Wendy Hui Wang

Orcid: 0000-0002-0499-727X

Affiliations:
  • Stevens Institute of Technology, Hoboken, NJ, USA


According to our database1, Wendy Hui Wang authored at least 105 papers between 2004 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Intelligence-Endogenous Management Platform for Computing and Network Convergence.
IEEE Netw., July, 2024

Subgraph Structure Membership Inference Attacks against Graph Neural Networks.
Proc. Priv. Enhancing Technol., 2024

GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning.
Proc. Priv. Enhancing Technol., 2024

Training and Serving System of Foundation Models: A Comprehensive Survey.
IEEE Open J. Comput. Soc., 2024

Efficient privacy-preserving Gaussian process via secure multi-party computation.
J. Syst. Archit., 2024

Differentially Private Federated Learning: A Systematic Review.
CoRR, 2024

SecFormer: Towards Fast and Accurate Privacy-Preserving Inference for Large Language Models.
CoRR, 2024

Revisiting Black-box Ownership Verification for Graph Neural Networks.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

Meta-Learning via PAC-Bayesian with Data-Dependent Prior: Generalization Bounds from Local Entropy.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Revisiting Data Reconstruction Attacks on Real-world Dataset for Federated Natural Language Understanding.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024

Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

SecFormer: Fast and Accurate Privacy-Preserving Inference for Transformer Models via SMPC.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks.
Proc. Priv. Enhancing Technol., October, 2023

FedLab: A Flexible Federated Learning Framework.
J. Mach. Learn. Res., 2023

Personalized Federated Learning via Amortized Bayesian Meta-Learning.
CoRR, 2023

Practical privacy-preserving Gaussian process regression via secret sharing.
Proceedings of the Uncertainty in Artificial Intelligence, 2023

Certified Edge Unlearning for Graph Neural Networks.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Equipping Federated Graph Neural Networks with Structure-aware Group Fairness.
Proceedings of the IEEE International Conference on Data Mining, 2023

Link Membership Inference Attacks against Unsupervised Graph Representation Learning.
Proceedings of the Annual Computer Security Applications Conference, 2023

FEDLEGAL: The First Real-World Federated Learning Benchmark for Legal NLP.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
FairLP: Towards Fair Link Prediction on Social Network Graphs.
Proceedings of the Sixteenth International AAAI Conference on Web and Social Media, 2022

Providing Item-side Individual Fairness for Deep Recommender Systems.
Proceedings of the FAccT '22: 2022 ACM Conference on Fairness, Accountability, and Transparency, Seoul, Republic of Korea, June 21, 2022

Towards Fair and Robust Classification.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

Group Property Inference Attacks Against Graph Neural Networks.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding.
Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2022

Understanding Disparate Effects of Membership Inference Attacks and their Countermeasures.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey.
IEEE Trans. Knowl. Data Eng., 2021

CorrectMR: Authentication of Distributed SQL Execution on MapReduce.
IEEE Trans. Knowl. Data Eng., 2021

Anomalous Event Sequence Detection.
IEEE Intell. Syst., 2021

VeriDL: Integrity Verification of Outsourced Deep Learning Services (Extended Version).
CoRR, 2021

Cyber Intrusion Detection by Using Deep Neural Networks with Attack-sharing Loss.
CoRR, 2021

Automating Fairness Configurations for Machine Learning.
Proceedings of the Companion of The Web Conference 2021, 2021

CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security.
Proceedings of the RAID '21: 24th International Symposium on Research in Attacks, 2021

Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data.
Proceedings of the Biocomputing 2021: Proceedings of the Pacific Symposium, 2021

VeriDL: Integrity Verification of Outsourced Deep Learning Services.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks.
Proceedings of the KDD '21: The 27th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2021

2020
Authenticated Outlier Mining for Outsourced Databases.
IEEE Trans. Dependable Secur. Comput., 2020

Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack.
CoRR, 2020

Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Towards Fair Truth Discovery from Biased Crowdsourced Answers.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data.
Proceedings of the CODASPY '20: Tenth ACM Conference on Data and Application Security and Privacy, 2020

2019
Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis.
Proc. VLDB Endow., 2018

Secure partial encryption with adversarial functional dependency constraints in the database-as-a-service model.
Data Knowl. Eng., 2018

AssureMR: Verifiable SQL Execution on MapReduce.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers.
Proceedings of the 34th IEEE International Conference on Data Engineering, 2018

Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
EARRING: Efficient Authentication of Outsourced Record Matching.
Proceedings of the 2017 IEEE International Conference on Information Reuse and Integration, 2017

Frequency-Hiding Dependency-Preserving Encryption for Outsourced Databases.
Proceedings of the 33rd IEEE International Conference on Data Engineering, 2017

Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Budget-Constrained Result Integrity Verification of Outsourced Data Mining Computations.
Proceedings of the Data and Applications Security and Privacy XXXI, 2017

Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

2016
Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining in Data-Mining-As-a-Service Paradigm.
IEEE Trans. Serv. Comput., 2016

Efficient Authentication of Outsourced String Similarity Search.
CoRR, 2016

GID: Graph-based Intrusion Detection on Massive Process Traces for Enterprise Security Systems.
CoRR, 2016

ARM: Authenticated Approximate Record Matching for Outsourced Databases.
Proceedings of the 17th IEEE International Conference on Information Reuse and Integration, 2016

Privacy-Preserving Outsourcing of Data Mining.
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016

Secure Data Outsourcing with Adversarial Data Dependency Constraints.
Proceedings of the 2nd IEEE International Conference on Big Data Security on Cloud, 2016

Similarity Recoverable, Format-Preserving String Encryption.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
Hiding outliers into crowd: Privacy-preserving data publishing with outliers.
Data Knowl. Eng., 2015

Result Integrity Verification of Outsourced Privacy-preserving Frequent Itemset Mining.
Proceedings of the 2015 SIAM International Conference on Data Mining, Vancouver, BC, Canada, April 30, 2015

2014
Defending against Frequency-Based Attacks on Distributed Data Storage in Wireless Networks.
ACM Trans. Sens. Networks, 2014

Result Integrity Verification of Outsourced Bayesian Network Structure Learning.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

iCoDA: Interactive and exploratory data completeness analysis.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

PraDa: Privacy-preserving Data-Deduplication-as-a-Service.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
Neighborhood prediction based decentralized key management for mobile wireless networks.
Wirel. Networks, 2013

A Fully Distributed Scheme for Discovery of Semantic Relationships.
IEEE Trans. Serv. Comput., 2013

Privacy-Preserving Mining of Association Rules From Outsourced Transaction Databases.
IEEE Syst. J., 2013

Optimizing XML queries: Bitmapped materialized views vs. indexes.
Inf. Syst., 2013

Privacy-Aware Distributed Mobility Data Analytics.
Proceedings of the 21st Italian Symposium on Advanced Database Systems, 2013

Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers.
Proceedings of the 13th SIAM International Conference on Data Mining, 2013

Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee.
Proceedings of the 2013 IEEE 13th International Conference on Data Mining, 2013

Result Integrity Verification of Outsourced Frequent Itemset Mining.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

Privacy-Preserving Distributed Movement Data Aggregation.
Proceedings of the Geographic Information Science at the Heart of Europe, 2013

2012
A Semantics-based Approach to Large-Scale Mobile Social Networking.
Mob. Networks Appl., 2012

AUDIO: An Integrity <i>Audi</i>ting Framework of <i>O</i>utlier-Mining-as-a-Service Systems.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2012

Understanding Data Completeness in Network Monitoring Systems.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Integrity verification of cloud-hosted data analytics computations.
Proceedings of the 1st International Workshop on Cloud Intelligence (colocated with VLDB 2012), 2012

2011
Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks.
Wirel. Networks, 2011

Trajectory anonymity in publishing personal mobility data.
SIGKDD Explor., 2011

Privacy-preserving publishing microdata with full functional dependencies.
Data Knowl. Eng., 2011

Semantics-Enhanced Privacy Recommendation for Social Networking Sites.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems.
Proceedings of the Scientific and Statistical Database Management, 2011

Privacy-Preserving Data Mining from Outsourced Databases.
Proceedings of the Computers, Privacy and Data Protection: an Element of Choice, 2011

2010
Privacy-Preserving Data Sharing in Cloud Computing.
J. Comput. Sci. Technol., 2010

A Reinforcement Learning Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A decentralized key management scheme via neighborhood prediction in mobile wireless networks.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

Privacy-preserving data publishing.
Proceedings of the Workshops Proceedings of the 26th International Conference on Data Engineering, 2010

Ensuring Data Storage Security against Frequency-Based Attacks in Wireless Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010

Distributed and Secure Access Control in P2P Databases.
Proceedings of the Data and Applications Security and Privacy XXIV, 2010

Privacy-Preserving Publishing Data with Full Functional Dependencies.
Proceedings of the Database Systems for Advanced Applications, 2010

SPac: a distributed, peer-to-peer, secure and privacy-aware social space.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

Towards publishing recommendation data with predictive anonymization.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Anonymizing moving objects: how to hide a MOB in a crowd?
Proceedings of the EDBT 2009, 2009

Hiding distinguished ones into crowd: privacy-preserving publishing data with outliers.
Proceedings of the EDBT 2009, 2009

Integrity Verification of Outsourced XML Databases.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009

Answering XML queries using materialized views revisited.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

2008
Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss.
Proceedings of the 14th International Conference on Management of Data, 2008

2007
Optimizing Tree Pattern Queries over Secure XML Databases.
Proceedings of the Secure Data Management in Decentralized Systems, 2007

The Threshold Algorithm: From Middleware Systems to the Relational Engine.
IEEE Trans. Knowl. Data Eng., 2007

2006
Probabilistic privacy analysis of published views.
Proceedings of the 2006 ACM Workshop on Privacy in the Electronic Society, 2006

Efficient Secure Query Evaluation over Encrypted XML Databases.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

Answering Tree Pattern Queries Using Views.
Proceedings of the 32nd International Conference on Very Large Data Bases, 2006

2004
On Testing Satisfiability of Tree Pattern Queries.
Proceedings of the (e)Proceedings of the Thirtieth International Conference on Very Large Data Bases, VLDB 2004, Toronto, Canada, August 31, 2004


  Loading...