JD17 |
Privacy-Preserving-Outsourced Association Rule Mining on Vertically Partitioned Databases |
2017-2018 |
|
JD2 |
Automatically Mining Facets for Queries from Their Search Results |
2017-2018 |
|
JD3 |
Building an intrusion detection system using a filter-based feature selection algorithm |
2017-2018 |
|
JD4 |
Connecting Social Media to E-Commerce: Cold-Start Product Recommendation Using Microblogging Information |
2017-2018 |
|
JD5 |
Cross-Domain Sentiment Classification Using Sentiment Sensitive Embeddings |
2017-2018 |
|
JD6 |
Crowdsourcing for Top-K Query Processing over Uncertain Data |
2017-2018 |
|
JD7 |
Domain-Sensitive Recommendation with User-Item Subgroup Analysis |
2017-2018 |
|
JD8 |
Efficient Algorithms for Mining Top-K High Utility Itemsets |
2017-2018 |
|
JD9 |
Efficient Cache-Supported Path Planning on Roads |
2017-2018 |
|
JFS1 |
Answering Approximate Queries over XML Data |
2017-2018 |
|
JIP1 |
A Locality Sensitive Low-Rank Model for Image Tag Completion |
2017-2018 |
|
JIP2 |
A Scalable Approach for Content-Based Image Retrieval in Peer-to-Peer Networks |
2017-2018 |
|
JIP3 |
Learning of Multimodal Representations with Random Walks on the Click Graph |
2017-2018 |
|
JIP4 |
Online Multi-Modal Distance Metric Learning with Application to Image Retrieval |
2017-2018 |
|
JIP5 |
A novel steganography method based on matrix pattern and LSB algorithms in RGB images |
2017-2018 |
|
JIP6 |
Image segmentation for determinations of object descriptions |
2017-2018 |
|
JIP7 |
Towards building a distributed file system for remote sensing image process |
2017-2018 |
|
JISC1 |
Hidden Ciphertext Policy Attribute-Based Encryption Under Standard Assumptions |
2017-2018 |
|
JISC2 |
Optimized Search-and-Compute Circuits and Their Application to Query Evaluation on Encrypted Data |
2017-2018 |
|
JISC3 |
Privacy-Preserving Utility Verification of the Data Published by Non-interactive Differentially Private Mechanisms |
2017-2018 |
|
JISC4 |
Profiling Online Social Behaviors for Compromised Account Detection |
2017-2018 |
|
JM1 |
Energy and Memory Efficient Clone Detection in Wireless Sensor Networks |
2017-2018 |
|
JM2 |
EPLQ: Efficient Privacy-Preserving Location-Based Query Over Outsourced Encrypted Data |
2017-2018 |
|
JM3 |
Secure Overlay Routing Using Key Pre-Distribution: A Linear Distance Optimization Approach |
2017-2018 |
|
JM4 |
Detecting Node Failures in Mobile Wireless Networks: A Probabilistic Approach |
2017-2018 |
|