]() ![]() ![]() ![]() ![]() | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu: Anonymizing transaction databases for publication. KDD 2008: 767-775 |
138 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and Controversy in Evaluation Systems. IEEE Trans. Knowl. Data Eng. 20(11): 1490-1504 (2008) |
137 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates Over Private Tables. IJDWM 4(4): 22-41 (2008) |
136 | ![]() ![]() ![]() ![]() ![]() ![]() | Weimin Ma, Shao-Hua Tang, Ke Wang: Competitive Analysis for the Most Reliable Path Problem with Online and Fuzzy Uncertainties. IJPRAI 22(1): 195-206 (2008) |
135 | ![]() ![]() ![]() ![]() ![]() ![]() | Mohammed J. Zaki, Ke Wang: Special Issue on the Best Papers of SDM'08. Statistical Analysis and Data Mining 1(3): 109-110 (2008) |
2007 | ||
134 | ![]() ![]() ![]() ![]() ![]() ![]() | Weimin Ma, Ting Gao, Ke Wang: On the On-Line k -Taxi Problem with Limited Look Ahead. COCOA 2007: 72-80 |
133 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu: Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88 |
132 | ![]() ![]() ![]() ![]() ![]() ![]() | Weimin Ma, Ke Wang: On the On-Line Weighted k-Taxi Problem. ESCAPE 2007: 152-162 |
131 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Wei Wang, Yan Zhuang: Appearance-Based Map Learning for Mobile Robot by Using Generalized Regression Neural Network. ISNN (1) 2007: 834-842 |
130 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Jian Pei, Ada Wai-Chee Fu, Ke Wang: Mining favorable facets. KDD 2007: 804-813 |
129 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Summarizing Review Scores of "Unequal" Reviewers. SDM 2007 |
128 | ![]() ![]() ![]() ![]() ![]() ![]() | Jian Pei, Jian Xu, Zhibin Wang, Wei Wang, Ke Wang: Maintaining K-Anonymity against Incremental Updates. SSDBM 2007: 5 |
127 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Jian Pei: Minimality Attack in Privacy Preserving Data Publishing. VLDB 2007: 543-554 |
126 | ![]() ![]() ![]() ![]() ![]() ![]() | Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen: Privacy-enhancing personalized web search. WWW 2007: 591-600 |
125 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Bai, Ke Wang: A diffusive single-species model with periodic coefficients and its optimal harvesting policy. Applied Mathematics and Computation 187(2): 873-882 (2007) |
124 | ![]() ![]() ![]() ![]() ![]() ![]() | Tao Jiang, Ah-Hwee Tan, Ke Wang: Mining Generalized Associations of Semantic Relations from Textual Web Content. IEEE Trans. Knowl. Data Eng. 19(2): 164-179 (2007) |
123 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) |
122 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Chuanhua You: A note on identifying generalized diagonally dominant matrices. Int. J. Comput. Math. 84(12): 1863-1870 (2007) |
121 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007) |
120 | ![]() ![]() ![]() ![]() ![]() ![]() | Moonjung Cho, Jian Pei, Ke Wang: Answering ad hoc aggregate queries from data streams using prefix aggregate trees. Knowl. Inf. Syst. 12(3): 301-329 (2007) |
2006 | ||
119 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yabo Xu, Rong She, Philip S. Yu: Classification Spanning Private Databases. AAAI 2006 |
118 | ![]() ![]() ![]() ![]() ![]() ![]() | Huiqiang Wang, Gaofei Wang, Ying Lan, Ke Wang, Daxin Liu: A New Automatic Intrusion Response Taxonomy and Its Application. APWeb Workshops 2006: 999-1003 |
117 | ![]() ![]() ![]() ![]() ![]() ![]() | Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei: Classification spanning correlated data streams. CIKM 2006: 132-141 |
116 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yuelong Jiang, Alexander Tuzhilin: Mining Actionable Patterns by Role Models. ICDE 2006: 16 |
115 | ![]() ![]() ![]() ![]() ![]() ![]() | Yi-Ting Lai, Ke Wang, Daymond Ling, Hua Shi, Jason Zhang: Direct Marketing When There Are Voluntary Buyers. ICDM 2006: 922-927 |
114 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, James N. K. Liu, Weimin Ma: Mining the Most Reliable Association Rules with Composite Items. ICDM Workshops 2006: 749-754 |
113 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhao Xu, Ke Wang, Xiao-hua Qiao: Digital Audio Watermarking Algorithm Based on Quantizing Coefficients. IIH-MSP 2006: 41-46 |
112 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhao Xu, Ke Wang, Xiao-hua Qiao: A Novel Watermarking Scheme in Contourlet Domain Based on Independent Component Analysis. IIH-MSP 2006: 59-62 |
111 | ![]() ![]() ![]() ![]() ![]() ![]() | Weimin Ma, Ke Wang: On the On-Line k-Truck Problem with Benefit Maximization. ISAAC 2006: 660-669 |
110 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Benjamin C. M. Fung: Anonymizing sequential releases. KDD 2006: 414-423 |
109 | ![]() ![]() ![]() ![]() ![]() ![]() | Hady Wirawan Lauw, Ee-Peng Lim, Ke Wang: Bias and controversy: beyond the statistical deviation. KDD 2006: 625-630 |
108 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759 |
107 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Janak J. Parekh, Salvatore J. Stolfo: Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 |
106 | ![]() ![]() ![]() ![]() ![]() ![]() | Niels Provos, Joe McClain, Ke Wang: Search worms. WORM 2006: 1-8 |
105 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Weiwei Yang, Yiying Tong, Mathieu Desbrun, Peter Schröder: Edge subdivision schemes and the construction of smooth vector fields. ACM Trans. Graph. 25(3): 1041-1048 (2006) |
104 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang: Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) |
103 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Zheng, Ke Wang: On accelerate overrelaxation methods for rank deficient linear systems. Applied Mathematics and Computation 173(2): 951-959 (2006) |
102 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Bing Zheng: Symmetric successive overrelaxation methods for fuzzy linear systems. Applied Mathematics and Computation 175(2): 891-901 (2006) |
101 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Zheng, Ke Wang: General fuzzy linear systems. Applied Mathematics and Computation 181(2): 1276-1286 (2006) |
100 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Bing Zheng: Inconsistent fuzzy linear systems. Applied Mathematics and Computation 181(2): 973-981 (2006) |
99 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Zheng, Ke Wang: Comments on "Symmetric successive overrelaxation methods for rank deficient linear systems": [Applied Mathematics and Computation 173 (2006) 404-420]. Applied Mathematics and Computation 182(2): 1709-1713 (2006) |
98 | ![]() ![]() ![]() ![]() ![]() ![]() | Jian Pei, Haixun Wang, Jian Liu, Ke Wang, Jianyong Wang, Philip S. Yu: Discovering Frequent Closed Partial Orders from Strings. IEEE Trans. Knowl. Data Eng. 18(11): 1467-1481 (2006) |
97 | ![]() ![]() ![]() ![]() ![]() ![]() | Irene Pekerskaya, Jian Pei, Ke Wang: Mining changing regions from access-constrained snapshots: a cluster-embedded decision tree approach. J. Intell. Inf. Syst. 27(3): 215-242 (2006) |
2005 | ||
96 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Philip S. Yu: Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216 |
95 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Benjamin C. M. Fung, Philip S. Yu: Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473 |
94 | ![]() ![]() ![]() ![]() ![]() ![]() | Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Ke Wang: Privacy-Preserving Frequent Pattern Mining across Private Databases. ICDM 2005: 613-616 |
93 | ![]() ![]() ![]() ![]() ![]() ![]() | Yuelong Jiang, Ke Wang, Alexander Tuzhilin, Ada Wai-Chee Fu: Mining Patterns That Respond to Actions. ICDM 2005: 669-672 |
92 | ![]() ![]() ![]() ![]() ![]() ![]() | Jian Pei, Jian Liu, Haixun Wang, Ke Wang, Philip S. Yu, Jianyong Wang: Efficiently Mining Frequent Closed Partial Orders. ICDM 2005: 753-756 |
91 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Benjamin C. M. Fung, Guozhu Dong: Integrating Private Databases for Data Analysis. ISI 2005: 171-182 |
90 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang: Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 |
89 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo: Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 |
88 | ![]() ![]() ![]() ![]() ![]() ![]() | Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo: FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 |
87 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yabo Xu, Philip S. Yu, Rong She: Building Decision Trees on Records Linked through Key References. SDM 2005 |
86 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong She, Ke Wang, Yabo Xu, Philip S. Yu: Pushing Feature Selection Ahead Of Join. SDM 2005 |
85 | ![]() ![]() ![]() ![]() ![]() ![]() | Douglas A. Bodner, Ke Wang, Sheng Xu: Advanced decision logic in simulation of material flow processing networks. Winter Simulation Conference 2005: 1359-1366 |
84 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Sheng Xu, Leon F. McGinnis: Time management in distributed factory simulation, a case study using HLA. Winter Simulation Conference 2005: 1781-1786 |
83 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Zheng, Ke Wang: Symmetric successive overrelaxation methods for solving the rank deficient linear least squares problem. Applied Mathematics and Computation 169(2): 1305-1323 (2005) |
82 | ![]() ![]() ![]() ![]() ![]() ![]() | Fengying Wei, Ke Wang: Uniform persistence of asymptotically periodic multispecies competition predator-prey systems with Holling III type functional response. Applied Mathematics and Computation 170(2): 994-998 (2005) |
81 | ![]() ![]() ![]() ![]() ![]() ![]() | Ling Bai, Ke Wang: Gilpin-Ayala model with spatial diffusion and its optimal harvesting policy. Applied Mathematics and Computation 171(1): 531-546 (2005) |
80 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Qiang Yang, Jack Man Shun Yeung: Mining Customer Value: From Association Rules to Direct Marketing. Data Min. Knowl. Discov. 11(1): 57-79 (2005) |
79 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: Data Mining for Inventory Item Selection with Cross-Selling Considerations. Data Min. Knowl. Discov. 11(1): 81-112 (2005) |
78 | ![]() ![]() ![]() ![]() ![]() ![]() | Senqiang Zhou, Ke Wang: Localization Site Prediction for Membrane Proteins by Integrating Rule and SVM Classification. IEEE Trans. Knowl. Data Eng. 17(12): 1694-1705 (2005) |
77 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Divide-and-Approximate: A Novel Constraint Push Strategy for Iceberg Cube Mining. IEEE Trans. Knowl. Data Eng. 17(3): 354-368 (2005) |
2004 | ||
76 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yabo Xu, Jeffrey Xu Yu: Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187 |
75 | ![]() ![]() ![]() ![]() ![]() ![]() | Rui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund, Christina S. Leslie: Profile-Based String Kernels for Remote Homology Detection and Motif Extraction. CSB 2004: 152-160 |
74 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Philip S. Yu, Sourav Chakraborty: Bottom-Up Generalization: A Data Mining Solution to Privacy Protection. ICDM 2004: 249-256 |
73 | ![]() ![]() ![]() ![]() ![]() ![]() | Li-bao Zhang, Ke Wang: Efficient Lossy to Lossless Medical Image Compression Using Integer Wavelet Transform and Multiple Subband Decomposition. MIAR 2004: 86-93 |
72 | ![]() ![]() ![]() ![]() ![]() ![]() | Li-bao Zhang, Ke Wang: New Regions of Interest Image Coding Using Up-Down Bitplanes Shift for Network Applications. NPC 2004: 513-516 |
71 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Salvatore J. Stolfo: Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 |
70 | ![]() ![]() ![]() ![]() ![]() ![]() | Jing Wang, Ke Wang: Optimal control of harvesting for single population. Applied Mathematics and Computation 156(1): 235-247 (2004) |
69 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiang Yang, Ian Tian Yi Li, Ke Wang: Building Association-Rule Based Sequential Classifiers for Web-Document Prediction. Data Min. Knowl. Discov. 8(3): 253-273 (2004) |
68 | ![]() ![]() ![]() ![]() ![]() ![]() | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang, Wei Zou: Mining Constrained Gradients in Large Databases. IEEE Trans. Knowl. Data Eng. 16(8): 922-938 (2004) |
2003 | ||
67 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern: EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- |
66 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yuelong Jiang, Jeffrey Xu Yu, Guozhu Dong, Jiawei Han: Pushing Aggregate Constraints by Divide-and-Approximate. ICDE 2003: 291-302 |
65 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Jack Man Shun Yeung, Qiang Yang: Mining Customer Value: From Association Rules to Direct Marketing. ICDE 2003: 738-740 |
64 | ![]() ![]() ![]() ![]() ![]() ![]() | Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang: MPIS: Maximal-Profit Item Selection with Cross-Selling Considerations. ICDM 2003: 371-378 |
63 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: Behavior Profiling of Email. ISI 2003: 74-90 |
62 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yuelong Jiang, Laks V. S. Lakshmanan: Mining unexpected rules by pushing user dynamics. KDD 2003: 246-255 |
61 | ![]() ![]() ![]() ![]() ![]() ![]() | Rong She, Fei Chen, Ke Wang, Martin Ester, Jennifer L. Gardy, Fiona S. L. Brinkman: Frequent-subsequence-based prediction of outer membrane proteins. KDD 2003: 436-445 |
60 | ![]() ![]() ![]() ![]() ![]() ![]() | Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu: A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81 |
59 | ![]() ![]() ![]() ![]() ![]() ![]() | Benjamin C. M. Fung, Ke Wang, Martin Ester: Hierarchical Document Clustering using Frequent Itemsets. SDM 2003 |
58 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Ada Wai-Chee Fu, Jeffrey Xu Yu: Mining Changes of Classification by Correspondence Tracing. SDM 2003 |
57 | ![]() ![]() ![]() ![]() ![]() ![]() | Chang-Jian Zhao, Lokenath Debnath, Ke Wang: Positive periodic solutions of a delayed model in population. Appl. Math. Lett. 16(4): 561-565 (2003) |
56 | ![]() ![]() ![]() ![]() ![]() ![]() | Qiang Yang, Tianyiian Li, Ke Wang: Web-Log Cleaning for Constructing Sequential Classifiers. Applied Artificial Intelligence 17(5-6): 431-441 (2003) |
55 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yu He, Jiawei Han: Pushing Support Constraints Into Association Rules Mining. IEEE Trans. Knowl. Data Eng. 15(3): 642-658 (2003) |
54 | ![]() ![]() ![]() ![]() ![]() ![]() | Jennifer L. Gardy, Cory Spencer, Ke Wang, Martin Ester, Gábor E. Tusnády, István Simon, Sujun Hua, Katalin de Fays, Christophe G. Lambert, Kenta Nakai, Fiona S. L. Brinkman: PSORT-B: improving protein subcellular localization prediction for Gram-negative bacteria. Nucleic Acids Research 31(13): 3613-3617 (2003) |
2002 | ||
53 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Jiawei Han: Profit Mining: From Patterns to Actions. EDBT 2002: 70-87 |
52 | ![]() ![]() ![]() ![]() ![]() ![]() | Eric Ka Ka Ng, Ada Wai-Chee Fu, Ke Wang: Mining Association Rules from Stars. ICDM 2002: 322-329 |
51 | ![]() ![]() ![]() ![]() ![]() ![]() | Junqiang Liu, Yunhe Pan, Ke Wang, Jiawei Han: Mining frequent item sets by opportunistic projection. KDD 2002: 229-238 |
50 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Ming-Yen Thomas Su: Item selection by "hub-authority" profit ranking. KDD 2002: 652-657 |
49 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Liu Tang, Jiawei Han, Junqiang Liu: Top Down FP-Growth for Association Rule Mining. PAKDD 2002: 334-340 |
48 | ![]() ![]() ![]() ![]() ![]() ![]() | Emin Gün Sirer, Ke Wang: An access control language for web services. SACMAT 2002: 23-30 |
47 | ![]() ![]() ![]() ![]() ![]() ![]() | Gao Cong, Lan Yi, Bing Liu, Ke Wang: Discovering Frequent Substructures from Hierarchical Semi-structured Data. SDM 2002 |
46 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiawei Han, Jianyong Wang, Guozhu Dong, Jian Pei, Ke Wang: CubeExplorer: online exploration of data cubes. SIGMOD Conference 2002: 626 |
2001 | ||
45 | ![]() ![]() ![]() ![]() ![]() ![]() | Helen Pinto, Jiawei Han, Jian Pei, Ke Wang, Qiming Chen, Umeshwar Dayal: Multi-Dimensional Sequential Pattern Mining. CIKM 2001: 81-88 |
44 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yu He, David Wai-Lok Cheung, Francis Y. L. Chin: Mining Confident Rules Without Support Requirement. CIKM 2001: 89-96 |
43 | ![]() ![]() ![]() ![]() ![]() ![]() | Sonny Han Seng Chee, Jiawei Han, Ke Wang: RecTree: An Efficient Collaborative Filtering Method. DaWaK 2001: 141-151 |
42 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yu He: User-Defined Association Mining. PAKDD 2001: 387-399 |
41 | ![]() ![]() ![]() ![]() ![]() ![]() | Jiawei Han, Jian Pei, Guozhu Dong, Ke Wang: Efficient Computation of Iceberg Cubes with Complex Measures. SIGMOD Conference 2001: 1-12 |
40 | ![]() ![]() ![]() ![]() ![]() ![]() | Guozhu Dong, Jiawei Han, Joyce M. W. Lam, Jian Pei, Ke Wang: Mining Multi-Dimensional Constrained Gradients in Data Cubes. VLDB 2001: 321-330 |
39 | ![]() ![]() ![]() ![]() ![]() ![]() | Ian Tian Yi Li, Qiang Yang, Ke Wang: Classification Pruning for Web-request Prediction. WWW Posters 2001 |
2000 | ||
38 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Yu He: Growing decision trees on support-less association rules. KDD 2000: 265-269 |
37 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Yu He, Jiawei Han: Mining Frequent Itemsets Using Support Constraints. VLDB 2000: 43-52 |
36 | ![]() ![]() ![]() ![]() ![]() ![]() | Weining Zhang, Ke Wang: An Efficient Evaluation of a Fuzzy Equi-Join Using Fuzzy Equality Indicators. IEEE Trans. Knowl. Data Eng. 12(2): 225-237 (2000) |
35 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Huiqing Liu: Discovering Structural Association of Semistructured Data. IEEE Trans. Knowl. Data Eng. 12(3): 353-371 (2000) |
1999 | ||
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Chu Xu, Bing Liu: Clustering Transactions Using Large Items. CIKM 1999: 483-490 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Beng Chin Ooi, Sam Yuan Sung: P-Tree: A B-Tree Index for Lists. DASFAA 1999: 221-228 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Liu, Wynne Hsu, Ke Wang, Shu Chen: Visually Aided Exploration of Interesting Association Rules. PAKDD 1999: 380-389 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Senqiang Zhou, Shiang Chen Liew: Building Hierarchical Classifiers Using Class Proximity. VLDB 1999: 363-374 |
1998 | ||
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Soon Hock William Tay, Bing Liu: Interestingness-Based Interval Merger for Numeric Association Rules. KDD 1998: 121-128 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Bing Liu, Ke Wang, Lai-Fun Mun, Xin-Zhi Qi: Using Decision Tree Induction for Discovering Holes in Data. PRICAI 1998: 182-193 |
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Bing Liu: Concurrent Discretization of Multiple Attributes. PRICAI 1998: 250-259 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Huiqing Liu: Discovering Typical Structures of Documents: A Road Map Approach. SIGIR 1998: 146-154 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Wang Chiew Tan, Ke Wang, Limsoon Wong: A Graphical Interface to Genome Multidatabases. J. Database Manag. 9(1): 24-32 (1998) |
1997 | ||
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: Mining Association Patterns from Nested Databases. DMKD 1997: 0- |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Han Chong Goh: Minimum Splits Based Discretization for Continuous Features. IJCAI (2) 1997: 942-951 |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Huiqing Liu: Schema Discovery for Semistructured Data. KDD 1997: 271-274 |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Suman Sundaresh: Selecting Features by Vertical Compactness of Data. KDD 1997: 275-278 |
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Weining Zhang, Siu-Cheung Chau: Weakly Independent Database Schemes. Acta Inf. 34(1): 1-22 (1997) |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: Discovering Patterns from Large and Dynamic Sequential Data. J. Intell. Inf. Syst. 9(1): 33-56 (1997) |
1996 | ||
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Wang Chiew Tan, Ke Wang, Limsoon Wong: QUICK: Graphical User Interface to Multiple Databases. DEXA Workshop 1996: 404-409 |
1995 | ||
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: Some Positive Results for Boundedness of Multiple Recursive Rules. ICDT 1995: 383-396 |
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data Partition and Parallel Evaluation of Datalog Programs. IEEE Trans. Knowl. Data Eng. 7(1): 163-176 (1995) |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Weining Zhang, Siu-Cheung Chau: Decomposition of Magic Rewriting. J. ACM 42(2): 329-381 (1995) |
1994 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Li-Yan Yuan: First-Order Logic Characterization of Program Properties. IEEE Trans. Knowl. Data Eng. 6(4): 518-533 (1994) |
1993 | ||
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Weining Zhang, Siu-Cheung Chau: Minimize Linear Mutual Recursion by Rule Unfolding. ICCI 1993: 98-102 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Héctor J. Hernández, Ke Wang: On the Boundedness of Constant-Time-Maintainable Database Schemes. SIAM J. Comput. 22(1): 29-45 (1993) |
1992 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Li-Yan Yuan: Enforce Constraints in Archival Databases. ICCI 1992: 397-400 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Marc H. Graham: Constant-Time Maintainability: A Generalization of Independence. ACM Trans. Database Syst. 17(2): 201-246 (1992) |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Li-Yan Yuan: Preservation of Integrity Constraints in Definite DATALOG Programs. Inf. Process. Lett. 44(4): 185-193 (1992) |
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: On Characterizing Boundedness of Database Schemes with Bounded Dependencies. Theor. Comput. Sci. 100(2): 347-364 (1992) |
1991 | ||
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Li-Yan Yuan: Incremental Database Design Revisited. ICCI 1991: 219-230 |
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang, Li-Yan Yuan: First-Order Logic Reducible Programs. ICDE 1991: 746-755 |
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Weining Zhang, Ke Wang, Siu-Cheung Chau: Data partition: A Practical Parallel Evaluation of Datalog Programs. PDIS 1991: 98-105 |
1990 | ||
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: Polynomial Time Designs toward Both BCNF and Efficient Data Manipulation. SIGMOD Conference 1990: 74-83 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Marc H. Graham, Ke Wang: On the Equivalence of an Egd to a Set of Fd's J. ACM 37(3): 474-490 (1990) |
1989 | ||
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Ke Wang: Can Constant-time Maintainability Be More Practical? PODS 1989: 120-127 |
1986 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Marc H. Graham, Ke Wang: Constant Time Maintenance or The Triumph of the fd. PODS 1986: 202-216 |
1984 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | In-Shek Hsu, Irving S. Reed, Trieu-Kien Truong, Ke Wang, Chiunn-Shyong Ye, Leslie J. Deutsch: The VLSI Implementation of a Reed-Solomon Encoder Using Berlekamp's Bit-Serial Multiplier Algorithm. IEEE Trans. Computers 33(10): 906-911 (1984) |