X. Sean Wang
TitleCited byYear
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
Time Granularities
C Bettini, S Jajodia, SX Wang
Databases, Data Mining, and Temporal Reasoning. Berlin, Alemanha: Springer, 2000
Time granularities in databases, data mining, and temporal reasoning
C Bettini, S Jajodia, S Wang
Springer-Verlag New York Inc, 2000
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
A glossary of time granularity concepts
C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang
Temporal Databases: Research and Practice, 406-413, 1998
A data model for supporting on-line analytical processing
C Li, XS Wang
Proceedings of the fifth international conference on Information and …, 1996
Discovering frequent event patterns with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia, JL Lin
Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998
Logical design for temporal databases with multiple granularities
XS Wang, C Bettini, A Brodsky, S Jajodia
ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia
The VLDB Journal—The International Journal on Very Large Data Bases 20 (4 …, 2011
Temporal reasoning in workflow systems
C Bettini, XS Wang, S Jajodia
Distributed and Parallel Databases 11 (3), 269-306, 2002
Mining temporal relationships with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia
IEEE Data Eng. Bull. 21 (1), 32-38, 1998
A general framework for time granularity and its application to temporal reasoning
C Bettini, XS Wang, S Jajodia
Annals of mathematics and artificial intelligence 22 (1-2), 29-58, 1998
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Bases …, 2002
Checking for k-anonymity violation by views
C Yao, XS Wang, S Jajodia
Proceedings of the 31st international conference on Very large data bases …, 2005
Abstraction-based intrusion detection in distributed environments
P Ning, S Jajodia, XS Wang
ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001
Supporting content-based searches on time series via approximation
C Wang, XS Wang
Scientific and Statistical Database Management, 2000. Proceedings. 12th …, 2000
Large scale real-time ridesharing with service guarantee on road networks
Y Huang, F Bastani, R Jin, XS Wang
Proceedings of the VLDB Endowment 7 (14), 2017-2028, 2014
Continually evaluating similarity-based pattern queries on a streaming time series
L Gao, XS Wang
Proceedings of the 2002 ACM SIGMOD international conference on Management of …, 2002
The system can't perform the operation now. Try again later.
Articles 1–20