Wen Zhang
TitleCited byYear
How much can behavioral targeting help online advertising?
J Yan, N Liu, G Wang, W Zhang, Y Jiang, Z Chen
Proceedings of the 18th international conference on World wide web, 261-270, 2009
Role prediction using electronic medical record system audits
W Zhang, CA Gunter, D Liebovitz, J Tian, B Malin
AMIA Annual Symposium Proceedings 2011, 858, 2011
Specializing network analysis to detect anomalous insider actions
Y Chen, S Nyemba, W Zhang, B Malin
Security informatics 1 (1), 5, 2012
Leveraging social networks to detect anomalous insider actions in collaborative environments
Y Chen, S Nyemba, W Zhang, B Malin
Proceedings of 2011 IEEE International Conference on Intelligence and …, 2011
Evolving role definitions through permission invocation patterns
W Zhang, Y Chen, C Gunter, D Liebovitz, B Malin
Proceedings of the 18th ACM symposium on Access control models and …, 2013
Tsfs: A novel algorithm for single view co-training
W Zhang, Q Zheng
2009 International Joint Conference on Computational Sciences and …, 2009
Exsearch: a novel vertical search engine for online barter business
L Ji, J Yan, N Liu, W Zhang, W Fan, Z Chen
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
Decide now or decide later? Quantifying the tradeoff between prospective and retrospective access decisions
W Zhang, Y Chen, T Cybulski, D Fabbri, C Gunter, P Lawlor, D Liebovitz, ...
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications …, 2014
Temporal query substitution for ad search
W Zhang, J Yan, S Yan, N Liu, Z Chen
Proceedings of the 32nd international ACM SIGIR conference on Research and …, 2009
Learning from access logs to mitigate insider threats
W Zhang
Vanderbilt University, 2016
The system can't perform the operation now. Try again later.
Articles 1–10