Search filters

List of works by Benjamin Fung

A Comprehensive Analysis of Explainable AI for Malware Hunting

scientific article published on 11 July 2024

A decision tree method for building energy demand modeling

article

A framework for privacy-preserving cluster analysis

A methodology for identifying and improving occupant behavior in residential buildings

A novel approach of mining write-prints for authorship attribution in e-mail forensics

A novel methodology for knowledge discovery through mining associations between building operational data

article published in 2012

A systematic procedure to study the influence of occupant behavior on building energy consumption

A unified data mining solution for authorship analysis in anonymous textual communications

article

Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding

scientific article published on 26 September 2023

An Efficient Hybrid Hierarchical Document Clustering Method

article published in 2008

Analyzing topics and authors in chat logs for crime investigation

Anonymity for continuous data publishing

Anonymity meets game theory: secure data integration with malicious participants

Anonymizing Classification Data for Privacy Preservation

article by Benjamin Fung et al published May 2007 in IEEE Transactions on Knowledge and Data Engineering

Anonymizing data with quasi-sensitive attribute values

Anonymizing healthcare data

article

Anonymizing location-based RFID data

Anonymizing trajectory data for passenger flow analysis

Arabic Authorship Attribution

scientific article published on 13 November 2018

AugmenToxic: Leveraging Reinforcement Learning to Optimize LLM Instruction Fine-Tuning for Data Augmentation to Enhance Toxicity Detection

scientific article published on 29 October 2024

BinClone: Detecting Code Clones in Malware

article published in 2014

Centralized and Distributed Anonymization for High-Dimensional Healthcare Data

article

Correlated network data publication via differential privacy

D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups

Differentially private data release for data mining

scholarly article published 2011

Differentially private transit data publication

scholarly article published 2012

Direct Discovery of High Utility Itemsets without Candidate Generation

Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection

scientific article published on 20 October 2024

Extracting knowledge from building-related data — A data mining framework

Frequent grams based embedding for privacy preserving record linkage

article

Handicapping attacker's confidence: an alternative to k-anonymization

I-MAD: Interpretable malware detector using Galaxy Transformer

scientific article published in 2021

Learning Inter-Modal Correspondence and Phenotypes From Multi-Modal Electronic Health Records

scientific article published in 2022

Mining Criminal Networks from Chat Log

Mining criminal networks from unstructured text documents

Mining writeprints from anonymous e-mails for forensic investigation

Modeling, extraction, and transformation of semantics in computer aided engineering systems

Preserving privacy and frequent sharing patterns for social network data publishing

article

Privacy protection for RFID data

Privacy-Preserving Medical Reports Publishing for Cluster Analysis

Privacy-preserving data mashup

Privacy-preserving data publishing

article by Benjamin Fung et al published 1 June 2010 in ACM Computing Surveys

Privacy-preserving data publishing for cluster analysis

Privacy-preserving heterogeneous health data sharing.

scientific article

Privacy-preserving trajectory data publishing by local suppression

article by Rui Chen et al published May 2013 in Information Sciences

Privacy-preserving trajectory stream publishing

article

Product customization of tablet computers based on the information of online reviews by customers

Publishing Sensitive Transactions for Itemset Utility

Quantifying the costs and benefits of privacy-preserving health data publishing

scientific article

Scalable code clone search for malware analysis

Secure Distributed Framework for Achieving ε-Differential Privacy

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data

article by Noman Mohammed et al published January 2014 in IEEE Transactions on Dependable and Secure Computing

Service-Oriented Architecture for High-Dimensional Private Data Mashup

Service-Oriented Architecture for Privacy-Preserving Data Mashup

Service-oriented architecture for sharing private spatial-temporal data

Subject-based semantic document clustering for digital forensic investigations

article by Gaby G. Dagher & Benjamin Fung published July 2013 in Data and Knowledge Engineering

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions

scientific article published in 2023

Towards discovering criminal communities from textual data

article published in 2011

Using RFID tags to improve pilgrimage management

Using data mining to analyse fashion consumers’ preferences from a cross-national perspective

Verification of data pattern for interactive privacy preservation model

article published in 2011

VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution

scientific article published on 03 March 2023

Walking in the crowd

article published in 2009

e-mail authorship verification for forensic investigation