


default search action
Benjamin C. M. Fung
Person information
- affiliation: McGill University
- affiliation: Concordia University
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j70]Mohd Saqib
, Samaneh Mahdavifar
, Benjamin C. M. Fung
, Philippe Charland
:
A Comprehensive Analysis of Explainable AI for Malware Hunting. ACM Comput. Surv. 56(12): 314:1-314:40 (2024) - [j69]Adel Abusitta
, Miles Q. Li
, Benjamin C. M. Fung
:
Survey on Explainable AI: Techniques, challenges and open issues. Expert Syst. Appl. 255: 124710 (2024) - [j68]Jwen Fai Low
, Benjamin C. M. Fung
, Pulei Xiong
:
Better entity matching with transformers through ensembles. Knowl. Based Syst. 293: 111678 (2024) - [j67]Arezo Bodaghi
, Ketra A. Schmitt
, Pierre Watine, Benjamin C. M. Fung
:
A Literature Review on Detecting, Verifying, and Mitigating Online Misinformation. IEEE Trans. Comput. Soc. Syst. 11(4): 5119-5145 (2024) - [j66]Da-Wei Jaw
, Shih-Chia Huang
, Zhihui Lu, Benjamin C. M. Fung
, Sy-Yen Kuo
:
Multidomain Object Detection Framework Using Feature Domain Knowledge Distillation. IEEE Trans. Cybern. 54(8): 4643-4651 (2024) - [c64]Li Tao Li
, Steven H. H. Ding
, Andrew Walenstein
, Philippe Charland
, Benjamin C. M. Fung
:
Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection. CIKM 2024: 1215-1225 - [c63]Max Beninger, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung:
ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management. CyCon 2024: 141-160 - [c62]Guillaume Breyton, Mohd Saqib, Benjamin C. M. Fung, Philippe Charland:
BETAC: Bidirectional Encoder Transformer for Assembly Code Function Name Recovery. DRCN 2024: 1-8 - [c61]Mohd Saqib, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
GAGE: Genetic Algorithm-Based Graph Explainer for Malware Analysis. ICDE 2024: 2258-2270 - [c60]Jesia Quader Yuki, Mohammadhossein Amouei, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
AsmDocGen: Generating Functional Natural Language Descriptions for Assembly Code. ICSOFT 2024: 35-45 - [c59]Samaneh Mahdavifar, Mohd Saqib, Benjamin C. M. Fung, Philippe Charland, Andrew Walenstein:
VulEXplaineR: XAI for Vulnerability Detection on Assembly Code. ECML/PKDD (9) 2024: 3-20 - [i13]Jwen Fai Low, Benjamin C. M. Fung, Farkhund Iqbal, Claude Fachkha:
Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media. CoRR abs/2402.01905 (2024) - [i12]Litao Li, Steven H. H. Ding, Andrew Walenstein, Philippe Charland, Benjamin C. M. Fung:
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection. CoRR abs/2404.08562 (2024) - [i11]Miles Q. Li, Benjamin C. M. Fung, Shih-Chia Huang:
On the Effectiveness of Incremental Training of Large Language Models. CoRR abs/2411.18700 (2024) - [i10]Miles Q. Li, Benjamin C. M. Fung, Shih-Chia Huang:
Experience of Training a 1.7B-Parameter LLaMa Model From Scratch. CoRR abs/2412.13335 (2024) - 2023
- [j65]Salwa Razaulla
, Claude Fachkha
, Christine Markarian
, Amjad Gawanmeh
, Wathiq Mansoor, Benjamin C. M. Fung
, Chadi Assi
:
The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions. IEEE Access 11: 40698-40723 (2023) - [j64]Jwen Fai Low, Benjamin C. M. Fung
, Farkhund Iqbal
:
Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets. IEEE Access 11: 87009-87033 (2023) - [j63]Adel Abusitta
, Glaucio H. S. Carvalho, Omar Abdel Wahab, Talal Halabi, Benjamin C. M. Fung, Saja Al-Mamoori:
Deep learning-enabled anomaly detection for IoT systems. Internet Things 21: 100656 (2023) - [j62]Arezo Bodaghi
, Benjamin C. M. Fung
, Ketra A. Schmitt
:
Technological Solutions to Online Toxicity: Potential and Pitfalls. IEEE Technol. Soc. Mag. 42(4): 57-65 (2023) - [j61]Litao Li
, Steven H. H. Ding
, Yuan Tian
, Benjamin C. M. Fung
, Philippe Charland
, Weihan Ou
, Leo Song
, Congwei Chen
:
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution. ACM Trans. Priv. Secur. 26(3): 28:1-28:25 (2023) - [j60]Chin Wang Cheong
, Kejing Yin
, William K. Cheung
, Benjamin C. M. Fung
, Jonathan Poon
:
Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding. ACM Trans. Intell. Syst. Technol. 14(6): 111:1-111:20 (2023) - [j59]Rashid Hussain Khokhar
, Benjamin C. M. Fung
, Farkhund Iqbal
, Khalil Al-Hussaeni
, Mohammed Hussain
:
Differentially Private Release of Heterogeneous Network for Managing Healthcare Data. ACM Trans. Knowl. Discov. Data 17(6): 90:1-90:30 (2023) - [c58]Miles Q. Li, Benjamin C. M. Fung, Ashita Diwan:
A Novel Deep Multi-head Attentive Vulnerable Line Detector. INNS DLIA@IJCNN 2023: 35-44 - [i9]Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland:
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck. CoRR abs/2307.10631 (2023) - 2022
- [j58]Jwen Fai Low
, Benjamin C. M. Fung
, Farkhund Iqbal
, Shih-Chia Huang
:
Distinguishing between fake news and satire with transformers. Expert Syst. Appl. 187: 115824 (2022) - [j57]Miles Q. Li, Benjamin C. M. Fung, Philippe Charland:
DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense. Inf. Sci. 601: 357-373 (2022) - [j56]Kejing Yin
, William K. Cheung
, Benjamin C. M. Fung
, Jonathan Poon:
Learning Inter-Modal Correspondence and Phenotypes From Multi-Modal Electronic Health Records. IEEE Trans. Knowl. Data Eng. 34(9): 4328-4341 (2022) - [c57]Christopher Molloy, Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland:
H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection. CSR 2022: 22-29 - [c56]Christopher Molloy, Philippe Charland, Steven H. H. Ding, Benjamin C. M. Fung:
JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence. CyCom 2022: 385-403 - [c55]Malik H. Altakrori, Thomas Scialom, Benjamin C. M. Fung, Jackie Chi Kit Cheung:
A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques. EMNLP 2022: 2391-2406 - [c54]Ashita Diwan, Miles Q. Li, Benjamin C. M. Fung:
VDGraph2Vec: Vulnerability Detection in Assembly Code using Message Passing Neural Networks. ICMLA 2022: 1039-1046 - [c53]Miles Q. Li, Benjamin C. M. Fung:
Interpretable Malware Classification based on Functional Analysis. ICSOFT 2022: 500-507 - [c52]Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta:
On the Effectiveness of Interpretable Feedforward Neural Network. IJCNN 2022: 1-8 - [c51]Talal Halabi, Martine Bellaïche, Benjamin C. M. Fung:
Towards Adaptive Cybersecurity for Green IoT. IoTaIS 2022: 64-69 - 2021
- [j55]Shih-Chia Huang
, Da-Wei Jaw
, Wenli Li, Zhihui Lu
, Sy-Yen Kuo
, Benjamin C. M. Fung
, Bo-Hao Chen
, Thanisa Numnonda
:
Image Dehazing in Disproportionate Haze Distributions. IEEE Access 9: 44599-44609 (2021) - [j54]Farkhund Iqbal
, Rabia Batool, Benjamin C. M. Fung
, Saiqa Aleem
, Ahmed Abbasi, Abdul Rehman Javed
:
Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting. IEEE Access 9: 115535-115547 (2021) - [j53]Yen-Hung Liu
, Patrick C. K. Hung
, Farkhund Iqbal
, Benjamin C. M. Fung
:
Automatic Fall Risk Detection Based on Imbalanced Data. IEEE Access 9: 163594-163611 (2021) - [j52]Miles Q. Li, Benjamin C. M. Fung
, Philippe Charland, Steven H. H. Ding:
I-MAD: Interpretable malware detector using Galaxy Transformer. Comput. Secur. 108: 102371 (2021) - [j51]Rong Wang
, Benjamin C. M. Fung, Yan Zhu
, Qiang Peng:
Differentially private data publishing for arbitrarily partitioned data. Inf. Sci. 553: 247-265 (2021) - [j50]Adel Abusitta, Miles Q. Li, Benjamin C. M. Fung
:
Malware classification and composition analysis: A survey of recent developments. J. Inf. Secur. Appl. 59: 102828 (2021) - [j49]Thar Baker
, Zehua Guo, Ali Ismail Awad
, Shangguang Wang
, Benjamin C. M. Fung:
Enabling Technologies for Energy Cloud. J. Parallel Distributed Comput. 152: 108-110 (2021) - [j48]Shih-Chia Huang
, Quoc-Viet Hoang
, Trung-Hieu Le
, Yan-Tsung Peng
, Ching-Chun Huang, Cheng Zhang, Benjamin C. M. Fung
, Kai-Han Cheng, Sha-Wo Huang:
An Advanced Noise Reduction and Edge Enhancement Algorithm. Sensors 21(16): 5391 (2021) - [j47]Rashid Hussain Khokhar
, Farkhund Iqbal
, Benjamin C. M. Fung
, Jamal Bentahar
:
Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information. IEEE Trans. Engineering Management 68(1): 149-169 (2021) - [j46]Sarah A. Alkhodair
, Benjamin C. M. Fung
, Steven H. H. Ding, William K. Cheung, Shih-Chia Huang:
Detecting High-Engaging Breaking News Rumors in Social Media. ACM Trans. Manag. Inf. Syst. 12(1): 8:1-8:16 (2021) - [c50]Malik H. Altakrori, Jackie Chi Kit Cheung, Benjamin C. M. Fung:
The Topic Confusion Task: A Novel Evaluation Scenario for Authorship Attribution. EMNLP (Findings) 2021: 4242-4256 - [c49]Miles Q. Li
, Benjamin C. M. Fung
:
A Novel Neural Network-Based Malware Severity Classification System. ICSOFT (Selected Papers) 2021: 218-232 - [c48]Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding:
A Novel and Dedicated Machine Learning Model for Malware Classification. ICSOFT 2021: 617-628 - [c47]Adel Abusitta, Omar Abdel Wahab, Benjamin C. M. Fung:
VirtualGAN: Reducing Mode Collapse in Generative Adversarial Networks Using Virtual Mapping. IJCNN 2021: 1-6 - [c46]Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal:
ER-AE: Differentially Private Text Generation for Authorship Anonymization. NAACL-HLT 2021: 3997-4007 - [c45]Kejing Yin
, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon:
TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling. SDM 2021: 594-602 - [i8]Malik H. Altakrori, Jackie Chi Kit Cheung, Benjamin C. M. Fung:
The Topic Confusion Task: A Novel Scenario for Authorship Attribution. CoRR abs/2104.08530 (2021) - [i7]Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta:
On the Effectiveness of Interpretable Feedforward Neural Network. CoRR abs/2111.02303 (2021) - 2020
- [j45]Sarah A. Alkhodair
, Steven H. H. Ding
, Benjamin C. M. Fung
, Junqiang Liu
:
Detecting breaking news rumors of emerging topics in social media. Inf. Process. Manag. 57(2): 102018 (2020) - [j44]Gaby G. Dagher
, Benjamin C. M. Fung, Noman Mohammed, Jeremy Clark:
sf SecDM: privacy-preserving data outsourcing framework with differential privacy. Knowl. Inf. Syst. 62(5): 1923-1960 (2020) - [j43]Rong Wang
, Benjamin C. M. Fung, Yan Zhu:
Heterogeneous data release for cluster analysis with differential privacy. Knowl. Based Syst. 201-202: 106047 (2020) - [c44]Qifan Wang, Benjamin C. M. Fung, Patrick C. K. Hung:
DUGRA: Dual-Graph Representation Learning for Health Information Networks. IEEE BigData 2020: 4961-4970 - [c43]Jiaqi Lu, Benjamin C. M. Fung, William K. Cheung:
Embedding for Anomaly Detection on Health Insurance Claims. DSAA 2020: 459-468 - [i6]Kejing Yin, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon:
Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records. CoRR abs/2011.06301 (2020)
2010 – 2019
- 2019
- [j42]Farkhund Iqbal
, Jahanzeb Maqbool Hashmi, Benjamin C. M. Fung
, Rabia Batool, Asad Masood Khattak, Saiqa Aleem, Patrick C. K. Hung:
A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction. IEEE Access 7: 14637-14652 (2019) - [j41]Manuel Gil, Reem El Sherif
, Manon Pluye, Benjamin C. M. Fung
, Roland M. Grad, Pierre Pluye:
Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care. IEEE Access 7: 15955-15966 (2019) - [j40]Farkhund Iqbal
, Benjamin C. M. Fung
, Mourad Debbabi
, Rabia Batool, Andrew Marrington:
Wordnet-Based Criminal Networks Mining for Cybercrime Investigation. IEEE Access 7: 22740-22755 (2019) - [j39]Junqiang Liu
, Xinyi Ju, Xingxing Zhang, Benjamin C. M. Fung
, Xiangcai Yang, Changhong Yu:
Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning. IEEE Access 7: 74168-74180 (2019) - [j38]Malik H. Altakrori, Farkhund Iqbal
, Benjamin C. M. Fung
, Steven H. H. Ding, Abdallah Tubaishat:
Arabic Authorship Attribution: An Extensive Study on Twitter Posts. ACM Trans. Asian Low Resour. Lang. Inf. Process. 18(1): 5:1-5:51 (2019) - [j37]Steven H. H. Ding
, Benjamin C. M. Fung
, Farkhund Iqbal
, William K. Cheung:
Learning Stylometric Representations for Authorship Analysis. IEEE Trans. Cybern. 49(1): 107-121 (2019) - [c42]Kejing Yin
, Dong Qian, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon:
Learning Phenotypes and Dynamic Patient Representations via RNN Regularized Collective Non-Negative Tensor Factorization. AAAI 2019: 1246-1253 - [c41]Lihong Song, Chin Wang Cheong, Kejing Yin
, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon:
Medical Concept Embedding with Multiple Ontological Representations. IJCAI 2019: 4613-4619 - [c40]Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland:
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization. IEEE Symposium on Security and Privacy 2019: 472-489 - [i5]Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal:
ER-AE: Differentially-private Text Generation for Authorship Anonymization. CoRR abs/1907.08736 (2019) - [i4]Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding:
I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer. CoRR abs/1909.06865 (2019) - 2018
- [j36]Khalil Al-Hussaeni
, Benjamin C. M. Fung
, Farkhund Iqbal
, Gaby G. Dagher
, Eun G. Park:
SafePath: Differentially-private publishing of passenger trajectories in transportation systems. Comput. Networks 143: 126-139 (2018) - [j35]Junqiang Liu
, Xingxing Zhang, Benjamin C. M. Fung
, Jiuyong Li
, Farkhund Iqbal
:
Opportunistic mining of top-n high utility patterns. Inf. Sci. 441: 171-186 (2018) - [j34]Sarah A. Alkhodair
, Benjamin C. M. Fung
, Osmud Rahman, Patrick C. K. Hung:
Improving interpretations of topic modeling in microblogs. J. Assoc. Inf. Sci. Technol. 69(4): 528-540 (2018) - [j33]Khalil Al-Hussaeni
, Benjamin C. M. Fung
, Farkhund Iqbal
, Junqiang Liu
, Patrick C. K. Hung:
Differentially private multidimensional data publishing. Knowl. Inf. Syst. 56(3): 717-752 (2018) - [c39]Kejing Yin
, William K. Cheung, Yang Liu, Benjamin C. M. Fung, Jonathan Poon:
Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization. IJCAI 2018: 3627-3633 - [e1]Mohadeseh Ganji, Lida Rashidi, Benjamin C. M. Fung, Can Wang:
Trends and Applications in Knowledge Discovery and Data Mining - PAKDD 2018 Workshops, BDASC, BDM, ML4Cyber, PAISI, DaMEMO, Melbourne, VIC, Australia, June 3, 2018, Revised Selected Papers. Lecture Notes in Computer Science 11154, Springer 2018, ISBN 978-3-030-04502-9 [contents] - 2017
- [j32]Jimin Guo
, Benjamin C. M. Fung, Farkhund Iqbal
, Peter J. K. Kuppen, Rob A. E. M. Tollenaar, Wilma E. Mesker, Jean-Jacques Lebrun:
Revealing determinant factors for early breast cancer recurrence by decision tree. Inf. Syst. Frontiers 19(6): 1233-1241 (2017) - [j31]Latifa Guerrouj, Zeinab Azadeh Kermansaravi
, Venera Arnaoudova, Benjamin C. M. Fung, Foutse Khomh, Giuliano Antoniol, Yann-Gaël Guéhéneuc:
Investigating the relation between lexical smells and change- and fault-proneness: an empirical study. Softw. Qual. J. 25(3): 641-670 (2017) - 2016
- [j30]Rashid Hussain Khokhar, Benjamin C. M. Fung, Farkhund Iqbal
, Dima Alhadidi, Jamal Bentahar
:
Privacy-preserving data mashup model for trading person-specific information. Electron. Commer. Res. Appl. 17: 19-37 (2016) - [j29]Junqiang Liu
, Ke Wang, Benjamin C. M. Fung:
Mining High Utility Patterns in One Phase without Generating Candidates. IEEE Trans. Knowl. Data Eng. 28(5): 1245-1257 (2016) - [c38]Patrick C. K. Hung, Kamen Kanev, Farkhund Iqbal
, David Mettrick, Laura Rafferty, Guan-Pu Pan, Shih-Chia Huang, Benjamin C. M. Fung:
A Study of Children Facial Recognition for Privacy in Smart TV. CompIMAGE 2016: 229-240 - [c37]Maude Bonenfant, Bipin C. Desai, Drew Desai, Benjamin C. M. Fung, M. Tamer Özsu
, Jeffrey D. Ullman:
Panel: The State of Data: Invited Paper from panelists. IDEAS 2016: 2-11 - [c36]Steven H. H. Ding, Benjamin C. M. Fung, Philippe Charland:
Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering. KDD 2016: 461-470 - [i3]Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal, William K. Cheung:
Learning Stylometric Representations for Authorship Analysis. CoRR abs/1606.01219 (2016) - 2015
- [j28]Michael R. Schmid, Farkhund Iqbal
, Benjamin C. M. Fung:
E-mail authorship attribution using customized associative classification. Digit. Investig. 14 Supplement 1: S116-S126 (2015) - [j27]Mohammad Reza Farhadi, Benjamin C. M. Fung
, Yin Bun Fung
, Philippe Charland, Stere Preda, Mourad Debbabi
:
Scalable code clone search for malware analysis. Digit. Investig. 15: 46-60 (2015) - [j26]Dominik Slezak
, Benjamin C. M. Fung, William Kwok-Wai Cheung:
Preface. Fundam. Informaticae 137(2) (2015) - [j25]Simon Li, Kamrun Nahar, Benjamin C. M. Fung
:
Product customization of tablet computers based on the information of online reviews by customers. J. Intell. Manuf. 26(1): 97-110 (2015) - [j24]Nicandro Scarabeo, Benjamin C. M. Fung, Rashid Hussain Khokhar:
Mining known attack patterns from security-related events. PeerJ Comput. Sci. 1: e25 (2015) - [j23]Steven H. H. Ding, Benjamin C. M. Fung, Mourad Debbabi
:
A Visualizable Evidence-Driven Approach for Authorship Attribution. ACM Trans. Inf. Syst. Secur. 17(3): 12:1-12:30 (2015) - [c35]Junqiang Liu, Jiuyong Li
, Shijian Xu, Benjamin C. M. Fung:
Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption. DaWaK 2015: 70-81 - [c34]Junqiang Liu, Yongsheng Wu, Qingfeng Zhou, Benjamin C. M. Fung, Fanghui Chen, Binxiao Yu:
Parallel Eclat for Opportunistic Mining of Frequent Itemsets. DEXA (1) 2015: 401-415 - [c33]Gaby G. Dagher
, Farkhund Iqbal
, Mahtab Arafati, Benjamin C. M. Fung:
Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup. ICPADS 2015: 760-769 - [p1]Benjamin C. M. Fung, Yan'an Jin, Jiaming Li, Junqiang Liu:
Anonymizing Social Network Data for Maximal Frequent-Sharing Pattern Mining. Recommendation and Search in Social Networks 2015: 77-100 - 2014
- [j22]Khalil Al-Hussaeni
, Benjamin C. M. Fung
, William K. Cheung
:
Privacy-preserving trajectory stream publishing. Data Knowl. Eng. 94: 89-109 (2014) - [j21]Rashid Hussain Khokhar, Rui Chen, Benjamin C. M. Fung
, Siu Man Lui:
Quantifying the costs and benefits of privacy-preserving health data publishing. J. Biomed. Informatics 50: 107-121 (2014) - [j20]Abdur Rahman Mohd Abul Basher, Benjamin C. M. Fung
:
Analyzing topics and authors in chat logs for crime investigation. Knowl. Inf. Syst. 39(2): 351-381 (2014) - [j19]Noman Mohammed, Dima Alhadidi, Benjamin C. M. Fung
, Mourad Debbabi
:
Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data. IEEE Trans. Dependable Secur. Comput. 11(1): 59-71 (2014) - [j18]Slawomir Goryczka, Li Xiong
, Benjamin C. M. Fung:
\(m\) -Privacy for Collaborative Data Publishing. IEEE Trans. Knowl. Data Eng. 26(10): 2520-2533 (2014) - [j17]Rui Chen, Benjamin C. M. Fung
, Philip S. Yu, Bipin C. Desai:
Correlated network data publication via differential privacy. VLDB J. 23(4): 653-676 (2014) - [c32]Mahtab Arafati, Gaby G. Dagher
, Benjamin C. M. Fung
, Patrick C. K. Hung:
D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups. IEEE CLOUD 2014: 498-505 - [c31]Ali K. Hmood
, Benjamin C. M. Fung
, Farkhund Iqbal
:
Privacy-Preserving Medical Reports Publishing for Cluster Analysis. NTMS 2014: 1-8 - [c30]Mohammad Reza Farhadi, Benjamin C. M. Fung
, Philippe Charland, Mourad Debbabi
:
BinClone: Detecting Code Clones in Malware. SERE 2014: 78-87 - 2013
- [j16]Yong Zeng
, Kyoung-Yun Kim
, Victor Raskin, Benjamin C. M. Fung
, Yoshinobu Kitamura:
Modeling, extraction, and transformation of semantics in computer aided engineering systems. Adv. Eng. Informatics 27(1): 1-3 (2013) - [j15]Gaby G. Dagher
, Benjamin C. M. Fung
:
Subject-based semantic document clustering for digital forensic investigations. Data Knowl. Eng. 86: 224-241 (2013) - [j14]Rui Chen, Benjamin C. M. Fung
, Noman Mohammed, Bipin C. Desai, Ke Wang:
Privacy-preserving trajectory data publishing by local suppression. Inf. Sci. 231: 83-97 (2013) - [j13]Farkhund Iqbal
, Hamad Binsalleeh
, Benjamin C. M. Fung
, Mourad Debbabi
:
A unified data mining solution for authorship analysis in anonymous textual communications. Inf. Sci. 231: 98-112 (2013) - [j12]Noman Mohammed, Xiaoqian Jiang, Rui Chen, Benjamin C. M. Fung
, Lucila Ohno-Machado
:
Privacy-preserving heterogeneous health data sharing. J. Am. Medical Informatics Assoc. 20(3): 462-469 (2013) - [c29]Benjamin C. M. Fung
, Yan'an Jin, Jiaming Li:
Preserving privacy and frequent sharing patterns for social network data publishing. ASONAM 2013: 479-485 - 2012
- [j11]Rabeah Al-Zaidy, Benjamin C. M. Fung
, Amr M. Youssef, Francis Fortin:
Mining criminal networks from unstructured text documents. Digit. Investig. 8(3-4): 147-160 (2012) - [j10]Benjamin C. M. Fung
, Thomas Trojer, Patrick C. K. Hung, Li Xiong
, Khalil Al-Hussaeni
, Rachida Dssouli:
Service-Oriented Architecture for High-Dimensional Private Data Mashup. IEEE Trans. Serv. Comput. 5(3): 373-386 (2012) - [c28]Luca Bonomi, Li Xiong
, Rui Chen, Benjamin C. M. Fung
:
Frequent grams based embedding for privacy preserving record linkage. CIKM 2012: 1597-1601 - [c27]Junqiang Liu
, Ke Wang, Benjamin C. M. Fung
:
Direct Discovery of High Utility Itemsets without Candidate Generation. ICDM 2012: 984-989 - [c26]Rui Chen, Benjamin C. M. Fung
, Bipin C. Desai, Nériah M. Sossou:
Differentially private transit data publication: a case study on the montreal transportation system. KDD 2012: 213-221 - [c25]Dima Alhadidi, Noman Mohammed, Benjamin C. M. Fung
, Mourad Debbabi
:
Secure Distributed Framework for Achieving ε-Differential Privacy. Privacy Enhancing Technologies 2012: 120-139 - [c24]Farkhund Iqbal
, Benjamin C. M. Fung
, Mourad Debbabi
:
Mining Criminal Networks from Chat Log. Web Intelligence 2012: 332-337 - [i2]Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung:
Privacy Preserving Record Linkage via grams Projections. CoRR abs/1208.2773 (2012) - 2011
- [j9]Rui Chen, Noman Mohammed, Benjamin C. M. Fung, Bipin C. Desai, Li Xiong:
Publishing Set-Valued Data via Differential Privacy. Proc. VLDB Endow. 4(11): 1087-1098 (2011) - [j8]Noman Mohammed, Benjamin C. M. Fung
, Mourad Debbabi
:
Anonymity meets game theory: secure data integration with malicious participants. VLDB J. 20(4): 567-588 (2011) - [c23]Hani AbuSharkh, Benjamin C. M. Fung
:
Service-oriented architecture for sharing private spatial-temporal data. CDC 2011: 40-47 - [c22]Noman Mohammed, Rui Chen, Benjamin C. M. Fung
, Philip S. Yu:
Differentially private data release for data mining. KDD 2011: 493-501 - [c21]Rabeah Al-Zaidy, Benjamin C. M. Fung
, Amr M. Youssef:
Towards discovering criminal communities from textual data. SAC 2011: 172-177 - [c20]Sujoy Ray, Mohammad Fahim Nizam, Swagata Das, Benjamin C. M. Fung
:
Verification of data pattern for interactive privacy preservation model. SAC 2011: 1716-1723 - [i1]Rui Chen, Benjamin C. M. Fung, Bipin C. Desai:
Differentially Private Trajectory Data Publication. CoRR abs/1112.2020 (2011) - 2010
- [j7]Benjamin C. M. Fung
, Ke Wang, Rui Chen, Philip S. Yu:
Privacy-preserving data publishing: A survey of recent developments. ACM Comput. Surv. 42(4): 14:1-14:53 (2010) - [j6]Farkhund Iqbal
, Hamad Binsalleeh
, Benjamin C. M. Fung
, Mourad Debbabi
:
Mining writeprints from anonymous e-mails for forensic investigation. Digit. Investig. 7(1-2): 56-64 (2010) - [j5]Noman Mohammed, Benjamin C. M. Fung
, Patrick C. K. Hung, Cheuk-kwong Lee:
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data. ACM Trans. Knowl. Discov. Data 4(4): 18:1-18:33 (2010) - [c19]Pu Shi, Li Xiong
, Benjamin C. M. Fung
:
Anonymizing data with quasi-sensitive attribute values. CIKM 2010: 1389-1392 - [c18]Farkhund Iqbal
, Liaquat A. Khan, Benjamin C. M. Fung
, Mourad Debbabi
:
e-mail authorship verification for forensic investigation. SAC 2010: 1591-1598
2000 – 2009
- 2009
- [j4]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Patrick C. K. Hung:
Privacy-preserving data publishing for cluster analysis. Data Knowl. Eng. 68(6): 552-575 (2009) - [c17]Jarmanjit Singh, Qing Shi, Harpreet Sandhu, Benjamin C. M. Fung
:
Anonymizing location-based RFID data. C3S2E 2009: 27-33 - [c16]Noman Mohammed, Benjamin C. M. Fung
, Mourad Debbabi
:
Walking in the crowd: anonymizing trajectory data for pattern analysis. CIKM 2009: 1441-1444 - [c15]Noman Mohammed, Benjamin C. M. Fung
, Ke Wang, Patrick C. K. Hung:
Privacy-preserving data mashup. EDBT 2009: 228-239 - [c14]Yiming Wang, Lingyu Wang, Benjamin C. M. Fung
:
Preserving Privacy for Location-Based Services with Continuous Queries. ICC 2009: 1-5 - [c13]Thomas Trojer, Benjamin C. M. Fung
, Patrick C. K. Hung:
Service-Oriented Architecture for Privacy-Preserving Data Mashup. ICWS 2009: 767-774 - [c12]Noman Mohammed, Benjamin C. M. Fung
, Patrick C. K. Hung, Cheuk-kwong Lee:
Anonymizing healthcare data: a case study on the blood transfusion service. KDD 2009: 1285-1294 - [c11]Benjamin C. M. Fung
, Ming Cao, Bipin C. Desai, Heng Xu:
Privacy protection for RFID data. SAC 2009: 1528-1535 - [r2]Benjamin C. M. Fung, Ke Wang, Martin Ester:
Hierarchical Document Clustering. Encyclopedia of Data Warehousing and Mining 2009: 970-975 - 2008
- [j3]Farkhund Iqbal
, Rachid Hadjidj, Benjamin C. M. Fung
, Mourad Debbabi
:
A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digit. Investig. 5(Supplement): S42-S51 (2008) - [c10]Benjamin C. M. Fung
, Ke Wang, Ada Wai-Chee Fu, Jian Pei
:
Anonymity for continuous data publishing. EDBT 2008: 264-275 - [c9]Yehang Zhu, Benjamin C. M. Fung
, Dejun Mu, Yanling Li:
An Efficient Hybrid Hierarchical Document Clustering Method. FSKD (2) 2008: 395-399 - [c8]Yabo Xu, Benjamin C. M. Fung
, Ke Wang, Ada Wai-Chee Fu, Jian Pei
:
Publishing Sensitive Transactions for Itemset Utility. ICDM 2008: 1109-1114 - [c7]Benjamin C. M. Fung
, Ke Wang, Lingyu Wang, Mourad Debbabi
:
A framework for privacy-preserving cluster analysis. ISI 2008: 46-51 - 2007
- [j2]Ke Wang, Benjamin C. M. Fung
, Philip S. Yu:
Handicapping attacker's confidence: an alternative to k -anonymization. Knowl. Inf. Syst. 11(3): 345-368 (2007) - [j1]Benjamin C. M. Fung
, Ke Wang, Philip S. Yu:
Anonymizing Classification Data for Privacy Preservation. IEEE Trans. Knowl. Data Eng. 19(5): 711-725 (2007) - [r1]Benjamin C. M. Fung:
Privacy Preserving Data Portals. Encyclopedia of Portal Technologies and Applications 2007: 842-847 - 2006
- [c6]Ke Wang, Benjamin C. M. Fung:
Anonymizing sequential releases. KDD 2006: 414-423 - [c5]Yehang Zhu, Guanzhong Dai, Benjamin C. M. Fung, Dejun Mu:
Document Clustering Method Based on Frequent Co-occurring Words. PACLIC 2006 - 2005
- [c4]Benjamin C. M. Fung
, Ke Wang, Philip S. Yu:
Top-Down Specialization for Information and Privacy Preservation. ICDE 2005: 205-216 - [c3]Ke Wang, Benjamin C. M. Fung
, Philip S. Yu:
Template-Based Privacy Preservation in Classification Problems. ICDM 2005: 466-473 - [c2]Ke Wang, Benjamin C. M. Fung, Guozhu Dong:
Integrating Private Databases for Data Analysis. ISI 2005: 171-182 - 2003
- [c1]Benjamin C. M. Fung, Ke Wang, Martin Ester:
Hierarchical Document Clustering using Frequent Itemsets. SDM 2003: 59-70
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-04 21:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint