default search action
Yabo Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c24]Kaixin Lan, Tao Fang, Derek F. Wong, Yabo Xu, Lidia S. Chao, Cecilia G. Zhao:
FOCUS: Forging Originality through Contrastive Use in Self-Plagiarism for Language Models. ACL (Findings) 2024: 14432-14447 - [i4]Kaixin Lan, Tao Fang, Derek F. Wong, Yabo Xu, Lidia S. Chao, Cecilia G. Zhao:
FOCUS: Forging Originality through Contrastive Use in Self-Plagiarism for Language Models. CoRR abs/2406.00839 (2024) - 2023
- [j7]Jun Wang, Yu Yang, Qi Liu, Zheng Fang, Shujuan Sun, Yabo Xu:
An Empirical Study of User Engagement in Influencer Marketing on Weibo and WeChat. IEEE Trans. Comput. Soc. Syst. 10(6): 3228-3240 (2023) - 2020
- [j6]Yanzhu Hu, Dongdong Zhu, Xinbo Ai, Yabo Xu:
Category-wise feature extractor based on ADL method for weak-supervised object localisation. IET Image Process. 14(15): 3965-3974 (2020)
2010 – 2019
- 2019
- [j5]Junqiang Liu, Zhongmin Chang, Carson Kai-Sang Leung, Raymond C. W. Wong, Yabo Xu, Rong Zhao:
Efficient mining of extraordinary patterns by pruning and predicting. Expert Syst. Appl. 125: 55-68 (2019) - 2017
- [j4]Jinshuo Liu, Zhuangyi Jiang, Yabo Xu, Juan Deng, Lanxin Zhang:
PMVS算法的CPU多线程和GPU两级粒度并行策略 (Multithread and GPU Parallel Schema on Patch-based Multi-view Stereo Algorithm). 计算机科学 44(2): 296-301 (2017) - 2016
- [c23]Jinshuo Liu, Yabo Xu, Juan Deng, Lina Wang, Lanxin Zhang:
Ld-CNNs: A Deep Learning System for Structured Text Categorization Based on LDA in Content Security. NSS 2016: 113-125 - 2015
- [j3]Jin Huang, Jianzhong Qi, Yabo Xu, Jian Chen:
A privacy-enhancing model for location-based personalized recommendations. Distributed Parallel Databases 33(2): 253-276 (2015) - 2013
- [c22]Lingkun Wu, Wenqing Lin, Xiaokui Xiao, Yabo Xu:
LSII: An indexing structure for exact real-time search on microblogs. ICDE 2013: 482-493 - [c21]Yueguo Chen, Lexi Gao, Xuan Ming, Weining Qian, Yabo Xu:
Overview of the WISE 2013 Challenge. WISE (1) 2013: 488-490 - 2011
- [c20]Songjian Chen, Yabo Xu, Huiyou Chang:
A Simple and Effective Unsupervised Word Segmentation Approach. AAAI 2011: 866-871 - 2010
- [c19]Mingming Zhou, Yabo Xu:
Injecting Pedagogical Constraints into Sequential Learning Pattern Mining. ICALT 2010: 380-381 - [c18]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu:
Global privacy guarantee in serial data publishing. ICDE 2010: 956-959 - [c17]Ke Wang, Yabo Xu, Raymond Chi-Wing Wong, Ada Wai-Chee Fu:
Anonymizing Temporal Data. ICDM 2010: 1109-1114 - [c16]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Probabilistic Inference Protection on Anonymized Data. ICDM 2010: 1127-1132 - [c15]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
Publishing Skewed Sensitive Microdata. SDM 2010: 84-93 - [p2]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates over Private Tables. Strategic Advancements in Utilizing Data Mining and Warehousing Technologies 2010: 256-276
2000 – 2009
- 2009
- [c14]Yabo Xu, Ke Wang, Guoliang Yang, Ada Wai-Chee Fu:
Online anonymity for personalized web services. CIKM 2009: 1497-1500 - [c13]Ke Wang, Yabo Xu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong:
FF-Anonymity: When Quasi-identifiers Are Missing. ICDE 2009: 1136-1139 - [i3]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jia Liu, Ke Wang, Yabo Xu:
Preserving Individual Privacy in Serial Data Publishing. CoRR abs/0903.0682 (2009) - [i2]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Philip S. Yu:
Can the Utility of Anonymized Data be used for Privacy Breaches? CoRR abs/0905.1755 (2009) - [i1]Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Ke Wang, Yabo Xu, Jian Pei, Philip S. Yu:
Anonymization with Worst-Case Distribution-Based Background Knowledge. CoRR abs/0909.1127 (2009) - 2008
- [j2]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates Over Private Tables. Int. J. Data Warehous. Min. 4(4): 22-41 (2008) - [c12]Yabo Xu, Benjamin C. M. Fung, Ke Wang, Ada Wai-Chee Fu, Jian Pei:
Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 - [c11]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Philip S. Yu:
Anonymizing transaction databases for publication. KDD 2008: 767-775 - [p1]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei:
Privacy-Preserving Data Stream Classification. Privacy-Preserving Data Mining 2008: 487-510 - 2007
- [c10]Rong She, Ke Wang, Ada Wai-Chee Fu, Yabo Xu:
Computing Join Aggregates over Private Tables. DaWaK 2007: 78-88 - [c9]Yabo Xu, Ke Wang, Benyu Zhang, Zheng Chen:
Privacy-enhancing personalized web search. WWW 2007: 591-600 - 2006
- [c8]Ke Wang, Yabo Xu, Rong She, Philip S. Yu:
Classification Spanning Private Databases. AAAI 2006: 293-298 - [c7]Yabo Xu, Ke Wang, Ada Wai-Chee Fu, Rong She, Jian Pei:
Classification spanning correlated data streams. CIKM 2006: 132-141 - 2005
- [c6]Rong She, Ke Wang, Yabo Xu, Philip S. Yu:
Pushing Feature Selection Ahead Of Join. SDM 2005: 536-540 - [c5]Ke Wang, Yabo Xu, Philip S. Yu, Rong She:
Building Decision Trees on Records Linked through Key References. SDM 2005: 576-580 - 2004
- [j1]Guimei Liu, Hongjun Lu, Wenwu Lou, Yabo Xu, Jeffrey Xu Yu:
Efficient Mining of Frequent Patterns Using Ascending Frequency Ordered Prefix-Tree. Data Min. Knowl. Discov. 9(3): 249-274 (2004) - [c4]Ke Wang, Yabo Xu, Jeffrey Xu Yu:
Scalable sequential pattern mining for biological sequences. CIKM 2004: 178-187 - [c3]Zhiheng Li, Jeffrey Xu Yu, Hongjun Lu, Yabo Xu, Guimei Liu:
Data Mining Proxy: Serving Large Number of Users for Efficient Frequent Itemset Mining. PAKDD 2004: 458-463 - 2003
- [c2]Guimei Liu, Hongjun Lu, Yabo Xu, Jeffrey Xu Yu:
Ascending Frequency Ordered Prefix-tree: Efficient Mining of Frequent Patterns. DASFAA 2003: 65-72 - 2002
- [c1]Yabo Xu, Jeffrey Xu Yu, Guimei Liu, Hongjun Lu:
From Path Tree To Frequent Patterns: A Framework for Mining Frequent Patterns. ICDM 2002: 514-521
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint