False positive or false negative: mining frequent itemsets from high speed transactional data streams JX Yu, Z Chong, H Lu, A Zhou VLDB 2014: Proceedings of the Thirtieth international conference on Very …, 2004 | 237 | 2004 |
A false negative approach to mining frequent itemsets from high speed transactional data streams JX Yu, Z Chong, H Lu, Z Zhang, A Zhou Information Sciences 176 (14), 1986-2015, 2006 | 106 | 2006 |
HilAnchor: Location Privacy Protection in the Presence of Users’ Preferences WW Ni, JW Zheng, ZH Chong JCST/J. Comput. Sci. & Technol 27 (2), 2012 | 28 | 2012 |
Clustering-oriented privacy-preserving data publishing W Ni, Z Chong Knowledge-Based Systems 35, 264-270, 2012 | 21 | 2012 |
C-Cube: Elastic Continuous Clustering in the Cloud Z Zhang, H Shu, Z Chong, H Lu, Y Yang IEEE ICDE 2013: IEEE 29th International Conference on Data Engineering, 2013 | 17 | 2013 |
False-negative frequent items mining from data streams with bursting Z Chong, J Yu, H Lu, Z Zhang, A Zhou Database Systems for Advanced Applications, 422-434, 2005 | 8 | 2005 |
A logarithmic spiral based data perturbation method for clustering MF Huang, WW Ni, JJ Wang, FL Sun, ZH Chong Jisuanji Xuebao(Chinese Journal of Computers) 35 (11), 2275-2282, 2012 | 6 | 2012 |
Privacy-Preserving data publication for clustering WW Ni, G Chen, ZH Chong, YJ Wu Journal of Computer Research and Development 49 (5), 1095-1104, 2012 | 6 | 2012 |
Task-oriented attributed network embedding by multi-view features D Lai, S Wang, Z Chong, W Wu, C Nardini Knowledge-Based Systems 232, 107448, 2021 | 5 | 2021 |
RDF pattern matching using sortable views Z Chong, H Chen, Z Zhang, H Shu, G Qi, A Zhou ACM CIKM 2012: The 21st ACM International Conference on Information and …, 2012 | 5 | 2012 |
A privacy-preserving data perturbation algorithm based on neighborhood entropy N Wei-Wei, X Li-Zhen, C Zhi-Hong, W Ying-Jie, L Teng-Teng, S Zhi-Hui Journal of Computer Research and Development 46 (3), 498-504, 2009 | 4 | 2009 |
Approximate k-median of location streams with redundancy and inconsistency Z Chong, W Ni, L Xu, Z Xu, H Shu, J Zheng International Journal of Software and Informatics 4 (2), 165-182, 2010 | 3 | 2010 |
Efficient computation of k-medians over data streams under memory constraints ZH Chong, JX Yu, ZJ Zhang, XM Lin, W Wang, AY Zhou JCST/ Journal of Computer Science and Technology 21 (2), 284-296, 2006 | 3 | 2006 |
Visual Topic Semantic Enhanced Machine Translation for Multi-Modal Data Efficiency C Wang, SJ Cai, BX Shi, ZH Chong Journal of Computer Science and Technology 38 (6), 1223-1236, 2023 | 2 | 2023 |
Attention based subgraph classification for link prediction by network re-weighting D Lai, Z Liu, J Huang, Z Chong, W Wu, C Nardini Proceedings of the 30th ACM International Conference on Information …, 2021 | 2 | 2021 |
Load-balanced cluster for scale-out storage of knowledge Z Xiong, G Zhu, W Yu, S Wang, Z Chong 2018 Sixth International Conference on Advanced Cloud and Big Data (CBD), 1-5, 2018 | 2 | 2018 |
Evaluation of RDF Queries via Equivalence W Ni, Z Chong, H Shu, J Bao, A Zhou Frontiers of Computer Science, 2012 | 2 | 2012 |
Dynamic Network Embedding by Time-Relaxed Temporal Random Walk Y Song, D Lai, Z Chong, Z Pan Neural Information Processing: 28th International Conference, ICONIP 2021 …, 2021 | 1 | 2021 |
Location Privacy Protection in the Presence of Users’ Preferences W Ni, J Zheng, Z Chong, S Lu, L Hu Web-Age Information Management, 340-352, 2011 | 1 | 2011 |
Open user schema guided evaluation of streaming RDF queries Z Chong, G Qi, H Shu, J Bao, W Ni, A Zhou ACM CIKM'10, 2010, 1281-1284, 2010 | 1 | 2010 |