2026
[CSUR'26] Jie Fu, Yuan Hong, Xinpeng Ling, Leixia Wang, Xun Ran, Zhiyu Sun, Wendy Hui Wang, Zhili Chen and Yang Cao, Differentially Private Federated Learning: A Systematic Review, ACM Computing Surveys (CSUR), Accepted, 2026. [Impact Factor: 28.0, PDF].
2025
[CCS'25] Jie Fu, Yuan Hong, Zhili Chen, Wendy Hui Wang. Safeguarding Graph Neural Networks against Topology Inference Attacks. The ACM Conference on Computer and Communications Security (CCS). Oct 13- 17, 2025. Taipei, Taiwan.
[ECML/PKDD'25 Workshop] Nan Cui, Wendy Hui Wang, Yue Ning. Lightweight Fairness for LLM-Based Recommendations via Kernelized Projection and Gated Adapters. Workshop on Bias and Fairness in AI affiliated with European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD), Sept 15 - 19, 2025. Porto, Portugal.
[Usenix Security'25] Nima Naderloui, Shenao Yao, Binghui Wang, Jie Fu, Wendy Hui Wang, Weiran Liu, Yuan Hong. Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective. The USENIX Security Symposium. August 13 - 15, 2025. Seattle, WA.
[SIGKDD'25] Kun Wu, Wendy Hui Wang. Verification of Incomplete Graph Unlearning through Adversarial Perturbations. The ACM SIGKDD Conference on Knowledge Discovery and Data Mining. August 3 - 7, 2025, Toronto, Canada (Acceptance rate 18.4%). Honorable mention for the Best Student Paper Award [Code ][Full paper]
2024
[CIKM'24] Da Zhong, Xiuling Wang, Zhichao Xu, Jun Xu, Wendy Hui Wang. Interaction-level Membership Inference Attack against Recommender Systems with Long-Tailed Distribution. The Conference on Information and Knowledge Management (CIKM), Oct 21-25, 2024, Boise, Idaho, USA (Acceptance rate 347/1513 = 23%). [Paper ][Code]
[PETS'24] Xiuling Wang, Wendy Hui Wang. Subgraph Structure Membership Inference Attacks against Graph Neural Networks. The 24th Privacy Enhancing Technologies Symposium (PETS), July 15–20, 2024, Bristol, UK. [Paper][Code ]
[PETS'24] Xiuling Wang, Wendy Hui Wang. GCL-Leak: Link Membership Inference Attacks against Graph Contrastive Learning. The 24th Privacy Enhancing Technologies Symposium (PETS), July 15–20, 2024, Bristol, UK. [Paper][Code1] [Code2]
[S&P'24] Ruikai Zhou, Kang Yang, Xiuling Wang, Wendy Hui Wang, Jun Xu. Revisiting Black-box Ownership Verification for Graph Neural Networks. IEEE Symposium on Security and Privacy (S&P). May 20 - 23, 2024. San Francisco, CA. [Paper ]
[AAAI'24] Junjie Chen, Jiahao Li, Song Chen, Bin Li, Qingcai Chen, Hongchang Gao, Hui Wang, Xuzeng Lin, Mingdy Shi. Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks. The 38th AAAI Conference on Artificial Intelligence (AAAI). February 20 - 27, 2024. Vancouver, Canada. [Paper ]
[ICDM'24] Nan Cui, Xiuling Wang, Wendy Hui Wang, Violet Chen, Yue Ning. Equipping Federated Graph Neural Networks with Structure-aware Group Fairness. IEEE International Conference on Data Mining (ICDM). December 1-4, 2023. Shanghai, China. (Acceptance rate 200/1003 = 19.94%). [Paper ]
2023
[ACSAC'23] Xiuling Wang, Wendy Hui Wang. Link Membership Inference Attacks against Unsupervised Graph Representation Learning. The Annual Computer Security Applications Conference (ACSAC). December 4 - 8, 2023. Austin, Texas. (Acceptance rate 59/246=24%). [Paper ][Code1 ][Code2]
[SIGKDD'23] Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang. Certified Edge Unlearning for Graph Neural Networks. 2023 ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), August 6 - 10, 2023. Long Beach, CA. (Acceptance rate 313/1416 = 22%). [Paper][Full version ][Code ]
[PETS'23] Da Zhong, Ruotong Yu, Kun Wu, Xiuling Wang, Jun Xu, Wendy Hui Wang. Disparate Vulnerability in Link Inference Attacks against Graph Neural Networks. The 23rd Privacy Enhancing Technologies Symposium (PETS), July 10–15, 2023, Lausanne, Switzerland. [Paper ][Code ]
2022 and Before
Kun Wu, Jacob Erickson, Wendy Hui Wang, Yue Ning. Equipping Recommender Systems with Individual Fairness via Second-order Proximity Embedding. IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), Nov 10 - 13, 2022. Istanbul, Turkey. [Paper]
Xiuling Wang, Wendy Hui Wang. Group Property Inference Attacks Against Graph Neural Networks. The ACM Conference on Computer and Communications Security (CCS), Nov 7 - 11, 2022, LA, USA. (Acceptance rate 218/971 = 22.5%). [Paper] [Full version] [Code]
Xiuling Wang, Wendy Hui Wang. Providing Item-side Individual Fairness for Deep Recommender Systems. ACM Conference on Fairness, Accountability, and Transparency (FAccT), Seoul, South Korea, June 21-24 2022. (Acceptance rate: 179/711 = 25%). [Paper] [Code ]
Yanying Li, Xiuling Wang, Yue Ning, Wendy Hui Wang. Towards Fair Link Prediction on Social Network Graphs. International AAAI Conference on Web and Social Media (ICWSM), Atlanta, Georgia, June 6 - 9, 2022. [Paper] [Code ]
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang. Towards Fair and Robust Classifiers. IEEE European Symposium on Security and Privacy (EuroS&P), Genoa, June 6 -10, 2022. (Acceptance rate 147/1012 ≈ 14.52%). [Paper] [Code ]
Da Zhong, Haipei Sun, Jun Xu, Neil Gong, Wendy Hui Wang. Understanding Disparate Effects of Membership Inference Attacks and Their Countermeasures. The 17th ACM ASIA Conference on Compute and Communications Security (AsiaCCS). Nagasaki, Japan. May 30 - June 3, 2022. (Acceptance rate 85/463 ≈ 18.3%). [Paper] [Code]
Mohamed Nabeel, Enes Altinisik, Haipei Sun, Issa Khalil, Hui (Wendy) Wang, Ting Yu. CADUE: Content-Agnostic Detection of Unwanted Emails for Enterprise Security. The 24th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2021). Spain, Oct 6 - 8, 2021. [Paper]
Boxiang Dong, Bo Zhang, Wendy Hui Wang. VeriDL: Integrity Verification of Outsourced Deep Learning Services. European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML/PKDD). Virtual. Sep 13, 2021 - Sep 17, 2021. (Acceptance rate 147/685 = 21%). [Paper]
Junjie Chen, Hui Wang, Xinghua Shi. PAR-GAN: Improving the Generalization of Generative Adversarial Networks Against Membership Inference Attacks. ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD). Aug 14 - 18, 2021. Acceptance rate 238/1541 = 15%. [Paper]
Haipei Sun, Yiding Yang, Yanying Li, Huihui Liu, Xinchao Wang, Wendy Hui Wang. Automating Fairness Configurations for Machine Learning. Proceedings of WWW conference, Virtual, April 12, 2021.
Junjie Chen, Hui Wang, Xinghua Shi. Differential Privacy Protection Against Membership Inference Attack on Machine Learning for Genomic Data, Pacific Symposium on Biocomputing (PSB), January 4 - 7, 2021.
Yanying Li, Haipei Sun, Hui Wang. Towards Fair Truth Discovery from Biased Crowdsourced Answers. ACM SIGKDD Conference on Knowledge Discovery and Data Mining (SIGKDD), Full paper acceptance (216/1279 = 17%), August 23 - 27, 2020. San Diego, CA.
Yanying Li, Yue Ning, Rong Liu, Ying Wu, Hui Wang. Fairness of Classification Using Users' Social Relationships in Online Peer-To-Peer Lending. The Web Conference (WWW). April 20 - 21, 2020. Taipei, Taiwan.
Bo Zhang, Boxiang Dong, Hui Wang. AuthPDB: Authentication of Probabilistic Queries on Outsourced Uncertain Data. ACM Conference on Data and Application Security and Privacy (CODASPY). March 16 - 18, 2020. New Orleands, LA, USA.
Haipei Sun, Xiaokui Xiao, Issa Khalil, Yin Yang, Zhan Qin, Hui Wang, Ting Yu. Analyzing Subgraph Statistics from Extended Local Views with Decentralized Differential Privacy. 26th ACM Conference on Computer and Communications Security (CCS). November 11 - 15, 2019. London, UK.
Bo Zhang, Boxiang Dong, Hui Xiong, Hui Wang. Trust-but-Verify: Result Verification of Federated Deep Learning. 1st Workshop on Adversarial Learning Methods for Machine Learning and Data Mining @ KDD 2019, Alaska. August 4 - 8, 2019. Best paper award
Yanying Li, Boxiang Dong, Hui Wang. PIVOT: Privacy-preserving Outsourcing of Text Data for Word Embedding. AAAI Spring Symposium on Privacy-Enhancing Artificial Intelligence and Language Technologies (PAL). Palo Alto, California. March 25 - 27, 2019.
Yanying Li, Haipei Sun, Boxiang Dong, Hui Wang. Cost-efficient Data Acquisition on Online Data Marketplaces for Correlation Analysis. 45th International Conference on Very Large Data Bases (VLDB). Los Angeles, California. August 26 -30, 2019.
Haipei Sun, boxiang Dong, Ting Yu, Zhan Qin, Hui Wang. Truth Inference on Sparse Crowdsourcing Data with Local Differential Privacy. IEEE International Conference on Big Data (regular paper, acceptance rate 98/518=18.9%). Seattle, WA. December 10 - 13, 2018.
Haipei Sun, Boxiang Dong, Bo Zhang, Murat Kantarcioglu, Hui Wang. Sensitive Task Assignments in Crowdsourcing Markets with Colluding Workers. 34th IEEE International Conference on Data Engineering (ICDE). Pairs, France. April 16 - 19. 2018.
Bo Zhang, Boxiang Dong, Hui Wang. AssureMR: Verifiable SQL Execution on MapReduce. 34th IEEE International Conference on Data Engineering (ICDE). Paris, France. April 16 - 19, 2018.
Boxiang Dong, Zhengzhang Chen, Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li and Haifeng Chen. Efficient Discovery of Abnormal Event Sequences in Enterprise Security Systems. In the Proceedings of ACM International Conference on Information and Knowledge Management (CIKM). Singapore. November 6 - 10, 2017. Acceptance rate: 171/820 = 21%.
Boxiang Dong and Hui Wang. EARRING: Efficient Authentication of Outsourced Record Matching. In the Proceedings of 2017 IEEE International Conference on Information Reuse and Integration (IRI 2017). San Diego. August 4 - 6, 2017. Acceptance rate: 29%. Best paper award
Bo Zhang, Boxiang Dong and Hui Wang. Budget-constrained Result Integrity Verification of Outsourced Data Mining Computations. The 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 19-21, 2017. Acceptance rate: 0.35
Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang and Hui Wang. Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. The 37th IEEE International Conference on Distributed Computing (ICDCS) 2017, June 5 - 8, 2017, Atlanta, GA.
Xinyang Zhang, Shouling Ji, Hui Wang and Ting Wang. MDL: Accurate and Private Multiparty Deep Learning. The 37th IEEE International Conference on Distributed Computing (ICDCS) 2017, June 5 - 8, 2017, Atlanta, GA.
Yanying Li, Boxiang Dong, Dominik Jedruszczak and Hui Wang. Budget-constrained High-quality Data Purchase on Data Markets. Workshop of Women in Data Science. Co-located with SIAM International Conference on Data Mining (SDM), April 27 - 29, 2017, Houston, Texas, USA
Boxiang Dong, Hui Wang. Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. IEEE International Conference on Data Engineering (ICDE). April 19 - 22, 2017, San Diego, California.
Yijin Li, Hui Wang. Similarity Recoverable, Format-preserving String Encryption. The 18th Asia Pacific Web Conference (APWeb). Sept 23 - 25, 2016, Suzhou, China.
Boxiang Dong, Hui Wang. ARM: Authenticated Approximate Record Matching for Outsourced Databases. In the IEEE 17th International Conference on Information Reuse and Integration (IRI), Pittsburgh, PA, July 28 - 30, 2016. Acceptance rate: 25.6%.
Hui Wang, Yu Tao, Kai Wang. Developing Online Privacy Education Tools with Inputs from the Crowd. The 22nd Americas Conference on Information Systems (AMCIS). San Diego, August 11 - 14, 2016.
Anna Monreale, Hui Wang. Privacy-preserved Data Mining in Cloud (Invited paper). SIMICE workshop, colocated with the 40th IEEE Computer Society International Conference on Computers, Software & Applications. Atlanta, Georgia, June 10-14, 2016.
Boxiang, Hui Wang, Jie Yang. Secure Data Outsourcing with Adversarial Data Dependency Constraints. The IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016). New York. April 9 - 10, 2016.
Xinyang Zhang, Shouling Ji, Hui Wang and Ting Wang. MDL: Accurate and Private Multiparty Deep Learning. The 37th IEEE International Conference on Distributed Computing (ICDCS) 2017, June 5 - 8, 2017, Atlanta, GA.
Yanying Li, Boxiang Dong, Dominik Jedruszczak and Hui Wang. Budget-constrained High-quality Data Purchase on Data Markets. Workshop of Women in Data Science. Co-located with SIAM International Conference on Data Mining (SDM), April 27 - 29, 2017, Houston, Texas, USA
Boxiang Dong, Hui Wang. Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. IEEE International Conference on Data Engineering (ICDE). April 19 - 22, 2017, San Diego, California. Acceptance rate: 63/356 = 18%
Yijin Li, Hui Wang. Similarity Recoverable, Format-preserving String Encryption. The 18th Asia Pacific Web Conference (APWeb). Sept 23 - 25, 2016, Suzhou, China.
Boxiang Dong, Hui Wang. ARM: Authenticated Approximate Record Matching for Outsourced Databases. In the IEEE 17th International Conference on Information Reuse and Integration (IRI), Pittsburgh, PA, July 28 - 30, 2016. Acceptance rate: 25.6%.
Hui Wang, Yu Tao, Kai Wang. Developing Online Privacy Education Tools with Inputs from the Crowd. The 22nd Americas Conference on Information Systems (AMCIS). San Diego, August 11 - 14, 2016.
Anna Monreale, Hui Wang. Privacy-preserved Data Mining in Cloud (Invited paper). SIMICE workshop, colocated with the 40th IEEE Computer Society International Conference on Computers, Software & Applications. Atlanta, Georgia, June 10-14, 2016.
Boxiang, Hui Wang, Jie Yang. Secure Data Outsourcing with Adversarial Data Dependency Constraints. The IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016). New York. April 9 - 10, 2016.
Ruilin Liu, Wendy Wang. Result Integrity Verification of Outsource Privacy-preserving Frequent Itemset Mining, SIAM International Conference on Data Mining (SDM). Vancouver, Canada, Apri 30 - May 2, 2015.
Boxiang Dong, Ruilin Liu, Wendy Hui Wang. PraDa: Privacy-preserving Data-Deduplication-as-a-Service, ACM International Conference on Information and Knowledge Management (CIKM), Nov 3 - 7, 2014, Shanghai, P.R.China. Acceptance rate: 25/123 = 20%.
Ruilin Liu, Wendy Hui Wang, Changhe Yuan. Result Integrity Verification of Outsourced Bayesian Network Structure Learning [pdf], 2014 SIAM International Conference on Data Mining (SDM), April 24 - 26, 2014, Philadephia, Pennsylvania, USA.
Ruilin Liu, Wendy Hui Wang, Flip Korn. iCoDA: Interactive Exploratory Data Completeness Analysis [pdf], IEEE International Conference on Data Engineering (ICDE). Chicago, IL, March 31 - April 4, 2014.
Boxiang Dong, Ruilin Liu, Wendy Hui Wang. Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee [pdf], IEEE International Conference on Data Mining (ICDM), Dec. 2013. Acceptance rate: 159/809 = 19.7%.
Boxiang Dong, Ruilin Liu, Wendy Hui Wang, Result Integrity Verification of Outsourced Frequent Itemset Mining [pdf]. The 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Newark, NJ, July 15 -17, 2013.
Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady Andrienko, Natalia Andrienko, Privacy-preserving Distributed Movement Data Aggregation [pdf], 16th AGILE Conference on Geographic Information Science, 14-17 May 2013, Leuven, Belgium.
Ruilin Liu, Hui(Wendy) Wang, Philippos Mordohai, Hui Xiong. Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers [pdf], 2013 SIAM International Conference on Data Mining (SDM), May 2 - 4, 2013, Austi, Texas, USA.
Flip Korn, Ruilin Liu, Hui Wang. Understanding Data Completeness in Network Monitoring Systems (Full paper; 10.7% acceptance rate for 756 submissions) [pdf]. The IEEE International Conference on Data Mining (ICDM), Dec 10 - 13, 2012.
Hui Wang, Integrity Verification of Cloud-hosted Data Analytics Computations [pdf], VLDB Cloud Intelligence workshop, August 27 -31, 2012, Istanbul, Turkey.
Ruilin Liu, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo, AUDIO: An Integrity Auditing Framework of Outlier-mining-as-a-service Systems [pdf], The Euopean Conference on Machine Learning and Principles and Practice of Knowledge Discovry in Databases (ECML/PKDD), (acceptance ratio: 109/443=23%), September 24 - 28, 2012, Bristol, UK.
Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang: Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. Twentieth Italian Symposium on Advanced Database Systems (SEBD): 233-242. June 24 - 27, 2012, Venice, Italy.
Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala, "Semantics-enhanced Privacy Recommendation for Social Networking Sites", The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 11), Changsha, China, November 16-18, 2011.
Hui Wang, Ruilin Liu, Dimitri Theodoratos and Xiaoying Wu, "Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems", 23rd Scientific and Statistical Database Management Conference (SSDBM'11), July 20-22, 2011, Portland, OR, USA
Xiuyuan Zheng, Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu, "A Decentralized Key Management Scheme via Neighborhood Prediction in Mobile Wireless Networks", the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), acceptance ratio: 51/185=0.28), Nov. 8-12, 2010, San Francisco, CA. [pdf]
Angela Bonifati, Hui Wang, Ruilin Liu, "SPAC: A Distributed, Peer-to-Peer, Secure and Privacy-aware Social Space", the 19th International Conference on Information and Knowledge Management (CIKM'10), Demo track, Oct. 26 - 30, 2010, Toronto, Canada.
Angela Bonifati, Hui Wang, Ruilin Liu, "Distributed and Secure Access Control in P2P Databases", the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), June 21 - 23, 2010, Rome, Italy. [pdf]
Hongbo Liu, Hui Wang, Yingying Chen, "Ensuring Data Storage Security against Frequency-based Attacks in Wireless Networks", The 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), June 21 - 23, 2010, Santa Barbara, California. [pdf]
Juan Li, Hui Wang, "Distributed Discovery of Semantic Relationships", IEEE International Workshop on Knowledge Management for Future Services and Networks (KMFSAN), April 23, 2010, Osaka, Japan. [pdf]
Chih-Cheng Chang, Brian Thompson, Hui Wang, Danfeng Yao, "Towards Publishing Recommendation Data With Predictive Anonymization", ACM Symposium on Information, Computer and Communications Security (AsiaCCS), April 13-16, 2010, Beijing, China (Acceptance ratio: 25/166=0.15). [pdf]
Hui Wang, Ruilin Liu, "Privacy-Preserving Publishing Data with Full Functional Dependencies", International Conference on Database Systems for Advanced Applications (DASFAA), April 1-4, 2010, Tsukuba, Japan (Acceptance ratio: 55/237=0.23). [pdf]
Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, Hui Wang, "Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases" (position paper), the workshop on Security and Privacy in Cloud Computing (SPCC2010), in conjunction with the international conference on Computers, Privacy and Data Protection, January, 2010, Brussels, Belgium. [pdf]
Hui Wang, Ruilin Liu, Xiuyuan Zheng, Yingying Chen, Hongbo Liu, "To Do or Not to Do: Metadata-guided Query Evaluation in Content Caching Networks", IEEE Globecom, Nov. 30 - Dec. 4, 2009, Hawaii, USA. [pdf]
Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, "Answering XML Queries Using Materialized Views Revisited", Full paper (acceptance ratio: 123/847 = 14.5%), The 18th ACM Conference on Information and Knowledge Management (CIKM), November 2-6, 2009, Hong Kong, China. [pdf]
Yingying Chen, Hui Wang, Xiuyuan Zheng, Jie Yang, "Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks", in Proceedings of IEEE MILCOM, Oct 18 - 21, 2009, Boston, USA. [pdf]
Ruilin Liu, Hui Wang. "Integrity Verification of Outsourced XML Databases". IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)(Acceptance ratio: 15%). August 29-31, 2009, Vancouver, Canada. [pdf]
Brian Thompson, Chih-Cheng Chang, Hui Wang, Danfeng Yao. "Privacy-aware publishing of Netflix data". IEEE Security & Privacy Symposium, Oakland, May 17-20, 2009. Extended Abstract. [pdf]
Hui Wang, Ruilin Liu, "Hiding Distinguished Ones into Crowd: Privacy-Preserving Publishing Data with Outliers", the 12th International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 23-26, 2009 (Average acceptance ratio: 16%). [pdf]
Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Hui Wang, "Anonymizing Moving Objects: How to Hide a MOB in a Crowd?", the 12th International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 23-26, 2009 (Average acceptance ratio: 16%). [pdf]
Hui Wang, "Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss", the 14th International Conference on Management of Data (COMAD), Mumbai, India, Dec 17 - 19, 2008 (acceptance ratio: 38%). [pdf]
Hui Wang, Laks V.S. Lakshmanan, "Probabilistic Privacy Analysis of Published Views", Workshop on Privacy in the Electronic Society (WPES), CCS, Alexandria, VA USA, Oct. 2006. [pdf]
Hui Wang, Laks V.S Lakshmanan, Efficient Secure Query Evaluation over Encrypted XML Database. VLDB'06. [pdf] .
Laks V.S Lakshmanan, Hui Wang, Jessica Zheng Zhao, "Answering Tree Pattern Queries Using Views". VLDB'06. [pdf]
Laks V.S Lakshmanan, Ganesh Ramesh, Hui Wang, Jessica Zheng Zhao, "Testing Satisfiability of Tree Pattern Queries". VLDB'04. [pdf] .
Journal
Jie Xu, Yunyu Xiao, Wendy Hui Wang, Yue Ning, Elizabeth A Shenkman, Jiang Bian, Fei Wang, Algorithmic Fairness in Computational Medicine, eBioMedicine, Accepted, August 2022.
Boxiang Dong, Zhengzhang Chen, Wendy Hui Wang, Lu-An Tang, Kai Zhang, Ying Lin, Zhichun Li, Haifeng Chen, Anomalous Event Sequence Detection. IEEE Intelligent Systems. In Press. 2020.
Bo Zhang, Boxiang Dong, Hui Wang. Integrity Authentication for SQL Query Evaluation on Outsourced Databases: A Survey. Transactions on Knowledge and Data Engineering (TKDE). In press, 2019.
Bo Zhang, Boxiang Dong, Hui Wang. CorrectMR: Verification of Distributed SQL Execution on MapReduce. Transactions on Knowledge and Data Engineering (TKDE). In press, 2019.
Boxiang Dong, Hui Wang. Secure Partial Encryption with Adversarial Functional Dependency Constraints in the Database-as-a-Service Model. Journal of Data & Knowledge Engineering, in press, 2018.
Boxiang Dong, Hui (Wendy) Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo. Authenticated Outlier Mining for Outsourced Databases. Transactions on Dependable and Secure Computing, 2017.
Ruilin Liu, Hui Wang. Hiding Outliers into Crowd: Privacy-preserving Data publishing with Outliers. Elsevier Data & Knowledge Engineering (DKE) 100: 94 - 115. 2015
Boxiang Dong, Ruilin Liu, Hui Wang. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining. IEEE Transaction of Service Computing 9(1): 18 - 32 (2016)
Hongbo Liu, Hui Wang, Yingying Chen, Dayong Jia. Defending against Frequency-based Attacks on Distributed Data Storage in Wireless Networks. Transactions on Sensor Networks [pdf]. In press.
Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, Timos Sellis. Optimizing XML Queries: Bitmapped Materialized Views vs. Indexes [pdf], Information System 38(6): 863-884 (2013).
Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu, Neighborhood Prediction Based Decentralized Key Management for Mobile Wireless Networks [pdf], Wireless Networks 19(6): 1387-1406 (2013).
Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, Hui (Wendy) Wang, Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases in Clouds [pdf], IEEE Systems Journal 7(3): 385-395 (2013).
Juan Li, Hui Wang, Samee Ullah Khan, Qingrui Li, Albert Y. Zomaya, "A Fully Distributed Scheme for Disceroy of Semantic Relationships", Transactions on Services Computing (Impact factor: 3.7 (2011)), in press.
Juan Li, Hui Wang, Samee U. Khan, "A Semantics-Based Approach to Large-Scale Mobile Social Networking", in Journal of Mobile Networks and Applications (Impact factor: 1.013 (2009)), Volume 17, Issue (2) (2012), Page 192-205.
Francesco Bonchi, Laks V.S. Lakshmanan, Hui Wendy Wang, Trajectory Anonymity in Publishing Personal Mobility Data [pdf], SIGKDD Exploration, Volume 13, Issue 1, 2011.
Hui Wang, Ruilin Liu, "Privacy-Preserving Publishing Microdata with Full Functional Dependencies", in Journal of Data & Knowledge Engineering (DKE) (Impact Factor: 1.745 5-Year Impact Factor: 2.036). [pdf], Volume 70, Issue 3, March, 2011
Yingying Chen, Hui Wang, Xiuyuan Zheng, and Jie Yang, "A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks", in EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 319275, June 2010.
Hui Wang, "Privacy-preserving data publishing in cloud computing", Vol.25, No. 3, May 2010, Journal of Computer Science and Technology. [pdf]
Nicolas Bruno, Hui Wang, "The Threshold Algorithm: from Middleware Systems to the Relational Engine", IEEE Transaction on Knowledge and Data Engineering (TKDE), Volume 19, No. 4, April 2007. [pdf]