Raymond Chi-Wing Wong - Publications

Affiliations: 
Computer Science and Engineering The Hong Kong University of Science & Technology 

11 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Lin W, Wang K, Zhang Z, Fu AW, Wong RC, Long C, Miao C. Towards Secure and Efficient Equality Conjunction Search over Outsourced Databases Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2020.2975175  0.317
2019 Dai H, Wong RC, Wang H, Zheng Z, Vasilakos AV. Big Data Analytics for Large-scale Wireless Networks: Challenges and Opportunities Acm Computing Surveys. 52: 99. DOI: 10.1145/3337065  0.595
2017 Dai H, Wong RC, Wang H. On Capacity and Delay of Multichannel Wireless Networks With Infrastructure Support Ieee Transactions On Vehicular Technology. 66: 1589-1604. DOI: 10.1109/Tvt.2016.2553783  0.581
2015 Chen Z, Liu Y, Wong RC, Xiong J, Mai G, Long C. Optimal Location Queries in Road Networks Acm Transactions On Database Systems. 40: 17. DOI: 10.1145/2818179  0.343
2014 Fu AW, Wang K, Wong RC, Wang J, Jiang M. Small sum privacy and large sum utility in data publishing. Journal of Biomedical Informatics. 50: 20-31. PMID 24727488 DOI: 10.1016/J.Jbi.2014.04.002  0.335
2014 Long C, Wong RC. Viral marketing for dedicated customers Information Systems. 46: 1-23. DOI: 10.1016/J.Is.2014.05.003  0.311
2013 Dai H, Wang Q, Li D, Wong RC. On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas International Journal of Distributed Sensor Networks. 9: 760834. DOI: 10.1155/2013/760834  0.562
2012 Liu Y, Chen X, Li Z, Li Z, Wong RC. An efficient method for privacy preserving location queries Frontiers of Computer Science in China. 6: 409-420. DOI: 10.1007/S11704-012-2838-8  0.3
2009 Wong RC, Fu AW, Wang K, Pei J. Anonymization-based attacks in privacy-preserving data publishing Acm Transactions On Database Systems. 34: 8-46. DOI: 10.1145/1538909.1538910  0.324
2006 Wong RC, Fu AW. Mining top-K frequent itemsets from data streams Data Mining and Knowledge Discovery. 13: 193-217. DOI: 10.1007/S10618-006-0042-X  0.301
2005 Ngan S, Lam T, Wong RC, Fu AW. Mining N-most interesting itemsets without support threshold by the COFI-tree International Journal of Business Intelligence and Data Mining. 1: 88-106. DOI: 10.1504/Ijbidm.2005.007320  0.309
Show low-probability matches.