X. Sean Wang
Cited by
Cited by
Moving target defense: creating asymmetric uncertainty for cyber threats
S Jajodia, AK Ghosh, V Swarup, C Wang, XS Wang
Springer Science & Business Media, 2011
Appintent: Analyzing sensitive data transmission in android for privacy leakage detection
Z Yang, M Yang, Y Zhang, G Gu, P Ning, XS Wang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Protecting privacy against location-based personal identification
C Bettini, XS Wang, S Jajodia
Workshop on Secure Data Management, 185-199, 2005
Vetting undesirable behaviors in android apps with permission use analysis
Y Zhang, M Yang, B Xu, Z Yang, G Gu, P Ning, XS Wang, B Zang
Proceedings of the 2013 ACM SIGSAC conference on Computer & communicationsá…, 2013
Time granularities in databases, data mining, and temporal reasoning
C Bettini, S Jajodia, S Wang
Springer-Verlag New York Inc, 2000
Discovering calendar-based temporal association rules
Y Li, P Ning, XS Wang, S Jajodia
Data & Knowledge Engineering 44 (2), 193-218, 2003
A data model for supporting on-line analytical processing
C Li, XS Wang
Proceedings of the fifth international conference on Information andá…, 1996
Large scale real-time ridesharing with service guarantee on road networks
Y Huang, R Jin, F Bastani, XS Wang
arXiv preprint arXiv:1302.6666, 2013
Privacy in geo-social networks: proximity notification with untrusted service providers and curious buddies
S Mascetti, D Freni, C Bettini, XS Wang, S Jajodia
The VLDB journal 20 (4), 541-566, 2011
A glossary of time granularity concepts
C Bettini, C Dyreson, W Evans, R Snodgrass, X Wang
Temporal Databases: Research and Practice, 406-413, 1998
Discovering frequent event patterns with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia, JL Lin
Knowledge and Data Engineering, IEEE Transactions on 10 (2), 222-237, 1998
Logical design for temporal databases with multiple granularities
XS Wang, C Bettini, A Brodsky, S Jajodia
ACM Transactions on Database Systems (TODS) 22 (2), 115-170, 1997
Temporal reasoning in workflow systems
C Bettini, XS Wang, S Jajodia
Distributed and Parallel Databases 11 (3), 269-306, 2002
A weighted moving average-based approach for cleaning sensor data
Y Zhuang, L Chen, XS Wang, J Lian
27th International Conference on Distributed Computing Systems (ICDCS'07), 38-38, 2007
Checking for k-anonymity violation by views
C Yao, XS Wang, S Jajodia
Proceedings of the 31st international conference on Very large data basesá…, 2005
Mining temporal relationships with multiple granularities in time sequences
C Bettini, XS Wang, S Jajodia
IEEE Data Eng. Bull. 21 (1), 32-38, 1998
Provisions and obligations in policy management and security applications
C Bettini, S Jajodia, XS Wang, D Wijesekera
Proceedings of the 28th international conference on Very Large Data Basesá…, 2002
Supporting content-based searches on time series via approximation
C Wang, XS Wang
Scientific and Statistical Database Management, 2000. Proceedings. 12thá…, 2000
A general framework for time granularity and its application to temporal reasoning
C Bettini, XS Wang, S Jajodia
Annals of mathematics and artificial intelligence 22 (1), 29-58, 1998
Abstraction-based intrusion detection in distributed environments
P Ning, S Jajodia, XS Wang
ACM Transactions on Information and System Security (TISSEC) 4 (4), 407-452, 2001
The system can't perform the operation now. Try again later.
Articles 1–20