杨晓春
List of publications from the DBLP Bibliography Server - FAQother persons with the same name:
2009 | ||
---|---|---|
34 | Bin Wang, Gang Xiao, Hao Yu, Xiaochun Yang: Distance-Based Outlier Detection on Uncertain Data. CIT (1) 2009: 293-298 | |
33 | Ye Yuan, Guoren Wang, Yongjiao Sun, Bin Wang, Xiaochun Yang, Ge Yu: An Efficient P2P Range Query Processing Approach for Multi-dimensional Uncertain Data. DASFAA Workshops 2009: 303-318 | |
32 | Shazia Wasim Sadiq, Ke Deng, Xiaofang Zhou, Xiaochun Yang, Walid G. Aref, Alex Delis, Qing Liu, Kai Xu: Workshop Organizers' Message. DASFAA Workshops 2009: 95-96 | |
31 | Aiman Hanna, Hai Zhou Ling, Xiaochun Yang, Mourad Debbabi: A Synergy between Static and Dynamic Analysis for the Detection of Software Security Vulnerabilities. OTM Conferences (2) 2009: 815-832 | |
30 | Syrine Tlili, Xiaochun Yang, Rachid Hadjidj, Mourad Debbabi: Verification of CERT Secure Coding Rules: Case Studies. OTM Conferences (2) 2009: 913-930 | |
29 | Xiaochun Yang, Bin Wang, Ge Yu: Efficient secure data publishing algorithms for supporting information sharing. Science in China Series F: Information Sciences 52(4): 627-644 (2009) | |
2008 | ||
28 | Fangfang Li, Chuanwen Li, Xiaochun Yang, Ge Yu: A Data Storage Method Based on Query Processing Region in Wireless Sensor Networks. ICYCS 2008: 1367-1372 | |
27 | Xiaochun Yang, Weidong Zhao, Li Pan: Graphical symbol recognition in architectural plans with an improved Ant-Tree based clustering algorithm. IJCNN 2008: 390-397 | |
26 | Rachid Hadjidj, Xiaochun Yang, Syrine Tlili, Mourad Debbabi: Model-Checking for Software Vulnerabilities Detection with Multi-Language Support. PST 2008: 133-142 | |
25 | Xiaochun Yang, Bin Wang, Chen Li: Cost-based variable-length-gram selection for string collections to support approximate queries efficiently. SIGMOD Conference 2008: 353-364 | |
24 | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin: Continually Answering Constraint k - NN Queries in Unstructured P2P Systems. J. Comput. Sci. Technol. 23(4): 538-556 (2008) | |
23 | Xiaochun Yang, Yiu-Kai Ng: Answering form-based web queries using the data-mining approach. J. Intell. Inf. Syst. 30(1): 1-32 (2008) | |
22 | Xiaochun Yang, Weidong Zhao, Yufei Chen, Xin Fang: Image segmentation with a fuzzy clustering algorithm based on Ant-Tree. Signal Processing 88(10): 2453-2462 (2008) | |
2007 | ||
21 | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu: Continuous Approximate Window Queries in Wireless Sensor Networks. APWeb/WAIM 2007: 407-418 | |
20 | Bin Wang, Xiaochun Yang, Guoren Wang, Ge Yu: Efficient Difference NN Queries for Moving Objects. APWeb/WAIM 2007: 542-553 | |
19 | Chen Li, Houtan Shirani-Mehr, Xiaochun Yang: Protecting Individual Information Against Inference Attacks in Data Publishing. DASFAA 2007: 422-433 | |
18 | Chen Li, Bin Wang, Xiaochun Yang: VGRAM: Improving Performance of Approximate Queries on String Collections Using Variable-Length Grams. VLDB 2007: 303-314 | |
2006 | ||
17 | Xiaochun Yang, Lin Li, Yiu-Kai Ng, Bin Wang, Ge Yu: Associated Load Shedding Strategies for Computing Multi-joins in Sensor Networks. DASFAA 2006: 50-64 | |
16 | Bin Wang, Xiaochun Yang, Guoren Wang, Lei Chen, Xiaoyang Sean Wang, Xuemin Lin, Ge Yu: Answering Constrained k-NN Queries in Unstructured P2P Systems. DBISP2P 2006: 397-405 | |
2005 | ||
15 | Xiaochun Yang, Chen Li, Ge Yu, Lei Shi: XGuard: A System for Publishing XML Documents without Information Leakage in the Presence of Data Inference. ICDE 2005: 1124-1125 | |
14 | Xiaochun Yang, Xiangyu Liu, Bin Wang, Ge Yu: A K-Anonymizing Approach for Preventing Link Attacks in Data Publishing. ISPA Workshops 2005: 627-636 | |
13 | Zhengyu Ou, Ge Yu, Yaxin Yu, Shanshan Wu, Xiaochun Yang, Qingxu Deng: Tick Scheduling: A Deadline Based Optimal Task Scheduling Approach for Real-Time Data Stream Systems. WAIM 2005: 725-730 | |
2004 | ||
12 | Xiaochun Yang, Bin Wang, Guoren Wang, Ge Yu: A Query Rewriting System for Enhancing the Queriability of Form-Based Interface. ICADL 2004: 462-472 | |
11 | Xiaochun Yang, Chen Li: Secure XML Publishing without Information Leakage in the Presence of Data Inference. VLDB 2004: 96-107 | |
10 | Derong Shen, Ge Yu, Tiezheng Nie, Rui Li, Xiaochun Yang: Modeling QoS for Semantic Equivalent Web Services. WAIM 2004: 478-488 | |
2003 | ||
9 | Xiaochun Yang, Bin Wang: Weave amino acid sequences for protein secondary structure prediction. DMKD 2003: 80-87 | |
8 | Xiaochun Yang, Bin Wang, Yiu-Kai Ng, Ge Yu, Guoren Wang: A Protein Secondary Structure Prediction Framework Based on the Support Vector Machine. WAIM 2003: 266-277 | |
2002 | ||
7 | Seung Jin Lim, Yiu-Kai Ng, Xiaochun Yang: Integrating HTML Tables Using Semantic Hierarchies And Meta-Data Sets. IDEAS 2002: 160-169 | |
2001 | ||
6 | Xiaochun Yang, Ge Yu, Guoren Wang: Efficiently Mapping Integrity Constraints from Relational Database to XML Document. ADBIS 2001: 338-351 | |
5 | Xiaochun Yang, Ge Yu, Guoren Wang, Dan Wang, Baoyan Song: Constraints for Information Cooperation in Virtual Enterprise Systems. CODAS 2001: 175-182 | |
4 | Xiaochun Yang, Guoren Wang: Mapping Referential Integrity Constraints from Relational Databases to XML. WAIM 2001: 329-342 | |
3 | Xiaochun Yang, Ge Yu, Guoren Wang: Distributed Semantic Constraints in Virtual Enterprise Information Integrating Systems. Int. J. Comput. Proc. Oriental Lang. 14(3): 259-278 (2001) | |
2000 | ||
2 | Lina Wang, Ge Yu, Guoren Wang, Xiaochun Yang, Dan Wang, Xiaomei Dong, Daling Wang, Zhe Mei: A Virtual Private Network for Virtual Enterprise Information Systems. Web-Age Information Management 2000: 165-176 | |
1999 | ||
1 | Xiaochun Yang, Guoren Wang, Ge Yu, Dik Lun Lee: Modeling Enterprise Objects in a Virtual Enterprise Integrating System: VIASCOPE. ICSC 1999: 166-175 |