Moving target defense: creating asymmetric uncertainty for cyber threats S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang Springer Science & Business Media, 2011 | 648 | 2011 |
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 559 | 2013 |
Protecting privacy against location-based personal identification C Bettini, XS Wang, S Jajodia Workshop on Secure Data Management, 185-199, 2005 | 544 | 2005 |
Vetting undesirable behaviors in android apps with permission use analysis Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang Proceedings of the 2013 ACM SIGSAC conference on Computer & communications …, 2013 | 452 | 2013 |
Time granularities in databases, data mining, and temporal reasoning C Bettini, S Jajodia, S Wang Springer-Verlag New York Inc, 2000 | 409* | 2000 |
Discovering calendar-based temporal association rules Y Li, P Ning, XS Wang, S Jajodia Data & Knowledge Engineering 44 (2), 193-218, 2003 | 405 | 2003 |
A data model for supporting on-line analytical processing C Li, XS Wang Proceedings of the fifth international conference on Information and …, 1996 | 282 | 1996 |
Large scale real-time ridesharing with service guarantee on road networks Y Huang, R Jin, F Bastani, XS Wang arXiv preprint arXiv:1302.6666, 2013 | 278 | 2013 |
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia The VLDB journal 20 (4), 541-566, 2011 | 230 | 2011 |
A glossary of time granularity concepts C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang Temporal Databases: Research and Practice, 406-413, 1998 | 220 | 1998 |
Discovering frequent event patterns with multiple granularities in time sequences C Bettini, XS Wang, S Jajodia, JL Lin Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998 | 208 | 1998 |
Logical design for temporal databases with multiple granularities XS Wang, C Bettini, A Brodsky, S Jajodia ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997 | 190 | 1997 |
Temporal reasoning in workflow systems C Bettini, XS Wang, S Jajodia Distributed and Parallel Databases 11 (3), 269-306, 2002 | 179 | 2002 |
A weighted moving average-based approach for cleaning sensor data Y Zhuang, L Chen, XS Wang, J Lian 27th International Conference on Distributed Computing Systems (ICDCS'07), 38-38, 2007 | 166 | 2007 |
Checking for k-anonymity violation by views C Yao, XS Wang, S Jajodia Proceedings of the 31st international conference on Very large data bases …, 2005 | 159 | 2005 |
Mining temporal relationships with multiple granularities in time sequences C Bettini, XS Wang, S Jajodia IEEE Data Eng. Bull. 21 (1), 32-38, 1998 | 159 | 1998 |
Provisions and obligations in policy management and security applications C Bettini, S Jajodia, XS Wang, D Wijesekera Proceedings of the 28th international conference on Very Large Data Bases …, 2002 | 149 | 2002 |
Supporting content-based searches on time series via approximation C Wang, XS Wang Scientific and Statistical Database Management, 2000. Proceedings. 12th …, 2000 | 147 | 2000 |
A general framework for time granularity and its application to temporal reasoning C Bettini, XS Wang, S Jajodia Annals of mathematics and artificial intelligence 22 (1), 29-58, 1998 | 147 | 1998 |
Abstraction-based intrusion detection in distributed environments P Ning, S Jajodia, XS Wang ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001 | 145 | 2001 |