Issue Date | Title | Author(s) |
2012-11-01 | Executing SQL queries over encrypted character strings in the Database-As-Service model | Wu, Z; Xu, G; Yu, Z; Yi, X; Chen, E; Zhang, Y |
2014-01-01 | Mining user tasks from print logs | Li, X; Zhang, L; Luo, P; Chen, E; Xu, G; Zong, Y; Guan, C |
2018-12-10 | An approach for the protection of users’ book browsing preference privacy in a digital library | Wu, Z; Zheng, C; Xiejian, J; Zhou, Z; Xu, G; Chen, E |
2018-07-01 | An effective approach for the protection of privacy text data in the CloudDB | Wu, Z; Xu, G; Lu, C; Chen, E; Jiang, F; Li, G |
2012-08-22 | A projective clustering algorithm based on significant local dense areas | Zong, Y; Xu, G; Jin, P; Yi, X; Chen, E; Wu, Z |
2013-11-23 | Position-wise contextual advertising: Placing relevant ads at appropriate positions of a web page | Wu, Z; Xu, G; Lu, C; Chen, E; Zhang, Y; Zhang, H |
2015-01-01 | MARS: A multi-aspect Recommender system for Point-of-Interest | Li, X; Xu, G; Chen, E; Li, L |
2013-12-01 | Mining frequent patterns in print logs with semantically alternative labels | Li, X; Zhang, L; Chen, E; Zong, Y; Xu, G |
2018-05-01 | Covering the Sensitive Subjects to Protect Personal Privacy in Personalized Recommendation | Wu, Z; Li, G; Liu, Q; Xu, G; Chen, E |
2015-06-01 | Learning recency based comparative choice towards point-of-interest recommendation | Li, X; Xu, G; Chen, E; Zong, Y |