杨晓春
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
![]() | 2009 | |
---|---|---|
34 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Wang, Gang Xiao, Hao Yu, Xiaochun Yang: Distance-Based Outlier Detection on Uncertain Data. CIT (1) 2009: 293-298 |
33 | ![]() ![]() ![]() ![]() ![]() ![]() | Ye Yuan, Guoren Wang, Yongjiao Sun, Bin Wang, Xiaochun Yang, Ge Yu: An Efficient P2P Range Query Processing Approach for Multi-dimensional Uncertain Data. DASFAA Workshops 2009: 303-318 |
32 | ![]() ![]() ![]() ![]() ![]() ![]() | Shazia Wasim Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, Kai Xu: Workshop Organizers' Message. DASFAA Workshops 2009: 95-96 |
31 | ![]() ![]() ![]() ![]() ![]() ![]() | Aiman Hanna, Hai Zhou Ling, Xiaochun Yang, Mourad Debbabi: A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. OTM Conferences (2) 2009: 815-832 |
30 | ![]() ![]() ![]() ![]() ![]() ![]() | Syrine Tlili, Xiaochun Yang, Rachid Hadjidj, Mourad Debbabi: Verification of CERT Secure Coding Rules: Case Studies. OTM Conferences (2) 2009: 913-930 |
29 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Bin Wang, Ge Yu: Efficient secure data publishing algorithms for supporting information sharing. Science in China Series F: Information Sciences 52(4): 627-644 (2009) |
2008 | ||
28 | ![]() ![]() ![]() ![]() ![]() ![]() | Fangfang Li, Chuanwen Li, Xiaochun Yang, Ge Yu: A Data Storage Method Based on Query Processing Region in Wireless Sensor Networks. ICYCS 2008: 1367-1372 |
27 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Weidong Zhao, Li Pan: Graphical symbol recognition in architectural plans with an improved Ant-Tree based clustering algorithm. IJCNN 2008: 390-397 |
26 | ![]() ![]() ![]() ![]() ![]() ![]() | Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi: Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. PST 2008: 133-142 |
25 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Bin Wang, Chen Li: Cost-based variable-length-gram selection for string collections to support approximate queries efficiently. SIGMOD Conference 2008: 353-364 |
24 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin: Continually Answering Constraint k - NN Queries in Unstructured P2P Systems. J. Comput. Sci. Technol. 23(4): 538-556 (2008) |
23 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Yiu-Kai Ng: Answering form-based web queries using the data-mining approach. J. Intell. Inf. Syst. 30(1): 1-32 (2008) |
22 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Weidong Zhao, Yufei Chen, Xin Fang: Image segmentation with a fuzzy clustering algorithm based on Ant-Tree. Signal Processing 88(10): 2453-2462 (2008) |
2007 | ||
21 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu: Continuous Approximate Window Queries in Wireless Sensor Networks. APWeb/WAIM 2007: 407-418 |
20 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu: Efficient Difference NN Queries for Moving Objects. APWeb/WAIM 2007: 542-553 |
19 | ![]() ![]() ![]() ![]() ![]() ![]() | Chen Li, Houtan Shirani-Mehr, Xiaochun Yang: Protecting Individual Information Against Inference Attacks in Data Publishing. DASFAA 2007: 422-433 |
18 | ![]() ![]() ![]() ![]() ![]() ![]() | Chen Li, Bin Wang, Xiaochun Yang: VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams. VLDB 2007: 303-314 |
2006 | ||
17 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Lin Li, Yiu-Kai Ng, Bin Wang, Ge Yu: Associated Load Shedding Strategies for Computing Multi-joins in Sensor Networks. DASFAA 2006: 50-64 |
16 | ![]() ![]() ![]() ![]() ![]() ![]() | Bin Wang, Xiaochun Yang, Guoren Wang, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin, Ge Yu: Answering Constrained k-NN Queries in Unstructured P2P Systems. DBISP2P 2006: 397-405 |
2005 | ||
15 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Chen Li, Ge Yu, Lei Shi: XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. ICDE 2005: 1124-1125 |
14 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu: A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. ISPA Workshops 2005: 627-636 |
13 | ![]() ![]() ![]() ![]() ![]() ![]() | Zhengyu Ou, Ge Yu, Yaxin Yu, Shanshan Wu, Xiaochun Yang, Qingxu Deng: Tick Scheduling: A Deadline Based Optimal Task Scheduling Approach for Real-Time Data Stream Systems. WAIM 2005: 725-730 |
2004 | ||
12 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Bin Wang, Guoren Wang, Ge Yu: A Query Rewriting System for Enhancing the Queriability of Form-Based Interface. ICADL 2004: 462-472 |
11 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Chen Li: Secure XML Publishing without Information Leakage in the Presence of Data Inference. VLDB 2004: 96-107 |
10 | ![]() ![]() ![]() ![]() ![]() ![]() | Derong Shen, Ge Yu, Tiezheng Nie, Rui Li, Xiaochun Yang: Modeling QoS for Semantic Equivalent Web Services. WAIM 2004: 478-488 |
2003 | ||
9 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Bin Wang: Weave amino acid sequences for protein secondary structure prediction. DMKD 2003: 80-87 |
8 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Bin Wang, Yiu-Kai Ng, Ge Yu, Guoren Wang: A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine. WAIM 2003: 266-277 |
2002 | ||
7 | ![]() ![]() ![]() ![]() ![]() ![]() | Seung Jin Lim, Yiu-Kai Ng, Xiaochun Yang: Integrating HTML Tables Using Semantic Hierarchies And Meta-Data Sets. IDEAS 2002: 160-169 |
2001 | ||
6 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Ge Yu, Guoren Wang: Efficiently Mapping Integrity Constraints from Relational Database to XML Document. ADBIS 2001: 338-351 |
5 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Ge Yu, Guoren Wang, Dan Wang, Baoyan Song: Constraints for Information Cooperation in Virtual Enterprise Systems. CODAS 2001: 175-182 |
4 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Guoren Wang: Mapping Referential Integrity Constraints from Relational Databases to XML. WAIM 2001: 329-342 |
3 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Ge Yu, Guoren Wang: Distributed Semantic Constraints in Virtual Enterprise Information Integrating Systems. Int. J. Comput. Proc. Oriental Lang. 14(3): 259-278 (2001) |
2000 | ||
2 | ![]() ![]() ![]() ![]() ![]() ![]() | Lina Wang, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, Zhe Mei: A Virtual Private Network for Virtual Enterprise Information Systems. Web-Age Information Management 2000: 165-176 |
1999 | ||
1 | ![]() ![]() ![]() ![]() ![]() ![]() | Xiaochun Yang, Guoren Wang, Ge Yu, Dik Lun Lee: Modeling Enterprise Objects in a Virtual Enterprise Integrating System: VIASCOPE. ICSC 1999: 166-175 |