default search action
HweeHwa Pang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j41]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, HweeHwa Pang, Robert H. Deng:
AnoPas: Practical anonymous transit pass from group signatures with time-bound keys. J. Syst. Archit. 153: 103184 (2024) - [j40]Rui Shi, Yang Yang, Yingjiu Li, Huamin Feng, Guozhen Shi, HweeHwa Pang, Robert H. Deng:
Double Issuer-Hiding Attribute-Based Credentials From Tag-Based Aggregatable Mercurial Signatures. IEEE Trans. Dependable Secur. Comput. 21(4): 2585-2602 (2024) - [j39]Yang Yang, Wenyi Xue, Jianfei Sun, Guomin Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
PkT-SIN: A Secure Communication Protocol for Space Information Networks With Periodic k-Time Anonymous Authentication. IEEE Trans. Inf. Forensics Secur. 19: 6097-6112 (2024) - [c45]Yang Yang, Robert H. Deng, Guomin Yang, Yingjiu Li, HweeHwa Pang, Minming Huang, Rui Shi, Jian Weng:
PriSrv: Privacy-Enhanced and Highly Usable Service Discovery in Wireless Communications. NDSS 2024 - [c44]Xiaoguo Li, Guomin Yang, Tao Xiang, Shengmin Xu, Bowen Zhao, HweeHwa Pang, Robert H. Deng:
Make Revocation Cheaper: Hardware-Based Revocable Attribute-Based Encryption. SP 2024: 3109-3127 - 2023
- [j38]Wenyi Xue, Yang Yang, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
ACB-Vote: Efficient, Flexible, and Privacy- Preserving Blockchain-Based Score Voting With Anonymously Convertible Ballots. IEEE Trans. Inf. Forensics Secur. 18: 3720-3734 (2023) - [j37]Bowen Zhao, Yingjiu Li, Ximeng Liu, Xiaoguo Li, HweeHwa Pang, Robert H. Deng:
Identifiable, But Not Visible: A Privacy-Preserving Person Reidentification Scheme. IEEE Trans. Reliab. 72(4): 1295-1307 (2023) - [j36]Rui Shi, Huamin Feng, Yang Yang, Feng Yuan, Yingjiu Li, HweeHwa Pang, Robert H. Deng:
Threshold Attribute-Based Credentials With Redactable Signature. IEEE Trans. Serv. Comput. 16(5): 3751-3765 (2023) - 2022
- [j35]Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, HweeHwa Pang, Robert H. Deng:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. IEEE Trans. Inf. Forensics Secur. 17: 3637-3648 (2022) - [c43]Bowen Zhao, Yingjiu Li, Ximeng Liu, HweeHwa Pang, Robert H. Deng:
FREED: An Efficient Privacy-Preserving Solution for Person Re-IDentification. DSC 2022: 1-8 - 2021
- [j34]Yang Yang, Zhangshuang Guan, Zhiguo Wan, Jian Weng, HweeHwa Pang, Robert H. Deng:
PriScore: Blockchain-Based Self-Tallying Election System Supporting Score Voting. IEEE Trans. Inf. Forensics Secur. 16: 4705-4720 (2021) - [c42]Shengmin Xu, Jianting Ning, Jinhua Ma, Xinyi Huang, HweeHwa Pang, Robert H. Deng:
Expressive Bilateral Access Control for Internet-of-Things in Cloud-Fog Computing. SACMAT 2021: 143-154 - 2020
- [j33]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin, Kefeng Fan:
Secure server-aided data sharing clique with attestation. Inf. Sci. 522: 80-98 (2020) - [j32]Ximeng Liu, Robert H. Deng, Kim-Kwang Raymond Choo, Yang Yang, HweeHwa Pang:
Privacy-Preserving Outsourced Calculation Toolkit in the Cloud. IEEE Trans. Dependable Secur. Comput. 17(5): 898-911 (2020)
2010 – 2019
- 2019
- [j31]Yujue Wang, HweeHwa Pang, Robert H. Deng, Yong Ding, Qianhong Wu, Bo Qin:
Securing messaging services through efficient signcryption with designated equality test. Inf. Sci. 490: 146-165 (2019) - 2018
- [j30]Yujue Wang, HweeHwa Pang, Robert H. Deng:
Verifiably encrypted cascade-instantiable blank signatures to secure progressive decision management. Int. J. Inf. Sec. 17(3): 347-363 (2018) - 2017
- [j29]Yujue Wang, HweeHwa Pang:
Probabilistic Public Key Encryption for Controlled Equijoin in Relational Databases. Comput. J. 60(4): 600-612 (2017) - [j28]Yujue Wang, HweeHwa Pang, Ngoc Hieu Tran, Robert H. Deng:
CCA Secure encryption supporting authorized equality test on ciphertexts in standard model and its applications. Inf. Sci. 414: 289-305 (2017) - [j27]Yujue Wang, HweeHwa Pang, Yanjiang Yang, Xuhua Ding:
Secure server-aided top-k monitoring. Inf. Sci. 420: 345-363 (2017) - 2016
- [c41]Ngoc Hieu Tran, HweeHwa Pang, Robert H. Deng:
Efficient Verifiable Computation of Linear and Quadratic Functions over Encrypted Data. AsiaCCS 2016: 605-616 - [c40]Ngoc Hieu Tran, Robert H. Deng, HweeHwa Pang:
Privacy-Preserving and Verifiable Data Aggregation. SG-CRC 2016: 115-122 - 2015
- [j26]Hanbo Dai, Feida Zhu, Ee-Peng Lim, HweeHwa Pang:
Detecting anomaly collections using extreme feature ranks. Data Min. Knowl. Discov. 29(3): 689-731 (2015) - [j25]Kyriakos Mouratidis, Jilian Zhang, HweeHwa Pang:
Maximum Rank Query. Proc. VLDB Endow. 8(12): 1554-1565 (2015) - 2014
- [j24]Jilian Zhang, Kyriakos Mouratidis, HweeHwa Pang:
Direct neighbor search. Inf. Syst. 44: 73-92 (2014) - [j23]HweeHwa Pang, Xuhua Ding:
Privacy-Preserving Ad-Hoc Equi-Join on Outsourced Data. ACM Trans. Database Syst. 39(3): 23:1-23:40 (2014) - [c39]Sadegh Nobari, Panagiotis Karras, HweeHwa Pang, Stéphane Bressan:
L-opacity: Linkage-Aware Graph Anonymization. EDBT 2014: 583-594 - [c38]Junzuo Lai, Robert H. Deng, HweeHwa Pang, Jian Weng:
Verifiable Computation on Outsourced Encrypted Data. ESORICS (1) 2014: 273-291 - [c37]Jilian Zhang, Kyriakos Mouratidis, HweeHwa Pang:
Global immutable region computation. SIGMOD Conference 2014: 1151-1162 - 2013
- [j22]HweeHwa Pang, Jilian Zhang, Kyriakos Mouratidis:
Enhancing Access Privacy of Range Retrievals over (𝔹+)-Trees. IEEE Trans. Knowl. Data Eng. 25(7): 1533-1547 (2013) - [c36]Xuhua Ding, HweeHwa Pang, Junzuo Lai:
Verifiable and private top-k monitoring. AsiaCCS 2013: 553-558 - 2012
- [b1]HweeHwa Pang, Kian-Lee Tan:
Query Answer Authentication. Synthesis Lectures on Data Management, Morgan & Claypool Publishers 2012, ISBN 978-3-031-00759-0 - [j21]Kyriakos Mouratidis, HweeHwa Pang:
Computing Immutable Regions for Subspace Top-k Queries. Proc. VLDB Endow. 6(2): 73-84 (2012) - [c35]Hanbo Dai, Feida Zhu, Ee-Peng Lim, HweeHwa Pang:
Mining coherent anomaly collections on web data. CIKM 2012: 1557-1561 - [c34]HweeHwa Pang, Xiaokui Xiao, Jialie Shen:
Obfuscating the Topical Intention in Enterprise Text Search. ICDE 2012: 1168-1179 - [c33]Hanbo Dai, Feida Zhu, Ee-Peng Lim, HweeHwa Pang:
Detecting Anomalies in Bipartite Graphs with Mutual Dependency Principles. ICDM 2012: 171-180 - [c32]Hanbo Dai, Feida Zhu, Ee-Peng Lim, HweeHwa Pang:
Detecting Extreme Rank Anomalous Collections. SDM 2012: 883-894 - [c31]Jialie Shen, HweeHwa Pang, Meng Wang, Shuicheng Yan:
Modeling concept dynamics for large scale music search. SIGIR 2012: 455-464 - 2011
- [j20]Kyriakos Mouratidis, HweeHwa Pang:
Efficient Evaluation of Continuous Text Search Queries. IEEE Trans. Knowl. Data Eng. 23(10): 1469-1482 (2011) - [c30]Jilian Zhang, Kyriakos Mouratidis, HweeHwa Pang:
Heuristic Algorithms for Balanced Multi-Way Number Partitioning. IJCAI 2011: 693-698 - [c29]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Learning Feature Dependencies for Noise Correction in Biomedical Prediction. SDM 2011: 71-82 - 2010
- [j19]HweeHwa Pang, Xuhua Ding, Xiaokui Xiao:
Embellishing Text Search Queries To Protect User Privacy. Proc. VLDB Endow. 3(1): 598-607 (2010) - [j18]Hady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang, Teck-Tim Tan:
STEvent: Spatio-temporal event model for social network discovery. ACM Trans. Inf. Syst. 28(3): 15:1-15:32 (2010) - [j17]HweeHwa Pang, Jialie Shen, Ramayya Krishnan:
Privacy-preserving similarity-based text retrieval. ACM Trans. Internet Techn. 10(1): 4:1-4:39 (2010) - [j16]HweeHwa Pang, Xuhua Ding, Baihua Zheng:
Efficient processing of exact top-k queries over disk-resident sorted lists. VLDB J. 19(3): 437-456 (2010) - [c28]Jin Han, Meng Pan, Debin Gao, HweeHwa Pang:
A multi-user steganographic file system on untrusted shared storage. ACSAC 2010: 317-326 - [c27]Jialie Shen, HweeHwa Pang, Dacheng Tao, Xuelong Li:
Dual Phase Learning for Large Scale Video Gait Recognition. MMM 2010: 500-510 - [c26]Jialie Shen, Wang Meng, Shuicheng Yan, HweeHwa Pang, Xian-Sheng Hua:
Effective music tagging through advanced statistical modeling. SIGIR 2010: 635-642
2000 – 2009
- 2009
- [j15]HweeHwa Pang, Jilian Zhang, Kyriakos Mouratidis:
Scalable Verification for Outsourced Dynamic Databases. Proc. VLDB Endow. 2(1): 802-813 (2009) - [j14]Kyriakos Mouratidis, Dimitris Sacharidis, HweeHwa Pang:
Partially materialized digest scheme: an efficient verification method for outsourced databases. VLDB J. 18(1): 363-381 (2009) - [c25]Jundi Ding, Jialie Shen, HweeHwa Pang, Songcan Chen, Jing-Yu Yang:
Exploiting Intensity Inhomogeneity to Extract Textured Objects from Natural Scenes. ACCV (3) 2009: 1-10 - [c24]Kyriakos Mouratidis, HweeHwa Pang:
An Incremental Threshold Method for Continuous Text Search Queries. ICDE 2009: 1187-1190 - 2008
- [j13]Yongdong Wu, HweeHwa Pang:
A Lightweight Buyer-Seller Watermarking Protocol. Adv. Multim. 2008: 905065:1-905065:7 (2008) - [j12]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Explaining inferences in Bayesian networks. Appl. Intell. 29(3): 263-278 (2008) - [j11]HweeHwa Pang, Kyriakos Mouratidis:
Authenticating the query results of text search engines. Proc. VLDB Endow. 1(1): 126-137 (2008) - [j10]HweeHwa Pang, Kian-Lee Tan:
Verifying Completeness of Relational Query Answers from Online Servers. ACM Trans. Inf. Syst. Secur. 11(2): 5:1-5:50 (2008) - [c23]Hanbo Dai, Ee-Peng Lim, Hady Wirawan Lauw, HweeHwa Pang:
Visual Analytics for Supporting Entity Relationship Discovery on Text Data. ISI Workshops 2008: 183-194 - 2007
- [j9]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Discovering and Exploiting Causal Dependencies for Robust Mobile Context-Aware Recommenders. IEEE Trans. Knowl. Data Eng. 19(7): 977-992 (2007) - [c22]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Learning Causal Models for Noisy Biological Data Mining: An Application to Ovarian Cancer Detection. AAAI 2007: 354-359 - [c21]Hady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang:
TUBE (Text-cUBE) for discovering documentary evidence of associations among entities. SAC 2007: 824-828 - 2006
- [j8]Shen-Tat Goh, HweeHwa Pang, Robert H. Deng, Feng Bao:
Three architectures for trusted data dissemination in edge computing. Data Knowl. Eng. 58(3): 381-409 (2006) - [j7]Xi Ma, HweeHwa Pang, Kian-Lee Tan:
Masking page reference patterns in encryption databases on untrusted storage. Data Knowl. Eng. 58(3): 466-483 (2006) - [c20]Weiwei Cheng, HweeHwa Pang, Kian-Lee Tan:
Authenticating Multi-dimensional Query Results in Data Publishing. DBSec 2006: 60-73 - [c19]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Discovering Causal Dependencies in Mobile Context-Aware Recommenders. MDM 2006: 4 - 2005
- [j6]Hady Wirawan Lauw, Ee-Peng Lim, HweeHwa Pang, Teck-Tim Tan:
Social Network Discovery by Mining Spatio-Temporal Events. Comput. Math. Organ. Theory 11(2): 97-118 (2005) - [c18]Xia Cao, Beng Chin Ooi, HweeHwa Pang, Kian-Lee Tan, Anthony K. H. Tung:
DSIM: A Distance-Based Indexing Method for Genomic Sequences. BIBE 2005: 97-104 - [c17]HweeHwa Pang, Yongdong Wu:
Evaluation of MPEG-4 IPMP extension. ICASSP (2) 2005: 1161-1164 - [c16]Di Ma, Robert H. Deng, HweeHwa Pang, Jianying Zhou:
Authenticating Query Results in Data Publishing. ICICS 2005: 376-388 - [c15]Ghim-Eng Yap, Ah-Hwee Tan, HweeHwa Pang:
Dynamically-optimized context in recommender systems. Mobile Data Management 2005: 265-272 - [c14]HweeHwa Pang, Arpit Jain, Krithi Ramamritham, Kian-Lee Tan:
Verifying Completeness of Relational Query Results in Data Publishing. SIGMOD Conference 2005: 407-418 - [c13]Xuan Zhou, HweeHwa Pang, Kian-Lee Tan, Dhruv Mangla:
WmXML: A System for Watermarking XML Data. VLDB 2005: 1318-1321 - [e2]Robert H. Deng, Feng Bao, HweeHwa Pang, Jianying Zhou:
Information Security Practice and Experience, First International Conference, ISPEC 2005, Singapore, April 11-14, 2005, Proceedings. Lecture Notes in Computer Science 3439, Springer 2005, ISBN 3-540-25584-2 [contents] - [e1]Jianying Zhou, Meng-Chow Kang, Feng Bao, HweeHwa Pang:
Applied Public Key Infrastructure - 4th International Workshop: IWAP 2005, Singapore, September 21-23, 2005. Frontiers in Artificial Intelligence and Applications 128, IOS Press 2005, ISBN 978-1-58603-550-1 [contents] - 2004
- [j5]HweeHwa Pang, Kian-Lee Tan, Xuan Zhou:
Steganographic Schemes for File System and B-Tree. IEEE Trans. Knowl. Data Eng. 16(6): 701-713 (2004) - [c12]HweeHwa Pang, Kian-Lee Tan:
Authenticating Query Results in Edge Computing. ICDE 2004: 560-571 - [c11]Xuan Zhou, HweeHwa Pang, Kian-Lee Tan:
Hiding Data Accesses in Steganographic File System. ICDE 2004: 572-583 - [c10]Xi Ma, HweeHwa Pang, Kian-Lee Tan:
Finding Constrained Frequent Episodes Using Minimal Occurrences. ICDM 2004: 471-474 - 2003
- [c9]HweeHwa Pang, Kian-Lee Tan, Xuan Zhou:
StegFS: A Steganographic File System. ICDE 2003: 657-667 - 2002
- [c8]Beng Chin Ooi, HweeHwa Pang, Hao Wang, Limsoon Wong, Cui Yu:
Fast Filter-and-Refine Algorithms for Subsequence Selection. IDEAS 2002: 243-255 - 2000
- [j4]Y. C. Tay, HweeHwa Pang:
Load Sharing in Distributed Multimedia-on-Demand Systems. IEEE Trans. Knowl. Data Eng. 12(3): 410-428 (2000)
1990 – 1999
- 1999
- [j3]HweeHwa Pang, Bobby Jose, Mayuram S. Krishnan:
Resource Scheduling In A High-Performance Multimedia Server. IEEE Trans. Knowl. Data Eng. 11(2): 303-320 (1999) - 1997
- [j2]HweeHwa Pang:
Tertiary Storage in Multimedia Systems: Staging of Direct Access? Multim. Syst. 5(6): 386-399 (1997) - 1995
- [j1]HweeHwa Pang, Michael J. Carey, Miron Livny:
Multiclass Query Scheduling in Real-Time Database Systems. IEEE Trans. Knowl. Data Eng. 7(4): 533-551 (1995) - 1994
- [c7]HweeHwa Pang, Michael J. Carey, Miron Livny:
Managing Memory for Real-Time Queries. SIGMOD Conference 1994: 221-232 - 1993
- [c6]HweeHwa Pang, Michael J. Carey, Miron Livny:
Partially Preemptive Hash Joins. SIGMOD Conference 1993: 59-68 - [c5]HweeHwa Pang, Michael J. Carey, Miron Livny:
Memory-Adaptive External Sorting. VLDB 1993: 618-629 - 1992
- [c4]HweeHwa Pang, Miron Livny, Michael J. Carey:
Transaction Scheduling in Multiclass Real-Time Database Systems. RTSS 1992: 23-34 - 1991
- [c3]HweeHwa Pang, Hongjun Lu, Beng Chin Ooi:
Query Processing in OODB. DASFAA 1991: 1-10 - [c2]HweeHwa Pang, Hongjun Lu, Beng Chin Ooi:
An Efficient Semantic Query Optimization Algorithm. ICDE 1991: 326-335 - [c1]Hongjun Lu, Beng Chin Ooi, HweeHwa Pang:
Multilevel Security Control in Multidatabase Management Systems. RIDE-IMS 1991: 359-363
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-26 00:54 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint