Publications
keep going
About Me
Teaching
Research
Publications
Services/Awards
Notebook
Citations in Microsoft Academic Search
Citations in Google Scholar
by year:
select year
2013
2012
2011
2010
2009
2008
2007
2006
2005
2004
2003
2002
2001
2000
by type:
select type
journal articles
referred proceeding articles
book chapters
books
others
Results:
Publications:
All the referred publications (43 in total) ordered by year:
journal
(2012)
Government Information Quarterly (by Elsevier).
[publisher url]
A hierarchical model of e-government service capability: an empirical analysis.
vol.29 no.4. pages 564-572. October 2012.
.
[paper url]
[Abstract]
referred conference proceeding
(2012)
Proceedings of 8th International Conference on Advanced Data Mining and Applications (ADMA 2012).
[publisher url]
Stock trend extraction via matrix factorization.
Nanjing, China. December 15-18, 2012.
.
[paper url]
[Abstract]
referred conference proceeding
(2012)
Proceedings of the 2nd International Conference on Business Computing and Global Informatization (BCGIn 2012).
[publisher url]
Customizing privacy protection in data publishing.
Shanghai, China. October 10-12, 2012.
.
[paper url]
[Abstract]
referred conference proceeding
(2011)
Proceedings of the 2011 International MultiConference of Engineers and Computer Scientists.
[publisher url]
A comparative study on data perturbation with feature selection
IMECS 2011, pp:454-459, 2011
.
[paper url]
referred conference proceeding
(2011)
Proceedings of the 2011 International Conference on Business Computing and Global Informatization.
[publisher url]
Impact Antecedents of e-government Content Service Capability: An Exploratory Empirical Study
pp:188-191, 2011
.
[paper url]
[Abstract]
referred conference proceeding
(2011)
Proceedings of the 7th International Conference on Data Mining (DMIN)
Constrained Nonnegative Matrix Factorization for Data Privacy
pp:88-93, 2011 DMIN
[Abstract]
journal
(2010)
International Journal of Granular Computing Rough Sets and Intelligent Systems.
[publisher url]
Towards Real-time Performance of Data Privacy Protection
Vol.1, No.4, pp:329-342, 2010
.
[paper url]
[Abstract]
journal
(2010)
International Review of Administrative Sciences.
[publisher url]
The Distinctive Lexicon and Consensual Conception of E-Government:An Exploratory Perspective
Vol.76, No.3, pp:577-597, 2010
.
[paper url]
[Abstract]
referred conference proceeding
(2010)
Proceedings of the 2010 International Conference on Information Systems.
[publisher url]
Privacy Preservation of Affinities in Social Networks
pp:372–376, 2010
.
[paper url]
[Abstract]
referred conference proceeding
(2010)
Proceedings of the 2010 International conference on Computataional and Information Sciences.
[publisher url]
An experimental study of matrix based data distortion methods
pp:952-955, http://www.computer.org/portal/web/csdl/doi/10.1109/ICCIS.2010.234
.
[paper url]
[Abstract]
other
(2010)
Indiana University Technical Report
Customizing Privacy Protection in Data Publishing
[Abstract]
journal
(2009)
The Electronic Library by Emerald Group Publishing Limited (ISSN: 0264-0473.
[publisher url]
TheWidely Shared Definition of E-Govenment: An Exploratory Study
Vol.27, No.6, pp:968 - 985(18), 2009
.
[paper url]
[Abstract]
referred conference proceeding
(2009)
the 3rd International Conference on Bioinformatics and Biomedical Engineering (iCBBE 2009).
[publisher url]
White Matter Fiber Tract Segmentation Using Nonnegative Matrix Factorization
ICBBE2009, Beijing, China 11-13 June 2009
.
[paper url]
[Abstract]
referred conference proceeding
(2009)
2009 IEEE International Conference on Information Technology and Computer Science.
[publisher url]
The Conceptual Construction of E-government
vol.1, pp.130-133,
.
[paper url]
[Abstract]
referred conference proceeding
(2009)
2009 SIAM International Conference on Data Mining (SDM09).
[publisher url]
Privacy Preservation in Social Networks with Sensitive Edge Weights
pp:954-965. April 30-May 2, 2009, Sparks, Nevada. (Full Paper, Acceptance Ratio: 55/351 = 15.7%)
.
[paper url]
[Abstract]
referred conference proceeding
(2009)
2009 Workshop on Link Analysis, Counterterrorism and Security.
[publisher url]
Privacy Vulnerabilities with Background Information in Data Perturbation.
2009 Workshop on Link Analysis, Counterterrorism and Security Sparks, Nevada, May 2, 2009
[Abstract]
referred conference proceeding
(2009)
Proceedings of 2009 IEEE Symposium on Computational Intelligence and Data Mining.
[publisher url]
Generalized Random Rotation Perturbation for Vertically Partitioned Data Sets
Proceedings of 2009 CIDM. pp:159-162, Nashville, TN, March 30 - April 2, 2009.
.
[paper url]
[Abstract]
journal
(2008)
International Journal of Information and Computer Security (Inderscience Publishers).
[publisher url]
A Novel Data Distortion Approach via Selective SSVD for Privacy Protection
Vol.2, No.1, pp:48-70, 2008
.
[paper url]
[Abstract]
referred conference proceeding
(2008)
2008 IEEE International Conference on Data Mining: Workshop on Reliability Issues in Knowledge Discovery
Wavelet-based Data Perturbation for Simultaneous Privacy-preserving and Statistics-preserving
pp:27-35. December 15, 2008, Pisa, Italy
.
[paper url]
[Abstract]
referred conference proceeding
(2008)
The 2008 IEEE International Conference on Granular Computing (GrC2008).
[publisher url]
Towards Real-time Performance of Data Value Hiding for Frequent Data Updates
pp:606-611, August 26-28, 2008. Hangzhou, China
.
[paper url]
[Abstract]
book chapter
(2008)
the Encyclopedia of Data Warehousing and Mining (2nd Edition).
[publisher url]
Matrix Decomposition Techniques for Data Privacy
pp:1183-1193. the Encyclopedia of Data Warehousing and Mining (2nd Edition)
.
[paper url]
other
(2008)
Ph.D. Dissertation, University of Kentucky
Matrix Decomposition for Data Disclosure Control and Data Mining Applications
referred conference proceeding
(2007)
IEEE International Conference on Data Mining.
[publisher url]
Simultaneous Data and Pattern Hiding in Unsupervised Learning
Proceedings of the 7th IEEE International Conference on Data Mining Workshops pp.729-734, Omaha, NE
.
[paper url]
[Abstract]
referred conference proceeding
(2007)
IEEE Conference on Intelligence and Security Informatics .
[publisher url]
Addressing Accuracy Issues in Privacy Preserving Data Mining through Matrix Factorization
ISI 2007 pp:217-220. 23-24 May 2007. NewBrunswick, NJ
.
[paper url]
[Abstract]
journal
(2006)
Applied Mathematics and Computation.
[publisher url]
High Order Compact Computation and Nonuniform Grids for Streamfunction Vorticity Equations
179(1):108-120. 2006
.
[paper url]
[Abstract]
journal
(2006)
Applied Mathematics and Computation.
[publisher url]
A General Meshsize Fourth-order Compact Difference Discretization Scheme for 3D Poisson Equation
183(2):804-812. 2006
.
[paper url]
[Abstract]
journal
(2006)
Knowledge and Information Systems (KAIS).
[publisher url]
A Singular Value Decomposition Based Data Distortion Strategy for Privacy Protection
10(3):383-397. 2006
.
[paper url]
[Abstract]
referred conference proceeding
(2006)
IEEE International Conference on Data Mining.
[publisher url]
NNMF-Based Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets
Proceedings of the Sixth IEEE International Conference on Data Mining - Workshops. pp:513-517, 2006
.
[paper url]
[Abstract]
referred conference proceeding
(2006)
International Conference on Information & Knowledge Engineering.
[publisher url]
Selective Data Distortion via Structural Partition and SSVD for Privacy Preservation
Proceedings of the IKE2006. pp: 114 - 120, June 26-29, 2006. CSREA Press, Las Vegas, Nevada, USA
.
[paper url]
[Abstract]
other
(2006)
IMACS International Symposium on Iterative Methods in Scientific Computation.
[publisher url]
Iterative-based Matrix Factorization Techniques for High-Accuracy Privacy Protection on Non-negative-valued Datasets
College Station, Texas. November 14-17, 2006
other
(2006)
Annual kentucky Statewide EPSCoR Conference.
[publisher url]
SSVD for Privacy Protection -- Poster Presentation
12th. Louisville Marriott Downtwon Hotel, Kentucky. May 15, 2006
referred conference proceeding
(2005)
IEEE Conference on Intelligence and Security Informatics .
[publisher url]
Data Distortion for Privacy Protection in a Terrorist Analysis System
pp:459-464. ISI 2005, May 19-20, 2005, Atlanta, GA
.
[paper url]
[Abstract]
book
(2005)
Scientific and Technical Documents Publishing House. Beijing, China
Book: Information Technology
editor: Weijun Zhong, Ji Chi, Jie Wang and Shue Mei
referred conference proceeding
(2004)
Computational and Information Science 2004 Proceedings by Springer Berlin / Heidelberg.
[publisher url]
Support Vector Machine Approach for Aartner Selection of Virtual Enterprises
LECTURE NOTES IN COMPUTEENCE 3314: pp:1247-1253, 2004
.
[paper url]
[Abstract]
referred conference proceeding
(2004)
International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES) .
[publisher url]
Multiagent-Based Partner Selection of Dynamic Alliances in Inter-organizational Collaborative E-commerce
Proceedings. pp:793, China, 2004
.
[paper url]
[Abstract]
journal
(2003)
Logistics Tech China
Design and Implementation of E-Procurement System for Manufacturing Enterprises
December 2003, China
journal
(2002)
Market Weekly, China
XML Technology and E-Sourcing
August 2002
referred conference proceeding
(2002)
International Symposium on Distributed Computing and Applications to Business, Engineering and Science (DCABES) .
[publisher url]
The Application of XML Technology in E-procurement
Dec 16-20, 2002, China
book chapter
(2002)
Publishing House of China Broadcast and Television, China
Information Technology Theory and application: Chapter 3 Industry Information Technology
November 2002
referred conference proceeding
(2001)
Journal of Nanjing University of Chemical Technology (Natural Science Edition)
Application of XML technology to Electronic Commerce Systems
Vol.23, No.5. pp:36 - 40. 2001, China
journal
(2000)
Journal of Nanjing University of Chemical Technology (Natural Science Edition)
Improved Network Simulation Algorithm and its Implementation
Vol.22, No.4, pp:39 - 42. 2000, China
other
(0000)
Master Thesis, Beijing University of Chemical Technology
Simulation Software Development Environment for Large-Scale Chemical Process - Simulation of Flow and Pressure Network of Fluid
other
(0000)
Undergraduate Thesis, Nanjing University of Technology
Intelligent PID Controller for the Temperature of Chemical Mixer
About Me
>
Publication
>