HweeHwa Pang

Orcid: 0000-0001-7266-5712

According to our database1, HweeHwa Pang authored at least 87 papers between 1991 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication.
IEEE Trans. Inf. Forensics Secur., 2024

Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures.
IEEE Trans. Dependable Secur. Comput., 2024

AnoPas: Practical anonymous transit pass from group signatures with time-bound keys.
J. Syst. Archit., 2024

PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications.
IACR Cryptol. ePrint Arch., 2024

Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme.
IEEE Trans. Reliab., December, 2023

Threshold Attribute-Based Credentials With Redactable Signature.
IEEE Trans. Serv. Comput., 2023

ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots.
IEEE Trans. Inf. Forensics Secur., 2023

2022
SOCI: A Toolkit for Secure Outsourced Computation on Integers.
IEEE Trans. Inf. Forensics Secur., 2022

FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting.
IEEE Trans. Inf. Forensics Secur., 2021

Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing.
Proceedings of the SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, 2021

2020
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud.
IEEE Trans. Dependable Secur. Comput., 2020

Secure server-aided data sharing clique with attestation.
Inf. Sci., 2020

2019
Securing messaging services through efficient signcryption with designated equality test.
Inf. Sci., 2019

2018
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management.
Int. J. Inf. Sec., 2018

2017
Secure server-aided top-k monitoring.
Inf. Sci., 2017

CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications.
Inf. Sci., 2017

Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases.
Comput. J., 2017

2016
Privacy-Preserving and Verifiable Data Aggregation.
Proceedings of the Singapore Cyber-Security Conference (SG-CRC) 2016, 2016

Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Maximum Rank Query.
Proc. VLDB Endow., 2015

Detecting anomaly collections using extreme feature ranks.
Data Min. Knowl. Discov., 2015

2014
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data.
ACM Trans. Database Syst., 2014

Direct neighbor search.
Inf. Syst., 2014

Global immutable region computation.
Proceedings of the International Conference on Management of Data, 2014

Verifiable Computation on Outsourced Encrypted Data.
Proceedings of the Computer Security - ESORICS 2014, 2014

L-opacity: Linkage-Aware Graph Anonymization.
Proceedings of the 17th International Conference on Extending Database Technology, 2014

2013
Enhancing Access Privacy of Range Retrievals over (𝔹<sup>+</sup>)-Trees.
IEEE Trans. Knowl. Data Eng., 2013

Verifiable and private top-k monitoring.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
Query Answer Authentication
Synthesis Lectures on Data Management, Morgan & Claypool Publishers, ISBN: 978-3-031-01887-9, 2012

Computing Immutable Regions for Subspace Top-k Queries.
Proc. VLDB Endow., 2012

Modeling concept dynamics for large scale music search.
Proceedings of the 35th International ACM SIGIR conference on research and development in Information Retrieval, 2012

Detecting Extreme Rank Anomalous Collections.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Obfuscating the Topical Intention in Enterprise Text Search.
Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE 2012), 2012

Mining coherent anomaly collections on web data.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Efficient Evaluation of Continuous Text Search Queries.
IEEE Trans. Knowl. Data Eng., 2011

Learning Feature Dependencies for Noise Correction in Biomedical Prediction.
Proceedings of the Eleventh SIAM International Conference on Data Mining, 2011

Heuristic Algorithms for Balanced Multi-Way Number Partitioning.
Proceedings of the IJCAI 2011, 2011

2010
Efficient processing of exact top-<i>k</i> queries over disk-resident sorted lists.
VLDB J., 2010

Privacy-preserving similarity-based text retrieval.
ACM Trans. Internet Techn., 2010

STEvent: Spatio-temporal event model for social network discovery.
ACM Trans. Inf. Syst., 2010

Embellishing Text Search Queries To Protect User Privacy.
Proc. VLDB Endow., 2010

Effective music tagging through advanced statistical modeling.
Proceedings of the Proceeding of the 33rd International ACM SIGIR Conference on Research and Development in Information Retrieval, 2010

Dual Phase Learning for Large Scale Video Gait Recognition.
Proceedings of the Advances in Multimedia Modeling, 2010

A multi-user steganographic file system on untrusted shared storage.
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010

2009
Partially materialized digest scheme: an efficient verification method for outsourced databases.
VLDB J., 2009

Scalable Verification for Outsourced Dynamic Databases.
Proc. VLDB Endow., 2009

An Incremental Threshold Method for Continuous Text Search Queries.
Proceedings of the 25th International Conference on Data Engineering, 2009

Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes.
Proceedings of the Computer Vision, 2009

2008
Verifying Completeness of Relational Query Answers from Online Servers.
ACM Trans. Inf. Syst. Secur., 2008

Authenticating the query results of text search engines.
Proc. VLDB Endow., 2008

Explaining inferences in Bayesian networks.
Appl. Intell., 2008

A Lightweight Buyer-Seller Watermarking Protocol.
Adv. Multim., 2008

Visual Analytics for Supporting Entity Relationship Discovery on Text Data.
Proceedings of the Intelligence and Security Informatics, 2008

2007
Discovering and Exploiting Causal Dependencies for Robust Mobile Context-Aware Recommenders.
IEEE Trans. Knowl. Data Eng., 2007

TUBE (Text-cUBE) for discovering documentary evidence of associations among entities.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Learning Causal Models for Noisy Biological Data Mining: An Application to Ovarian Cancer Detection.
Proceedings of the Twenty-Second AAAI Conference on Artificial Intelligence, 2007

2006
Masking page reference patterns in encryption databases on untrusted storage.
Data Knowl. Eng., 2006

Three architectures for trusted data dissemination in edge computing.
Data Knowl. Eng., 2006

Discovering Causal Dependencies in Mobile Context-Aware Recommenders.
Proceedings of the 7th International Conference on Mobile Data Management (MDM 2006), 2006

Authenticating Multi-dimensional Query Results in Data Publishing.
Proceedings of the Data and Applications Security XX, 2006

2005
Social Network Discovery by Mining Spatio-Temporal Events.
Comput. Math. Organ. Theory, 2005

WmXML: A System for Watermarking XML Data.
Proceedings of the 31st International Conference on Very Large Data Bases, Trondheim, Norway, August 30, 2005

Verifying Completeness of Relational Query Results in Data Publishing.
Proceedings of the ACM SIGMOD International Conference on Management of Data, 2005

Dynamically-optimized context in recommender systems.
Proceedings of the 6th International Conference on Mobile Data Management (MDM 2005), 2005

Authenticating Query Results in Data Publishing.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Evaluation of MPEG-4 IPMP extension.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

DSIM: A Distance-Based Indexing Method for Genomic Sequences.
Proceedings of the Fifth IEEE International Symposium on Bioinformatic and Bioengineering (BIBE 2005), 2005

2004
Steganographic Schemes for File System and B-Tree.
IEEE Trans. Knowl. Data Eng., 2004

Finding Constrained Frequent Episodes Using Minimal Occurrences.
Proceedings of the 4th IEEE International Conference on Data Mining (ICDM 2004), 2004

Hiding Data Accesses in Steganographic File System.
Proceedings of the 20th International Conference on Data Engineering, 2004

Authenticating Query Results in Edge Computing.
Proceedings of the 20th International Conference on Data Engineering, 2004

2003
StegFS: A Steganographic File System.
Proceedings of the 19th International Conference on Data Engineering, 2003

2002
Fast Filter-and-Refine Algorithms for Subsequence Selection.
Proceedings of the International Database Engineering & Applications Symposium, 2002

2000
Load Sharing in Distributed Multimedia-on-Demand Systems.
IEEE Trans. Knowl. Data Eng., 2000

1999
Resource Scheduling In A High-Performance Multimedia Server.
IEEE Trans. Knowl. Data Eng., 1999

1997
Tertiary Storage in Multimedia Systems: Staging of Direct Access?
Multim. Syst., 1997

1995
Multiclass Query Scheduling in Real-Time Database Systems.
IEEE Trans. Knowl. Data Eng., 1995

1994
Managing Memory for Real-Time Queries.
Proceedings of the 1994 ACM SIGMOD International Conference on Management of Data, 1994

1993
Memory-Adaptive External Sorting.
Proceedings of the 19th International Conference on Very Large Data Bases, 1993

Partially Preemptive Hash Joins.
Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, 1993

1992
Transaction Scheduling in Multiclass Real-Time Database Systems.
Proceedings of the Real-Time Systems Symposium, 1992

1991
Multilevel Security Control in Multidatabase Management Systems.
Proceedings of the RIDE-IMS '91, 1991

An Efficient Semantic Query Optimization Algorithm.
Proceedings of the Seventh International Conference on Data Engineering, 1991

Query Processing in OODB.
Proceedings of the Database Systems for Advanced Applications '91, 1991


  Loading...