Wendy Hui Wang
Orcid: 0000-0002-0499-727XAffiliations:
- Stevens Institute of Technology, Hoboken, NJ, USA
According to our database1,
Wendy Hui Wang
authored at least 105 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2024
IEEE Netw., July, 2024
Proc. Priv. Enhancing Technol., 2024
Proc. Priv. Enhancing Technol., 2024
IEEE Open J. Comput. Soc., 2024
J. Syst. Archit., 2024
SecFormer: Towards Fast and Accurate Privacy-Preserving Inference for Large Language Models.
CoRR, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
Meta-Learning via PAC-Bayesian with Data-Dependent Prior: Generalization Bounds from Local Entropy.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Revisiting Data Reconstruction Attacks on Real-world Dataset for Federated Natural Language Understanding.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
SecFormer: Fast and Accurate Privacy-Preserving Inference for Transformer Models via SMPC.
Proceedings of the Findings of the Association for Computational Linguistics, 2024
Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Proc. Priv. Enhancing Technol., October, 2023
Proceedings of the Uncertainty in Artificial Intelligence, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
Link Membership Inference Attacks against Unsupervised Graph Representation Learning.
Proceedings of the Annual Computer Security Applications Conference, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022
Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
2021
IEEE Trans. Knowl. Data Eng., 2021
IEEE Trans. Knowl. Data Eng., 2021
VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version).
CoRR, 2021
CoRR, 2021
Proceedings of the Companion of The Web Conference 2021, 2021
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021
Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data.
Proceedings of the Biocomputing 2021: Proceedings of the Pacific Symposium, 2021
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021
PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021
2020
IEEE Trans. Dependable Secur. Comput., 2020
Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack.
CoRR, 2020
Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020
2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis.
Proc. VLDB Endow., 2018
Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
Data Knowl. Eng., 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
2017
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017
2016
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.
IEEE Trans. Serv. Comput., 2016
GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems.
CoRR, 2016
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
Data Knowl. Eng., 2015
Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015
2014
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks.
ACM Trans. Sens. Networks, 2014
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wirel. Networks, 2013
IEEE Trans. Serv. Comput., 2013
Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases.
IEEE Syst. J., 2013
Privacy-Aware Distributed Mobility Data Analytics.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013
Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013
Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013
Proceedings of the Data and Applications Security and Privacy XXVII, 2013
Proceedings of the Geographic Information Science at the Heart of Europe, 2013
2012
Mob. Networks Appl., 2012
AUDIO: An Integrity <i>Audi</i>ting Framework of <i>O</i>utlier-Mining-as-a-Service Systems.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012
Proceedings of the 12th IEEE International Conference on Data Mining, 2012
Proceedings of the 1st International Workshop on Cloud Intelligence (colocated with VLDB 2012), 2012
2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wirel. Networks, 2011
Data Knowl. Eng., 2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems.
Proceedings of the Scientific and Statistical Database Management, 2011
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011
2010
A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010
A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010
Proceedings of the Workshops Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the Distributed Computing in Sensor Systems, 2010
Proceedings of the Data and Applications Security and Privacy XXIV, 2010
Proceedings of the Database Systems for Advanced Applications, 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
Proceedings of the 5th ACM Symposium on Information, 2010
2009
Proceedings of the EDBT 2009, 2009
Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers.
Proceedings of the EDBT 2009, 2009
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009
2008
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss.
Proceedings of the 14th International Conference on Management of Data, 2008
2007
Proceedings of the Secure Data Management in Decentralized Systems, 2007
IEEE Trans. Knowl. Data Eng., 2007
2006
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006
2004
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004