Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey
Zhang, Bo, Dong, Boxiang, Wang, Wendy Hui
Published in IEEE transactions on knowledge and data engineering (01.04.2021)
Published in IEEE transactions on knowledge and data engineering (01.04.2021)
Get full text
Journal Article
CorrectMR: Authentication of Distributed SQL Execution on MapReduce
Zhang, Bo, Dong, Boxiang, Wang, Wendy Hui
Published in IEEE transactions on knowledge and data engineering (01.03.2021)
Published in IEEE transactions on knowledge and data engineering (01.03.2021)
Get full text
Journal Article
Algorithmic fairness in computational medicine
Xu, Jie, Xiao, Yunyu, Wang, Wendy Hui, Ning, Yue, Shenkman, Elizabeth A., Bian, Jiang, Wang, Fei
Published in EBioMedicine (01.10.2022)
Published in EBioMedicine (01.10.2022)
Get full text
Journal Article
Optimizing XML queries: Bitmapped materialized views vs. indexes
Wu, Xiaoying, Theodoratos, Dimitri, Hui Wang, Wendy, Sellis, Timos
Published in Information systems (Oxford) (01.09.2013)
Published in Information systems (Oxford) (01.09.2013)
Get full text
Journal Article
Equipping Federated Graph Neural Networks with Structure-aware Group Fairness
Cui, Nan, Wang, Xiuling, Wang, Wendy Hui, Chen, Violet, Ning, Yue
Published in 2023 IEEE International Conference on Data Mining (ICDM) (01.12.2023)
Published in 2023 IEEE International Conference on Data Mining (ICDM) (01.12.2023)
Get full text
Conference Proceeding
Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding
Wu, Kun, Erickson, Jacob, Wang, Wendy Hui, Ning, Yue
Published in 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (10.11.2022)
Published in 2022 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM) (10.11.2022)
Get full text
Conference Proceeding
Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy
Sun, Haipei, Dong, Boxiang, Wang, Hui, Yu, Ting, Qin, Zhan
Published in 2018 IEEE International Conference on Big Data (Big Data) (01.12.2018)
Published in 2018 IEEE International Conference on Big Data (Big Data) (01.12.2018)
Get full text
Conference Proceeding
Subgraph Structure Membership Inference Attacks against Graph Neural Networks
Wang, Xiuling, Wang, Wendy Hui
Published in Proceedings on Privacy Enhancing Technologies (01.10.2024)
Published in Proceedings on Privacy Enhancing Technologies (01.10.2024)
Get full text
Journal Article
GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning
Wang, Xiuling, Wang, Wendy Hui
Published in Proceedings on Privacy Enhancing Technologies (01.07.2024)
Published in Proceedings on Privacy Enhancing Technologies (01.07.2024)
Get full text
Journal Article
Revisiting Black-box Ownership Verification for Graph Neural Networks
Zhou, Ruikai, Yang, Kang, Wang, Xiuling, Wang, Wendy Hui, Xu, Jun
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Published in 2024 IEEE Symposium on Security and Privacy (SP) (19.05.2024)
Get full text
Conference Proceeding
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks
Zhong, Da, Yu, Ruotong, Wu, Kun, Wang, Xiuling, Xu, Jun, Wang, Wendy Hui
Published in Proceedings on Privacy Enhancing Technologies (01.10.2023)
Published in Proceedings on Privacy Enhancing Technologies (01.10.2023)
Get full text
Journal Article
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases
Giannotti, Fosca, Lakshmanan, Laks V. S., Monreale, Anna, Pedreschi, Dino, Hui Wang
Published in IEEE systems journal (01.09.2013)
Published in IEEE systems journal (01.09.2013)
Get full text
Journal Article