Seguir
X. Sean Wang
Título
Citado por
Citado por
Año
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
6192011
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
5522013
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
5372005
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4512013
Time granularities in databases, data mining, and temporal reasoning
C Bettini, S Jajodia, S Wang
Springer-Verlag New York Inc, 2000
405*2000
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3972003
A data model for supporting on-line analytical processing
C Li, XS Wang
Proceedings of the fifth international conference on Information and …, 1996
2791996
Large scale real-time ridesharing with service guarantee on road networks
Y Huang, R Jin, F Bastani, XS Wang
arXiv preprint arXiv:1302.6666, 2013
2642013
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia
The VLDB journal 20 (4), 541-566, 2011
2262011
A glossary of time granularity concepts
C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang
Temporal Databases: Research and Practice, 406-413, 1998
2161998
Discovering frequent event patterns with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia, JL Lin
Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998
2071998
Logical design for temporal databases with multiple granularities
XS Wang, C Bettini, A Brodsky, S Jajodia
ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997
1901997
Temporal reasoning in workflow systems
C Bettini, XS Wang, S Jajodia
Distributed and Parallel Databases 11 (3), 269-306, 2002
1802002
A weighted moving average-based approach for cleaning sensor data
Y Zhuang, L Chen, XS Wang, J Lian
27th International Conference on Distributed Computing Systems (ICDCS'07), 38-38, 2007
1622007
Checking for k-anonymity violation by views
C Yao, XS Wang, S Jajodia
Proceedings of the 31st international conference on Very large data bases …, 2005
1592005
Mining temporal relationships with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia
IEEE Data Eng. Bull. 21 (1), 32-38, 1998
1551998
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Bases …, 2002
1502002
Supporting content-based searches on time series via approximation
C Wang, XS Wang
Scientific and Statistical Database Management, 2000. Proceedings. 12th …, 2000
1472000
Abstraction-based intrusion detection in distributed environments
P Ning, S Jajodia, XS Wang
ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001
1452001
A general framework for time granularity and its application to temporal reasoning
C Bettini, XS Wang, S Jajodia
Annals of mathematics and artificial intelligence 22 (1), 29-58, 1998
1451998
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20