Xiaoyun He
제목
인용
인용
연도
Effective anonymization of query logs
Y Hong, X He, J Vaidya, N Adam, V Atluri
Proceedings of the 18th ACM conference on Information and knowledge …, 2009
582009
Mining public opinion about economic issues: Twitter and the us presidential election
A Karami, LS Bennett, X He
International Journal of Strategic Decision Sciences (IJSDS) 9 (1), 18-28, 2018
482018
Preserving privacy in social networks: A structure-aware approach
X He, J Vaidya, B Shafiq, N Adam, V Atluri
2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and …, 2009
402009
Privacy preserving integration of health care data
N Adam, T White, B Shafiq, J Vaidya, X He
AMIA Annual Symposium proceedings 2007, 1, 2007
212007
Is social media a fad? A study of the adoption and use of social media in SMEs
X He
SAIS 2014 proceedings. Paper 13, 2014
122014
Reachability analysis in privacy-preserving perturbed graphs
X He, J Vaidya, B Shafiq, N Adam, X Lin
2010 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2010
122010
Privacy-preserving link discovery
X He, B Shafiq, J Vaidya, N Adam
Proceedings of the 2008 ACM symposium on Applied computing, 909-915, 2008
72008
The effects of consumer engagement behavior on the growth of social media brand community: Evidence from an SME
X He, A Negahban
Social Media Marketing: Breakthroughs in Research and Practice, 557-578, 2018
62018
Catch a fad or capture a value?: Social media leverage in SMEs
X He, H Lu
Journal of Organizational and End User Computing (JOEUC) 28 (3), 67-81, 2016
62016
Towards ranking the importance of patents
X He, F Zhang, N Adam
2008 IEEE Symposium on Advanced Management of Information for Globalized …, 2008
62008
Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site
X He, A Karami, C Deng
International Journal of Web Based Communities 13 (3), 344-363, 2017
52017
Secure construction and publication of contingency tables from distributed data
X He, H Lu, J Vaidya, N Adam
Journal of Computer Security 19 (3), 453-484, 2011
52011
Efficient privacy-preserving link discovery
X He, J Vaidya, B Shafiq, N Adam, E Terzi, T Grandison
Pacific-Asia Conference on Knowledge Discovery and Data Mining, 16-27, 2009
42009
Privacy Preserving Integration of Health Care Data
X He, J Vaidya, B Shafiq, N Adam, T White
International Journal of Computational Models and Algorithms in Medicine …, 2010
32010
What Makes Video Ads Viral: Quantifying the Impact of Marketer-and User-Generated Content
C Deng, Y Lu, T Ravichandran, X He
22016
Secure construction of contingency tables from distributed data
H Lu, X He, J Vaidya, N Adam
IFIP Annual Conference on Data and Applications Security and Privacy, 144-157, 2008
22008
Fault-tolerant tile mining
H Lu, W Zhu, J Phan, M Ghiassi, Y Fang, Y Hong, X He
Expert Systems with Applications 101, 25-42, 2018
12018
Patent citations and value: through the lens of a social network approach
F Zhang, G Jiang, X He
International Journal of Management and Network Economics 4 (2), 115-143, 2018
12018
Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework
X He, H Lu
Journal of Information Privacy and Security 13 (3), 104-119, 2017
12017
Privacy Preserving Maximum-Flow Computation in Distributed Graphs
X He, J Vaidya, B Shafiq, N Adam
2012 International Conference on Privacy, Security, Risk and Trust and 2012 …, 2012
12012
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20