DD17 |
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases |
2017-2018 |
|
DD2 |
Automatically Mining Facets for Queries from Their Search Results |
2017-2018 |
|
DD3 |
Building an intrusion detection system using a filter-based feature selection algorithm |
2017-2018 |
|
DD4 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
2017-2018 |
|
DD5 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
2017-2018 |
|
DD6 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
2017-2018 |
|
DD7 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
2017-2018 |
|
DD8 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
2017-2018 |
|
DD9 |
Efficient Cache-Supported Path Planning on Roads |
2017-2018 |
|
DFS1 |
Answering Approximate Queries over XML Data |
2017-2018 |
|
DIP1 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
2017-2018 |
|
DIP2 |
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
2017-2018 |
|
DIP3 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
2017-2018 |
|
DIP4 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
2017-2018 |
|
DIP5 |
A novel steganography method based on matrix pattern and LSB algorithms in RGB images |
2017-2018 |
|
DIP6 |
Image segmentation for determinations of object descriptions |
2017-2018 |
|
DIP7 |
Towards building a distributed file system for remote sensing image process |
2017-2018 |
|
DISC1 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
2017-2018 |
|
DISC2 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
2017-2018 |
|
DISC3 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
2017-2018 |
|
DISC4 |
Profiling Online Social Behaviors for Compromised Account Detection |
2017-2018 |
|
DM1 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2017-2018 |
|
DM2 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
2017-2018 |
|
DM3 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
2017-2018 |
|
DM4 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2017-2018 |
|