Vide: A vision-based approach for deep web data extraction W Liu, X Meng, W Meng IEEE Transactions on Knowledge and Data Engineering 22 (3), 447-460, 2009 | 360 | 2009 |
Integrity auditing of outsourced data M Xie, H Wang, J Yin, X Meng Proceedings of the 33rd international conference on Very large data bases …, 2007 | 275 | 2007 |
Protecting location privacy against location-dependent attacks in mobile services X Pan, J Xu, X Meng IEEE Transactions on Knowledge and Data Engineering 24 (8), 1506-1519, 2011 | 250 | 2011 |
Wind power forecasts using Gaussian processes and numerical weather prediction N Chen, Z Qian, IT Nabney, X Meng IEEE Transactions on Power Systems 29 (2), 656-665, 2013 | 241 | 2013 |
On the sequencing of tree structures for XML indexing H Wang, X Meng 21st International Conference on Data Engineering (ICDE'05), 372-383, 2005 | 141 | 2005 |
An efficient multi-dimensional index for cloud data management X Zhang, J Ai, Z Wang, J Lu, X Meng Proceedings of the first international workshop on Cloud data management, 17-24, 2009 | 138 | 2009 |
A Survey of Deep Web Data Integration [J] W LIU, XF MENG, WY MENG Chinese Journal of Computers 9, 2007 | 116* | 2007 |
Vision-based Web Data Records Extraction. W Liu, X Meng, W Meng WebDB, 2006 | 104 | 2006 |
Distortion-based anonymity for continuous queries in location-based mobile services X Pan, X Meng, J Xu Proceedings of the 17th ACM SIGSPATIAL International Conference on Advances …, 2009 | 99 | 2009 |
Schema-guided wrapper maintenance for web-data extraction X Meng, D Hu, C Li Proceedings of the 5th ACM international workshop on Web information and …, 2003 | 98 | 2003 |
State of the Art and Trends in Database Research [J] XF MENG, LX ZHOU, S WANG Journal of Software 12, 2004 | 97* | 2004 |
You can walk alone: trajectory privacy-preserving through significant stays protection Z Huo, X Meng, H Hu, Y Huang International conference on database systems for advanced applications, 351-366, 2012 | 96 | 2012 |
Towards accurate histogram publication under differential privacy X Zhang, R Chen, J Xu, X Meng, Y Xie Proceedings of the 2014 SIAM international conference on data mining, 587-595, 2014 | 78 | 2014 |
A survey of trajectory privacy-preserving techniques Z Huo, XF Meng Jisuanji Xuebao(Chinese Journal of Computers) 34 (10), 1820-1830, 2011 | 77 | 2011 |
An efficient index for massive IOT data in cloud environment Y Ma, J Rao, W Hu, X Meng, X Han, Y Zhang, Y Chai, C Liu Proceedings of the 21st ACM international conference on Information and …, 2012 | 75 | 2012 |
Providing freshness guarantees for outsourced databases M Xie, H Wang, J Yin, X Meng Proceedings of the 11th international conference on Extending database …, 2008 | 72 | 2008 |
Benchmarking cloud-based data management systems Y Shi, X Meng, J Zhao, X Hu, B Liu, H Wang Proceedings of the second international workshop on Cloud data management, 47-54, 2010 | 69 | 2010 |
Coprivacy: a collaborative location privacy-preserving method without cloaking region Y Huang, Z Huo, XF Meng Jisuanji Xuebao(Chinese Journal of Computers) 34 (10), 1976-1985, 2011 | 68 | 2011 |
Query understanding through knowledge-based conceptualization Z Wang, K Zhao, H Wang, X Meng, JR Wen | 67 | 2015 |
p-sensitivity: A semantic privacy-protection model for location-based services Z Xiao, J Xu, X Meng 2008 Ninth International Conference on Mobile Data Management Workshops …, 2008 | 62 | 2008 |