Mining public opinion about economic issues: Twitter and the us presidential election A Karami, LS Bennett, X He International Journal of Strategic Decision Sciences (IJSDS) 9 (1), 18-28, 2018 | 76 | 2018 |
Effective anonymization of query logs Y Hong, X He, J Vaidya, N Adam, V Atluri Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 61 | 2009 |
Preserving privacy in social networks: A structure-aware approach X He, J Vaidya, B Shafiq, N Adam, V Atluri 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and …, 2009 | 44 | 2009 |
Privacy preserving integration of health care data N Adam, T White, B Shafiq, J Vaidya, X He AMIA Annual Symposium proceedings 2007, 1, 2007 | 22 | 2007 |
Is social media a fad? A study of the adoption and use of social media in SMEs X He | 15 | 2014 |
Reachability analysis in privacy-preserving perturbed graphs X He, J Vaidya, B Shafiq, N Adam, X Lin 2010 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2010 | 14 | 2010 |
The effects of consumer engagement behavior on the growth of social media brand community: Evidence from an SME X He, A Negahban Social media marketing: Breakthroughs in research and practice, 557-578, 2018 | 10 | 2018 |
Catch a fad or capture a value?: Social media leverage in SMEs X He, H Lu Journal of Organizational and End User Computing (JOEUC) 28 (3), 67-81, 2016 | 9 | 2016 |
Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site. X He, A Karami, C Deng Int. J. Web Based Communities 13 (3), 344-363, 2017 | 7 | 2017 |
Towards ranking the importance of patents X He, F Zhang, N Adam 2008 IEEE Symposium on Advanced Management of Information for Globalized …, 2008 | 7 | 2008 |
Privacy-preserving link discovery X He, B Shafiq, J Vaidya, N Adam Proceedings of the 2008 ACM symposium on Applied computing, 909-915, 2008 | 7 | 2008 |
Secure construction and publication of contingency tables from distributed data X He, H Lu, J Vaidya, N Adam Journal of Computer Security 19 (3), 453-484, 2011 | 5 | 2011 |
Efficient privacy-preserving link discovery X He, J Vaidya, B Shafiq, N Adam, E Terzi, T Grandison Pacific-Asia Conference on Knowledge Discovery and Data Mining, 16-27, 2009 | 4 | 2009 |
Privacy Preserving Integration of Health Care Data X He, J Vaidya, B Shafiq, N Adam, T White International Journal of Computational Models and Algorithms in Medicine …, 2010 | 3 | 2010 |
Patent citations and value: through the lens of a social network approach F Zhang, G Jiang, X He International Journal of Management and Network Economics 4 (2), 115-143, 2018 | 2 | 2018 |
What Makes Video Ads Viral: Quantifying the Impact of Marketer-and User-Generated Content C Deng, Y Lu, T Ravichandran, X He | 2 | 2016 |
Secure construction of contingency tables from distributed data H Lu, X He, J Vaidya, N Adam IFIP Annual Conference on Data and Applications Security and Privacy, 144-157, 2008 | 2 | 2008 |
Teaching Introductory Programming Online: Lessons Learned X He Proceedings of the Southern Association for Information Systems Conference, 1, 2020 | 1 | 2020 |
Fault-tolerant tile mining H Lu, W Zhu, J Phan, M Ghiassi, Y Fang, Y Hong, X He Expert Systems with Applications 101, 25-42, 2018 | 1 | 2018 |
Detecting and preventing inference attacks in online social networks: A data-driven and holistic framework X He, H Lu Journal of Information Privacy and Security 13 (3), 104-119, 2017 | 1 | 2017 |