Citations in Microsoft Academic Search
Citations in Google Scholar

 
by year:
by type:
Results:

Publications: All the referred publications (43 in total) ordered by year:
  1. journal (2012)
    Government Information Quarterly (by Elsevier). [publisher url]
    A hierarchical model of e-government service capability: an empirical analysis.
    vol.29 no.4. pages 564-572. October 2012. . [paper url] [Abstract]
  2. referred conference proceeding (2012)
    Proceedings of 8th International Conference on Advanced Data Mining and Applications (ADMA 2012). [publisher url]
    Stock trend extraction via matrix factorization.
    Nanjing, China. December 15-18, 2012. . [paper url] [Abstract]
  3. referred conference proceeding (2012)
    Proceedings of the 2nd International Conference on Business Computing and Global Informatization (BCGIn 2012). [publisher url]
    Customizing privacy protection in data publishing.
    Shanghai, China. October 10-12, 2012. . [paper url] [Abstract]
  4. referred conference proceeding (2011)
    Proceedings of the 2011 International MultiConference of Engineers and Computer Scientists. [publisher url]
    A comparative study on data perturbation with feature selection
    IMECS 2011, pp:454-459, 2011 . [paper url]
  5. referred conference proceeding (2011)
    Proceedings of the 2011 International Conference on Business Computing and Global Informatization. [publisher url]
    Impact Antecedents of e-government Content Service Capability: An Exploratory Empirical Study
    pp:188-191, 2011 . [paper url] [Abstract]
  6. referred conference proceeding (2011)
    Proceedings of the 7th International Conference on Data Mining (DMIN)
    Constrained Nonnegative Matrix Factorization for Data Privacy
    pp:88-93, 2011 DMIN [Abstract]
  7. journal (2010)
    International Journal of Granular Computing Rough Sets and Intelligent Systems. [publisher url]
    Towards Real-time Performance of Data Privacy Protection
    Vol.1, No.4, pp:329-342, 2010 . [paper url] [Abstract]
  8. journal (2010)
    International Review of Administrative Sciences. [publisher url]
    The Distinctive Lexicon and Consensual Conception of E-Government:An Exploratory Perspective
    Vol.76, No.3, pp:577-597, 2010 . [paper url] [Abstract]
  9. referred conference proceeding (2010)
    Proceedings of the 2010 International Conference on Information Systems. [publisher url]
    Privacy Preservation of Affinities in Social Networks
    pp:372–376, 2010 . [paper url] [Abstract]
  10. referred conference proceeding (2010)
    Proceedings of the 2010 International conference on Computataional and Information Sciences. [publisher url]
    An experimental study of matrix based data distortion methods
    pp:952-955, http://www.computer.org/portal/web/csdl/doi/10.1109/ICCIS.2010.234 . [paper url] [Abstract]
  11. other (2010)
    Indiana University Technical Report
    Customizing Privacy Protection in Data Publishing
    [Abstract]
  12. journal (2009)
    The Electronic Library by Emerald Group Publishing Limited (ISSN: 0264-0473. [publisher url]
    TheWidely Shared Definition of E-Govenment: An Exploratory Study
    Vol.27, No.6, pp:968 - 985(18), 2009 . [paper url] [Abstract]
  13. referred conference proceeding (2009)
    the 3rd International Conference on Bioinformatics and Biomedical Engineering (iCBBE 2009). [publisher url]
    White Matter Fiber Tract Segmentation Using Nonnegative Matrix Factorization
    ICBBE2009, Beijing, China 11-13 June 2009 . [paper url] [Abstract]
  14. referred conference proceeding (2009)
    2009 IEEE International Conference on Information Technology and Computer Science. [publisher url]
    The Conceptual Construction of E-government
    vol.1, pp.130-133, . [paper url] [Abstract]
  15. referred conference proceeding (2009)
    2009 SIAM International Conference on Data Mining (SDM09). [publisher url]
    Privacy Preservation in Social Networks with Sensitive Edge Weights
    pp:954-965. April 30-May 2, 2009, Sparks, Nevada. (Full Paper, Acceptance Ratio: 55/351 = 15.7%) . [paper url] [Abstract]
  16. referred conference proceeding (2009)
    2009 Workshop on Link Analysis, Counterterrorism and Security. [publisher url]
    Privacy Vulnerabilities with Background Information in Data Perturbation.
    2009 Workshop on Link Analysis, Counterterrorism and Security Sparks, Nevada, May 2, 2009 [Abstract]
  17. referred conference proceeding (2009)
    Proceedings of 2009 IEEE Symposium on Computational Intelligence and Data Mining. [publisher url]
    Generalized Random Rotation Perturbation for Vertically Partitioned Data Sets
    Proceedings of 2009 CIDM. pp:159-162, Nashville, TN, March 30 - April 2, 2009. . [paper url] [Abstract]
  18. journal (2008)
    International Journal of Information and Computer Security (Inderscience Publishers). [publisher url]
    A Novel Data Distortion Approach via Selective SSVD for Privacy Protection
    Vol.2, No.1, pp:48-70, 2008 . [paper url] [Abstract]
  19. referred conference proceeding (2008)
    2008 IEEE International Conference on Data Mining: Workshop on Reliability Issues in Knowledge Discovery
    Wavelet-based Data Perturbation for Simultaneous Privacy-preserving and Statistics-preserving
    pp:27-35. December 15, 2008, Pisa, Italy . [paper url] [Abstract]
  20. referred conference proceeding (2008)
    The 2008 IEEE International Conference on Granular Computing (GrC2008). [publisher url]
    Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
    pp:606-611, August 26-28, 2008. Hangzhou, China . [paper url] [Abstract]
  21. book chapter (2008)
    the Encyclopedia of Data Warehousing and Mining (2nd Edition). [publisher url]
    Matrix Decomposition Techniques for Data Privacy
    pp:1183-1193. the Encyclopedia of Data Warehousing and Mining (2nd Edition) . [paper url]
  22. other (2008)
    Ph.D. Dissertation, University of Kentucky
    Matrix Decomposition for Data Disclosure Control and Data Mining Applications

  23. referred conference proceeding (2007)
    IEEE International Conference on Data Mining. [publisher url]
    Simultaneous Data and Pattern Hiding in Unsupervised Learning
    Proceedings of the 7th IEEE International Conference on Data Mining Workshops pp.729-734, Omaha, NE . [paper url] [Abstract]
  24. referred conference proceeding (2007)
    IEEE Conference on Intelligence and Security Informatics . [publisher url]
    Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization
    ISI 2007 pp:217-220. 23-24 May 2007. NewBrunswick, NJ . [paper url] [Abstract]
  25. journal (2006)
    Applied Mathematics and Computation. [publisher url]
    High Order Compact Computation and Nonuniform Grids for Streamfunction Vorticity Equations
    179(1):108-120. 2006 . [paper url] [Abstract]
  26. journal (2006)
    Applied Mathematics and Computation. [publisher url]
    A General Meshsize Fourth-order Compact Difference Discretization Scheme for 3D Poisson Equation
    183(2):804-812. 2006 . [paper url] [Abstract]
  27. journal (2006)
    Knowledge and Information Systems (KAIS). [publisher url]
    A Singular Value Decomposition Based Data Distortion Strategy for Privacy Protection
    10(3):383-397. 2006 . [paper url] [Abstract]
  28. referred conference proceeding (2006)
    IEEE International Conference on Data Mining. [publisher url]
    NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets
    Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops. pp:513-517, 2006 . [paper url] [Abstract]
  29. referred conference proceeding (2006)
    International Conference on Information & Knowledge Engineering. [publisher url]
    Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation
    Proceedings of the IKE2006. pp: 114 - 120, June 26-29, 2006. CSREA Press, Las Vegas, Nevada, USA . [paper url] [Abstract]
  30. other (2006)
    IMACS International Symposium on Iterative Methods in Scientific Computation. [publisher url]
    Iterative-based Matrix Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets
    College Station, Texas. November 14-17, 2006
  31. other (2006)
    Annual kentucky Statewide EPSCoR Conference. [publisher url]
    SSVD for Privacy Protection -- Poster Presentation
    12th. Louisville Marriott Downtwon Hotel, Kentucky. May 15, 2006
  32. referred conference proceeding (2005)
    IEEE Conference on Intelligence and Security Informatics . [publisher url]
    Data Distortion for Privacy Protection in a Terrorist Analysis System
    pp:459-464. ISI 2005, May 19-20, 2005, Atlanta, GA . [paper url] [Abstract]
  33. book (2005)
    Scientific and Technical Documents Publishing House. Beijing, China
    Book: Information Technology
    editor: Weijun Zhong, Ji Chi, Jie Wang and Shue Mei
  34. referred conference proceeding (2004)
    Computational and Information Science 2004 Proceedings by Springer Berlin / Heidelberg. [publisher url]
    Support Vector Machine Approach for Aartner Selection of Virtual Enterprises
    LECTURE NOTES IN COMPUTEENCE 3314: pp:1247-1253, 2004 . [paper url] [Abstract]
  35. referred conference proceeding (2004)
    International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES) . [publisher url]
    Multiagent-Based Partner Selection of Dynamic Alliances in Inter-organizational Collaborative E-commerce
    Proceedings. pp:793, China, 2004 . [paper url] [Abstract]
  36. journal (2003)
    Logistics Tech China
    Design and Implementation of E-Procurement System for Manufacturing Enterprises
    December 2003, China
  37. journal (2002)
    Market Weekly, China
    XML Technology and E-Sourcing
    August 2002
  38. referred conference proceeding (2002)
    International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES) . [publisher url]
    The Application of XML Technology in E-procurement
    Dec 16-20, 2002, China
  39. book chapter (2002)
    Publishing House of China Broadcast and Television, China
    Information Technology Theory and application: Chapter 3 Industry Information Technology
    November 2002
  40. referred conference proceeding (2001)
    Journal of Nanjing University of Chemical Technology (Natural Science Edition)
    Application of XML technology to Electronic Commerce Systems
    Vol.23, No.5. pp:36 - 40. 2001, China
  41. journal (2000)
    Journal of Nanjing University of Chemical Technology (Natural Science Edition)
    Improved Network Simulation Algorithm and its Implementation
    Vol.22, No.4, pp:39 - 42. 2000, China
  42. other (0000)
    Master Thesis, Beijing University of Chemical Technology
    Simulation Software Development Environment for Large-Scale Chemical Process - Simulation of Flow and Pressure Network of Fluid

  43. other (0000)
    Undergraduate Thesis, Nanjing University of Technology
    Intelligent PID Controller for the Temperature of Chemical Mixer