X. Sean Wang
Title
Cited by
Cited by
Year
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
4352005
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
4122013
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
3982011
Time granularities in databases, data mining, and temporal reasoning
C Bettini, S Jajodia, S Wang
Springer-Verlag New York Inc, 2000
3702000
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
3592003
A data model for supporting on-line analytical processing
C Li, XS Wang
Proceedings of the fifth international conference on Information and …, 1996
2711996
Discovering frequent event patterns with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia, JL Lin
Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998
1971998
A glossary of time granularity concepts
C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang
Temporal Databases: Research and Practice, 406-413, 1998
1931998
Logical design for temporal databases with multiple granularities
XS Wang, C Bettini, A Brodsky, S Jajodia
ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997
1851997
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia
The VLDB journal 20 (4), 541-566, 2011
1692011
Temporal reasoning in workflow systems
C Bettini, XS Wang, S Jajodia
Distributed and Parallel Databases 11 (3), 269-306, 2002
1512002
Mining temporal relationships with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia
IEEE Data Eng. Bull. 21 (1), 32-38, 1998
1491998
Checking for k-anonymity violation by views
C Yao, XS Wang, S Jajodia
Proceedings of the 31st international conference on Very large data bases …, 2005
1392005
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Bases …, 2002
1392002
A general framework for time granularity and its application to temporal reasoning
C Bettini, XS Wang, S Jajodia
Annals of mathematics and artificial intelligence 22 (1-2), 29-58, 1998
1371998
Large scale real-time ridesharing with service guarantee on road networks
Y Huang, R Jin, F Bastani, XS Wang
arXiv preprint arXiv:1302.6666, 2013
1362013
Abstraction-based intrusion detection in distributed environments
P Ning, S Jajodia, XS Wang
ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001
1352001
Supporting content-based searches on time series via approximation
C Wang, XS Wang
Scientific and Statistical Database Management, 2000. Proceedings. 12th …, 2000
1302000
Continually evaluating similarity-based pattern queries on a streaming time series
L Gao, XS Wang
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
1212002
A weighted moving average-based approach for cleaning sensor data
Y Zhuang, L Chen, XS Wang, J Lian
27th International Conference on Distributed Computing Systems (ICDCS'07), 38-38, 2007
1192007
The system can't perform the operation now. Try again later.
Articles 1–20