Refereed Journal Articles
@article{RFK21tfdt,
author = "O. Rahman and B. C. M. Fung and
D. Kharb",
title = "Factors Influencing Consumer Choice: A Study of Apparel and Sustainable Cues from Canadian and Indian Consumers’ Perspectives",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "",
number = "",
pages = "",
month = "",
year = "in
press",
}
@article{YCFP21tkde,
author = "K.
Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records",
journal = "IEEE Transactions on Knowledge and Data Engineering (TKDE)",
volume = "",
number = "",
pages = "",
month = "",
year = "in press",
}
@article{HJLLKFCN21access,
author = "S.-C. Huang
and D.-W. Jaw and W. Li and Z. Lu and S.-Y. Kuo and B. C. M. Fung and B.-H. Chen and T. Numnonda",
title = "Image Dehazing in Disproportionate Haze Distributions",
journal = "IEEE Access",
volume = "",
number = "",
pages = "",
month = "",
year = "in press",
}
@article{WFZP21ins,
author = "R. Wang and B. C. M. Fung and Y. Zhu and Q. Peng",
title = "Differentially
Private Data Publishing for Arbitrarily Partitioned Data",
journal = "Information Sciences",
volume = "553",
number = "",
pages = "247-265",
month = "April",
year = "2021",
}
@article{KIFB21tem,
author = "R. H. Khokhar and F. Iqbal and B. C. M. Fung and J. Bentahar",
title = "Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-specific Information.",
journal = "IEEE Transactions on Engineering Management (TEM) Special Section: Services Computing Management for Artificial Intelligence and Machine Learning",
volume = "68",
number = "1",
pages = "149-169",
month = "February",
year = "2021",
}
@article{AFDCH20tmis,
author = "S. A. Alkhodair and B. C. M. Fung and S. H. H. Ding and W. K. Cheung and S. C. Huang",
title = "Detecting High-engaging Breaking News Rumors in Social Media",
journal = "ACM Transactions on Management Information Systems (TMIS)",
volume = "12",
number = "1",
pages = "8.1-8.16",
month = "December",
year = "2020",
}
@article{WFZ20kbs,
author = "R.
Wang
and B. C. M. Fung and Y. Zhu",
title = "Heterogeneous Data Release for Cluster Analysis with Differential Privacy",
journal = "Knowledge-Based
Systems (KBS)",
volume = "201-202",
number = "106047",
pages = "1-13",
month = "August",
year = "2020",
}
@article{SHF20enb,
author = "Y. Sun and F. Haghighat
and B. C. M. Fung",
title = "A Review of the-State-of-the-Art in Data-driven Approaches for Building Energy Prediction",
journal = "Energy and Buildings",
volume = "221",
number = "110022",
pages = "1-23",
month = "August",
year = "2020",
}
@article{DFMC20kais,
author = "G. G. Dagher and B. C. M. Fung and N. Mohammed and J. Clark",
title = "SecDM: Privacy-preserving Data Outsourcing Framework with Differential Privacy",
journal = "Knowledge and Information Systems (KAIS)",
volume = "62",
number = "5",
pages = "1923-1960",
month = "May",
year = "2020",
}
@article{RFC20sustainabilty,
author = "O. Rahman and B. C. M. Fung and Z. Chen",
title = "Young Chinese Consumers’ Choice between Product-related and Sustainable Cues - The Effects of Gender Differences and Consumer Innovativeness",
journal = "Sustainability: Special Issue on Sustainable Development and Practices: Production, Consumption and Prosumption",
volume = "12",
number = "9.3818",
pages = "1-23",
month = "May",
year = "2020",
}
@article{ADFL20ipm,
author = "S. A. Alkhodair and S. H. H. Ding and B. C. M. Fung and J. Liu",
title = "Detecting Breaking News Rumors of Emerging Topics in Social Media",
journal = "Information
Processing and Management (IP&M)",
volume = "57",
number = "2.102018",
pages = "1-13",
month = "March",
year = "2020",
}
@article{AFHY20egy,
author = "M. Ashouri and B. C. M. Fung and F. Haghighat and and H. Yoshino",
title = "Systematic Approach to Provide Building Occupants with Feedback to Reduce Energy Consumption",
journal = "Energy",
volume = "194",
number = "116813",
pages = "1-9",
month = "March",
year = "2020",
}
@article{RCFK20joti,
author = "O. Rahman and Z. Chen and B. C. M. Fung and D. Kharb",
title = "A Cross-National Study of Young Female Consumer Behaviour, Innovativeness and Apparel Evaluation: China and India",
journal = "Journal of the Textile Institute (JOTI)",
volume = "111",
number = "3",
pages = "334-344",
month = "February",
year = "2020",
}
@article{LJZFYY19access,
author = "J. Liu and X. Jiu and X. Zhang and B. C. M. Fung and X. Yang and C. Yu",
title = "Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-based Pruning",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "74168-74180",
month = "December",
year = "2019",
}
@article{IFDBM19access,
author = "F. Iqbal and B. C. M. Fung and M. Debbabi and R. Batool and A. Marrington",
title = "WordNet-based Criminal Networks Mining for Cybercrime Investigation",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "22740-22755",
month = "December",
year = "2019",
}
@article{GEPFGP19access,
author = "M. Gil and R. El Sherif and M. Pluye and B. C. M. Fung and R. Grad and P. Pluye",
title = "Towards a Knowledge-based Recommender System for Linking Electronic Patient Records with Continuing Medical Education Information at the Point of Care",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "15955-15966",
month = "December",
year = "2019",
}
@article{IMFBKAH19access,
author = "F. Iqbal and J. Maqbool and B. C. M. Fung and R. Batool and A. M. Khattak adn S. Aleem and P. C. K. Hung",
title = "A Hybrid Framework for Sentiment Analysis using Genetic Algorithm based Feature Reduction",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "14637-14652",
month = "December",
year = "2019",
}
@article{DFIC19cyb,
author = "S. H. H. Ding and B. C. M. Fung and F. Iqbal and W. K. Cheung",
title = "Learning Stylometric Representations for Authorship Analysis",
journal = "IEEE Transactions on Cybernetics (CYB)",
volume = "49",
number = "1",
pages = "107-121",
month = "January",
year = "2019",
}
@article{AHFY19enb,
author = "M. Ashouri and F. Haghighat
and B. C. M. Fung and and H. Yoshino",
title = "Development of a Ranking Procedure for Energy Performance Evaluation of Buildings based on Occupant Behavior",
journal = "Energy and Buildings",
volume = "183",
pages = "659-671",
month = "January",
year = "2019",
}
@article{AIFDT18tallip,
author = "M. H. Altakrori and F.
Iqbal and B. C. M. Fung and S. H. H. Ding and A. Tubaishat",
title = "Arabic
Authorship Attribution: An Extensive Study on Twitter Posts",
journal = "ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)",
volume = "18",
number = "1",
articleno = "5",
pages = "5.1-5.51",
month = "November",
year = "2018",
}
@article{AFIDP18comnet,
author = "K. Al-Hussaeni and B. C. M. Fung and F. Iqbal and
G. G. Dagher and E. Park",
title = "SafePath: Differentially-Private Publishing of Passenger
Trajectories in Transportation Systems",
journal = "Computer Networks (COMNET): Special Issue on Intelligent and Connected Transportation Systems",
volume = "143",
pages = "126-139",
month = "October",
year = "2018",
}
@article{AFILH18kais,
author = "K. Al-Hussaeni and B. C. M. Fung and F. Iqbal and J. Liu and P. C. K. Hung",
title = "Differentially Private
Multidimensional Data Publishing",
journal = "Knowledge and Information Systems (KAIS)",
volume = "56",
number = "3",
pages = "717-752",
month = "September",
year = "2018",
}
@article{HKHIF18jit,
author = "P.
C. K. Hung and K. Kanev and S.-C. Huang and F. Iqbal and B. C. M. Fung",
title = "Smart TV Face Monitoring for Children Privacy",
journal = "Journal of Internet Technology (JIT): Special Issue on Behavior Data Analytics for Cybersecurity",
volume = "19",
number = "5",
pages = "1577-1583",
month = "September",
year = "2018",
}
@article{AHFLY18enb,
author = "M. Ashouri and F. Haghighat and B. C. M. Fung and A. Lazrak and H. Yoshino",
title = "Development of Building
Energy Saving Advisory: A Data Mining Approach",
journal = "Energy and Buildings",
volume = "172",
pages = "139-151",
month = "August",
year = "2018",
}
@article{LZFLI18ins,
author = "J. Liu and X. Zhang and B. C. M. Fung and J. Li and F. Iqbal",
title = "Opportunistic Mining of Top-n High Utility Patterns",
journal = "Information Sciences
(INS)",
volume = "441",
pages = "171-186",
month = "May",
year = "2018",
}
@article{BFIS18scs,
author = "T. Braun and B. C. M. Fung and
F. Iqbal and B. Shah",
title = "Security and Privacy
Challenges in Smart Cities",
journal = "Sustainable Cities and Society (SCS): Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society,"
volume = "39",
pages = "499-507",
month = "May",
year = "2018",
}
@article{AFRH18jasist,
author = "S. A. Alkhodair and B. C. M. Fung and O. Rahman and P. C. K. Hung",
title = "Improving Interpretations of Topic Modeling in Microblogs",
journal = "Journal of the Association for Information Science and Technology (JASIST)",
volume = "69",
number = "4",
pages = "528-540",
month = "April",
year = "2018",
}
@article{RFCCG18tfdt,
author = "O. Rahman and B. C. M. Fung
and Z. Chen and W.-L. Chang and X. Gao",
title = "A Study of Apparel Consumer Behaviour in China and Taiwan",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "11",
number = "1",
pages = "22-33",
year = "2018",
}
@article{HIHFR18ijuce,
author = "M. Hasan
and F. Iqbal and P. C. K. Hung and B. C. M. Fung and L. Rafferty",
title = "A Security
Study for Smart Metering Systems",
journal = "International Journal of Urban and Civil Engineering (IJUCE)",
volume = "12",
number = "1",
pages = "1-11",
year = "2018",
}
@article{GFIKTML17isf,
author = "J. Guo
and B. C. M. Fung and F. Iqbal and P. J. K. Kuppen and R. A. E. M. Tollenaar and W. E. Mesker and J.-J. Lebrun",
title = "Revealing Determinant Factors for Early Breast Cancer Recurrence by Decision Tree",
journal = "Information Systems
Frontiers (ISF)",
volume = "19",
number = "6",
pages = "1233-1241",
month = "December",
year = "2017",
}
@article{RFCG17apjml,
author = "O. Rahman
and B. C. M. Fung and Z. Chen and X. Gao",
title = "A Cross-National Study of Apparel Consumers’ Preferences and the Role of Product Evaluative Cues",
journal = "Asia Pacific Journal of Marketing and Logistics (APJML)",
volume = "29",
number = "4",
pages = "796-812",
month = "September",
year = "2017",
}
@article{GKAFKAG17sqjo,
author = "L. Guerrouj and Z. Kermansaravi
and V. Arnaoudouva and B. C. M. Fung and F. Khomh and G. Antoniol and Y.-G. Guéhéneuc",
title = "Investigating the
Relation between Lexical Smells and Change- and Fault- Proneness: An
Empirical Study",
journal = "Software Quality
Journal (SQJO)",
volume = "25",
number = "3",
pages = "641-670",
month = "September",
year = "2017",
}
@article{KFIAB16ecra,
author = "R. H. Khokhar and B. C. M.
Fung and F. Iqbal and D. Alhadidi and J. Bentahar",
title = "Privacy-preserving
Data Mashup Model for Trading Person-specific Information",
journal = "Electronic Commerce
Research and Applications (ECRA)",
volume = "17",
pages = "19-37",
month = "May-June",
year = "2016",
}
@article{YHF16scs,
author = "Z.
Yu and F. Haghighat and B.
C. M. Fung",
title = "Advances and Challenges in
Building Engineering and Data Mining Applications for Energy-efficient Communities",
journal = "Sustainable Cities and Society (SCS)",
volume = "25",
pages = "33-38",
month = "August",
year = "2016",
}
@article{LWF16tkde,
author = "J. Liu and K. Wang and B.
C. M. Fung",
title = "Mining High Utility Patterns in One Phase without Generating Candidates",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "28",
number = "5",
pages = "1245-1257",
month = "May",
year = "2016",
}
@article{RFY16jicr,
author = "O. Rahman and B. C. M. Fung and A. Yeo",
title = "Exploring the Meanings of Hijab through Online Comments in Canada",
journal = "Journal of Intercultural Communication Research (JICR)",
volume = "45",
number = "3",
pages = "214-232",
month = "April",
year = "2016",
}
@article{FFFCPD15diin,
author = "M. R. Farhadi and B. C. M. Fung and Y. B. Fung and P. Charland and S. Preda and M. Debbabi",
title = "Scalable Code Clone Search for Malware Analysis",
journal = "Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis",
volume = "15",
pages = "46-60",
month = "December",
year = "2015",
}
@article{SFK15peerjcs,
author = "N. Scarabeo
and B. C. M. Fung and R. H. Khokhar",
title = "Mining Known Attack Patterns from Security-related Events",
journal = "PeerJ Computer Science",
volume = "1",
number = "e25",
pages = "1-21",
month = "October",
year = "2015",
}
@article{SIF15diin,
author = "M.
Schmid and F. Iqbal and B. C. M. Fung",
title = "E-mail Authorship Attribution using
Customized Associative Classification",
journal = "Digital Investigation
(DIIN)",
volume = "14",
number = "1",
pages = "S116-S126",
month = "August",
year = "2015",
}
@article{DFD15tissec,
author = "S. H. H. Ding and B. C. M.
Fung and M. Debbabi",
title = "A Visualizable
Evidence-Driven Approach for Authorship Attribution",
journal = "ACM Transactions on Information and System Security (TISSEC)",
volume = "17",
number = "3",
articleno = "12",
pages = "12:1-12:30",
month = "March",
year = "2015",
}
@article{LNF15jim,
author = "S. Li and K. Nahar and B. C. M. Fung",
title = "Product Customization of Tablet Computers based on the Information of Online Reviews by Customers",
journal = "Journal of Intelligent Manufacturing (JIM)",
volume = "26",
number = "1",
pages = "97-110",
month = "February",
year = "2015",
}
@article{AFC14dke,
author = "K. Al-Hussaeni and B. C. M.
Fung and W. K. Cheung",
title = "Privacy-Preserving
Trajectory Stream Publishing",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "94",
number = "A",
pages = "89-109",
month = "November",
year = "2014",
}
@article{GXF14tkde,
author = "S. Goryczka and L. Xiong and B. C. M. Fung",
title = "$m$-privacy for
collaborative data publishing",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "26",
number = "10",
pages = "2520-2533",
month = "October",
year = "2014",
}
@article{CFYD14vldbj,
author = "R. Chen and B. C. M. Fung and P. S. Yu and B. C. Desai",
title = "Correlated Network Data Publication via Differential Privacy",
journal = "Very Large Data Bases Journal (VLDBJ)",
volume = "23",
number = "4",
pages = "653-676",
month = "August",
year = "2014",
}
@article{KCFL14jbi,
author = "R. H. Khokhar and R. Chen and B. C. M. Fung and S. M. Lui",
title = "Quantifying
the costs and benefits of privacy-preserving health data publishing",
journal = "Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy",
volume = "50",
pages = "107-121",
month = "August",
year = "2014",
}
@article{BF14kais,
author = "A.
Basher and B. C. M. Fung",
title = "Analyzing topics and
authors in chat logs for crime investigation",
journal = "Knowledge and Information Systems (KAIS)",
volume = "39",
number = "2",
pages = "351-381",
month = "May",
year = "2014",
}
@article{RFL14tfdt,
author = "O.
Rahman and B. C. M. Fung and W.-S. Liu",
title = "Using
Data Mining to Analyse Fashion Consumers' Preferences from a Cross-national
Perspective",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "7",
number = "1",
pages = "42-49",
month = "March",
year = "2014",
}
@article{MAFD14tdsc,
author = "N. Mohammed and D. Alhadidi and B. C. M. Fung and M. Debbabi",
title = "Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data",
journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
volume = "11",
number = "1",
pages = "59-71",
month = "January/February",
year = "2014",
}
@article{GFCA14trc,
author = "M. Ghasemzadeh and B. C. M. Fung and R. Chen and A. Awasthi",
title = "Anonymizing trajectory
data for passenger flow analysis",
journal = "Transportation Research Part C: Emerging Technologies (TRC)",
volume = "39",
pages = "63-79",
month = "February",
year = "2014",
}
@article{DF13dke,
author = "G. G. Dagher and B. C. M. Fung",
title = "Subject-based Semantic
Document Clustering for Digital Forensic Investigations",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "86",
pages = "224-241",
month = "July",
year = "2013",
}
@article{YFH13buil,
author = "Z. Yu and B. C. M. Fung and F. Haghighat",
title = "Extracting knowledge from building-related data - a data mining framework",
journal = "Building Simulation (BUIL): An International Journal",
volume = "6",
number = "2",
pages = "207-222",
month = "June",
year = "2013",
}
@article{MJCFO13jamia,
author = "N. Mohammed and X. Jiang and R. Chen and B. C. M. Fung and L. Ohno-Machado",
title = "Privacy-preserving
heterogeneous health data sharing",
journal = "Journal of the American Medical Informatics Association (JAMIA)",
volume = "20",
number = "3",
pages = "462-469",
month = "May",
year = "2013",
}
@article{CFMDW13ins,
author = "R. Chen and B. C. M. Fung and N. Mohammed and B. C. Desai",
title = "Privacy-preserving trajectory data publishing by local suppression",
journal = "Information
Sciences: Special Issue on Data Mining for Information Security",
volume = "231",
pages = "83-97",
month = "May",
year = "2013",
}
@article{IBFD13ins,
author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
title = "A unified data mining solution for authorship analysis in anonymous textual communications",
journal = "Information
Sciences: Special Issue on Data Mining for Information Security",
volume = "231",
pages = "98-112",
month = "May",
year = "2013",
}
@article{FTHXAD12tsc,
author = "B. C. M. Fung and T. Trojer and P. C. K. Hung and L. Xiong and K. Al-Hussaeni and R. Dssouli",
title = "Service-oriented
architecture for high-dimensional private data mashup",
journal = "IEEE Transactions on Services Computing (TSC)",
volume = "5",
number = "3",
pages = "373-386",
month = "July-September",
year = "2012",
}
@article{YHFZ12enb,
author = "Z. Yu and F. Haghighat and B. C. M. Fung and
L. Zhou",
title = "A novel methodology for
knowledge discovery through mining associations between building operational
data",
journal = "Energy and Buildings",
volume = "47",
number = "",
pages = "430-440",
month = "April",
year = "2012",
}
@article{AFYF12diin,
author = "R. Al-Zaidy and B. C. M. Fung
and A. M. Youssef and F. Fortin",
title = "Mining criminal networks from unstructured text documents",
journal = "Digital Investigation
(DIIN)",
volume = "8",
number = "3-4",
pages = "147-160",
month = "February",
year = "2012",
}
@article{YHFMY11egy,
author = "Z. Yu and F. Haghighat
and B. C. M. Fung and E. Morofsky and H. Yoshino",
title = "A methodology for
identifying and improving occupant behavior in residential buildings",
journal = "Energy",
volume = "36",
number = "11",
pages = "6596-6608",
month = "November",
year = "2011",
}
@article{MFD11vldbj,
author = "N. Mohammed and B. C. M. Fung and
M. Debbabi",
title = "Anonymity meets game
theory: secure data integration with malicious participants",
journal = "Very Large Data Bases Journal (VLDBJ)",
volume = "20",
number = "4",
pages = "567-588",
month = "August",
year = "2011",
}
@article{CMFDX11vldb,
author = "R. Chen and N. Mohammed
and B. C. M. Fung and B. C. Desai and L. Xiong",
title = "Publishing Set-Valued
Data via Differential Privacy",
journal = "The Proceedings of the VLDB Endowment (PVLDB)",
volume = "4",
number = "11",
pages = "1087-1098",
month = "August",
year = "2011",
}
@article{YFHYM11enb,
author = "Z. Yu and B. C. M. Fung and F. Haghighat and H. Yoshino and E. Morofsky",
title = "A systematic procedure to
study the influence of occupant behavior on building energy consumption",
journal = "Energy and Buildings",
volume = "43",
number = "6",
pages = "1409-1417",
month = "June",
year = "2011",
}
@article{MFHL10tkdd,
author = "N. Mohammed and B. C. M. Fung and
P. C. K. Hung and C. Lee",
title = "Centralized and distributed anonymization for high-dimensional
healthcare data",
journal = "ACM Transactions on Knowledge Discovery from Data (TKDD)",
volume = "4",
number = "4",
pages = "18:1--18:33",
articleno = "18",
month = "October",
year = "2010",
}
@article{IBFD10di,
author = "F. Iqbal and H.
Binsalleeh and
B. C. M. Fung and M. Debbabi",
title = "Mining writeprints
from anonymous e-mails for forensic investigation",
journal = "Digital Investigation",
volume = "7",
number = "1-2",
pages = "56-64",
month = "October",
year = "2010",
}
@article{YHFY10enb,
author = "Z. Yu and F. Haghighat and B. C. M. Fung and H. Yoshino",
title = "A decision tree method for
building energy demand modeling",
journal = "Energy and Buildings",
volume = "42",
number = "10",
pages = "1637-1646",
month = "October",
year = "2010",
}
@article{FWCY10csur,
author = "B. C. M. Fung and K. Wang
and R. Chen and P. S. Yu",
title = "Privacy-Preserving Data Publishing: A Survey
of Recent Developments",
journal = "ACM Computing Surveys",
volume = "42",
number = "4",
pages = "14:1-14:53",
articleno = "14",
month = "June",
year = "2010",
}
@article{FWWH09dke,
author = "B. C. M. Fung and K. Wang
and L. Wang and P. C. K. Hung",
title = "Privacy-Preserving Data Publishing for Cluster Analysis",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "68",
number = "6",
pages = "552-575",
month = "June",
year = "2009",
}
@article{IHFD08di,
author = "F. Iqbal and R. Hadjidj and
B. C. M. Fung and M. Debbabi",
title = "A Novel Approach of Mining
Write-Prints for Authorship Attribution in E-mail Forensics",
journal = "Digital Investigation",
volume = "5",
number = "1",
pages = "S42-S51",
month = "September",
year = "2008",
}
@article{FWY07tkde,
author = "B. C. M.
Fung and Ke Wang and P. S. Yu",
title = "Anonymizing
Classification Data for Privacy Preservation",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "19",
number = "5",
pages = "711--725",
month = "May",
year = "2007",
}
@article{WFY07kais,
author = "K. Wang and B. C. M.
Fung and P. S. Yu",
title = "Handicapping Attacker's
Confidence: An Alternative to k-Anonymization",
journal = "Knowledge and Information
Systems (KAIS)",
volume = "11",
number = "3",
pages = "345--368",
month = "April",
year = "2007",
}
Refereed Conference Papers
@inproceedings{YCFP21sdm,
author = "K.
Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling",
booktitle = "Proc. of the 21st SIAM International Conference on Data Mining (SDM)",
pages = "",
address = "Alexandria, VA",
month = "May",
year = "2021",
publisher = "SIAM",
}
@inproceedings{LFC20dsaa,
author = "J. Lu and B. C. M. Fung and
W. K. Cheung",
title = "Embedding for Anomaly Detection on Health Insurance Claims",
booktitle = "Proc. of the
7th IEEE International Conference on Data Science and Advanced Analytics (DSAA)",
pages = "459-468",
address = "Sydney,
Australia",
month = "October",
year = "2020",
publisher = "IEEE",
}
@inproceedings{SCYCFP19ijcai,
author = "L. Song and C. W. Cheong and K. Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Medical Concept Embedding with Multiple Ontological Representations",
booktitle = "Proc. of the
28th International Joint Conference on Artificial Intelligence (IJCAI)",
pages = "4613-4619",
address = "Macao,
China",
month = "August",
year = "2019",
publisher = "",
}
@inproceedings{DFC19sp,
author = "S. H. H. Ding and B. C. M. Fung and
P. Charland",
title = "Asm2Vec:
Boosting Static Representation Robustness for Binary Clone Search
against Code Obfuscation and Compiler Optimization",
booktitle = "Proc. of the
40th International Symposium on Security and Privacy (S\&P)",
pages = "38-55",
address = "San
Francisco, CA",
month = "May",
year = "2019",
publisher = "IEEE Computer
Society",
}
@inproceedings{YQCFP19aaai,
author = "K. Yin and D. Qian and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Learning
Phenotypes and Dynamic Patient Representations via RNN Regularized
Collective Non-negative Tensor Factorization",
booktitle = "Proc. of the
33rd AAAI Conference on Artificial Intelligence (AAAI)",
pages = "",
address = "Honolulu,
HI",
month = "January",
year = "2019",
publisher = "",
}
@inproceedings{YCLFP18ijcai,
author = "K. Yin
and W. K. Cheung and Y. Liu and B. C. M. Fung and J. Poon",
title = "Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization",
booktitle = "Proc. of the 27th International Joint Conference on Artificial Intelligence (IJCAI)",
pages = "3627-3633",
address = "Stockholm, Sweden",
month = "July",
year = "2018",
publisher = "",
}
@inproceedings{HKIMRPHF16compIMAGE,
author = "P. C. K. Hung
and K. Kanev and F. Iqbal and D. Mettrick and L. Rafferty and G.-P. Pan and S.-C. Huang and B. C. M. Fung",
title = "A Study of Children Facial Recognition for Privacy in Smart TV",
booktitle = "Proc. of the International Symposium on Computational Modeling of Objects Represented in Images (CompIMAGE),
LNCS 10149",
pages = "229-240",
address = "Niagara Falls,
NY",
month = "September",
year = "2016",
publisher = "Springer",
}
@inproceedings{DFC16kdd,
author = "S. H. H. Ding and B. C.
M. Fung and P. Charland",
title = "Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering",
booktitle = "Proc. of the
22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "461-470",
address = "San Francisco,
CA",
month = "August",
year = "2016",
publisher = "ACM Press",
}
@inproceedings{BDDFOU16ideas,
author = "M. Bonenfant
and B. C. Deasi and D. Desai and B. C. M. Fung and M. T. Özsu and J. D. Ullman",
title = "Panel: The State of Data",
booktitle = "Proc. of the
20th International Database Engineering & Applications Symposium (IDEAS)",
pages = "2-11",
address = "Montreal, Canada",
month = "July",
year = "2016",
publisher = "ACM Press",
}
@inproceedings{DFAF15icpads,
author = "G. G. Dagher and F. Iqbal and M. Arafati and B. C. M. Fung",
title = "Fusion: Privacy-preserving Distributed Protocol for High-Dimensional Data Mashup",
booktitle = "Proc. of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS)",
pages = "760-769",
address = "Melbourne, Australia",
month = "December",
year = "2015",
publisher = "IEEE Computer
Society",
}
@inproceedings{LLXF15dawak,
author = "J. Liu and J. Li and S. Xu and B. C. M. Fung",
title = "Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption",
booktitle = "Proc. of the 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWak),
volume = "LNCS 9263",
pages = "70-81",
address = "València, Spain",
month = "September",
year = "2015",
publisher = "Springer",
}
@inproceedings{LWZFCY15dexa,
author = "J. Liu
and Y. Wu and Q. Zhou and B. C. M. Fung and F. Chen and B. Yu",
title = "Parallel
Eclat for Opportunities Mining of Frequent Itemsets",
booktitle = "Proc. of the 26th International Conference on Database and Expert Systems Applications (DEXA),
volume = "LNCS 9261",
pages = "401-405",
address = "València, Spain",
month = "September",
year = "2015",
publisher = "Springer",
}
@inproceedings{ADFH14cloud,
author = "M. Arafati
and G. G. Dagher and B. C. M. Fung and P. C. K. Hung",
title = "D-Mash: A Framework for
Privacy-Preserving Data-as-a-Service Mashups",
booktitle = "Proc. of
the 8th IEEE International Conference on Cloud Computing (CLOUD)",
pages = "495-505",
address = "Anchorage,
AK",
month = "June",
year = "2014",
publisher = "IEEE Computer
Society",
}
@inproceedings{FFCD14sere,
author = "M. R. Farhadi and B. C. M.
Fung and P. Charland and M. Debbabi",
title = "BinClone: Detecting
Code Clones in Malware ",
booktitle = "Proc. of
the 8th IEEE International Conference on Software Security and Reliability
(SERE)",
pages = "78-87",
address = "San Francisco, CA",
month = "June",
year = "2014",
publisher = "IEEE Reliability
Society",
}
@inproceedings{HFI14ntms,
author = "A. K.
Hmood and B. C. M. Fung and F. Iqbal",
title = "Privacy-Preserving
Medical Reports
Publishing for Cluster
Analysis",
booktitle = "Proc. of
the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS)",
pages = "1-8",
address = "Dubai,
UAE",
month = "March",
year = "2014",
publisher = "IEEE Computer
Society",
}
@inproceedings{FJL13asonam,
author = "B.
C. M. Fung and Y. Jin and J. Li",
title = "Preserving
Privacy and Frequent Sharing Patterns for
Social Network Data Publishing",
booktitle = "Proc. of
the 5th IEEE/ACM International Conference on Social Networks Analysis and
Mining (ASONAM)",
pages = "479-485",
address = "Niagara Falls, Canada",
month = "August",
year = "2013",
publisher = "IEEE Computer
Society",
}
@inproceedings{LWF12icdm,
author = "J. Liu and K. Wang and B.
C. M. Fung",
title = "Direct
Discovery of High Utility Itemsets without Candidate Generation",
booktitle = "Proc. of the
12th IEEE
International Conference on Data Mining (ICDM)",
pages = "984-989",
address = "Brussels,
Belgium",
month = "December",
year = "2012",
publisher = "IEEE Computer
Society",
}
@inproceedings{IFD12wi,
author = "F. Iqbal and B. C.
M. Fung and M. Debbabi",
title = "Mining Criminal
Networks from Chat Logs",
booktitle = "Proc. of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT)",
pages = "332-337",
address = "Macau",
month = "December",
year = "2012",
publisher = "IEEE Computer
Society",
}
@inproceedings{BXCF12cikm,
author = "L. Bonomi and L. Xiong
and R. Chen and B. C.
M. Fung",
title = "Frequent
grams based Embedding for Privacy Preserving Record Linkage",
booktitle = "Proc.
of the 21st ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1597-1601",
address = "Maui, HI",
month = "October",
year = "2012",
publisher = "ACM Press",
}
@inproceedings{CFF12ist,
author = "P.
Charland and B.
C. M. Fung and M. R. Farhadi",
title = "Clone
Search for Malicious Code Correlation",
booktitle = "Proc. of the NATO RTO Symposium on Information Assurance and Cyber Defense (IST-111)",
pages = "1.1-1.12",
address = "Koblenz, Germany",
month = "September",
year = "2012",
}
@inproceedings{CFDS12kdd,
author = "R. Chen and B. C. M. Fung and B. C. Desai and N. M. Sossou",
title = "Differentially
Private Transit Data Publication: A Case Study on the Montreal
Transportation System",
booktitle = "Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "213-221",
address = "Beijing,
China",
month = "August",
year = "2012",
publisher = "ACM Press",
}
@inproceedings{AMFD12pets,
author = "D. Alhadidi and N. Mohammed
and B. C. M. Fung and M. Debbabi",
title = "Secure
Distributed Framework for Achieving ε-Differential Privacy",
booktitle = "Proc.
of the 12th Privacy Enhancing Technologies Symposium (PETS)",
volume = "LNCS 7384",
pages = "120-139",
address = "Vigo,
Spain",
month = "July",
year = "2012",
publisher = "Springer-Verlag",
}
@inproceedings{AF11csc,
author = "H. AbuSharkh and B. C. M. Fung",
title = "Service-Oriented Architecture for Sharing Private Spatial-Temporal Data",
booktitle = "Proc. of the IEEE International Conference on Cloud and Service Computing (CSC)",
pages = "40-47",
address = "Hong Kong",
month = "December",
year = "2011",
publisher = "IEEE
Computer Society",
}
@inproceedings{GXF11collaboratecom,
author = "S. Goryczka and L. Xiong and B. C. M. Fung",
title = "$m$-privacy for collaborative data publishing",
booktitle = "Proc. of the 7th IEEE International Conference on Collaborative Computing (CollaborateCom)",
pages = "",
address = "Orlando, FL",
month = "October",
year = "2011",
publisher = "",
}
@inproceedings{MCFY11kdd,
author = "N.
Mohammed and R. Chen and B. C. M. Fung and P. S. Yu",
title = "Differentially Private
Data Release for Data Mining",
booktitle = "Proc. of the
17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "493-501",
address = "San Diego, CA",
month = "August",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{CF11rfid,
author = "R. Chen and B. C. M. Fung",
title = "A Unified RFID Data
Anonymization Platform",
booktitle = "Proc. of the
5th International Conference on RFID",
pages = "95-96",
address = "Orlando, FL",
month = "April",
year = "2011",
publisher = "IEEE Communications
Society",
}
@inproceedings{AFY11sac,
author = "R. Al-Zaidy and B. C. M. Fung and A. M. Youssef",
title = "Towards Discovering Criminal Communities
from Textual Data",
booktitle = "Proc. of the
26th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "172-177",
address = "TaiChung, Taiwan",
month = "March",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{RNDF11sac,
author = "S. Ray and M. F. Nizam
and S. Das and B. C. M. Fung",
title = "Verification of data pattern for interactive privacy preservation model",
booktitle = "Proc. of the
26th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1716-1723",
address = "TaiChung, Taiwan",
month = "March",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{SXF10cikm,
author = "P. Shi and L. Xiong and B. C.
M. Fung",
title = "Anonymizing
Data with Quasi-Sensitive Attribute Values",
booktitle = "Proc.
of the 19th ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1389-1392",
address = "Toronto, Canada",
month = "October",
year = "2010",
publisher = "ACM Press",
}
@inproceedings{IKFD10sac,
author = "F. Iqbal and L. A.
Khan and B. C. M. Fung and M. Debbabi",
title = "E-mail Authorship
Verification for Forensic Investigation",
booktitle = "Proc. of the
25th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1591-1598",
address = "Sierre, Switzerland",
month = "March",
year = "2010",
publisher = "ACM Press",
}
@inproceedings{BMSAF09iit,
author = "H. Binsalleeh and N.
Mohammed and P. S. Sandhu and F. Aljumah and B. C. M. Fung",
title = "Using {RFID} tags to improve
pilgrimage management",
booktitle = "Proc. of the 6th IEEE
International Conference on Innovations in Information Technology
(Innovations)",
pages = "1-5",
address = "Al Ain, United Arab
Emirates",
month = "December",
year = "2009",
publisher = "IEEE Communications
Society",
}
@inproceedings{MFD09cikm,
author = "N. Mohammed and B. C.
M. Fung and M. Debbabi",
title = "Walking
in the Crowd: Anonymizing Trajectory Data for Pattern Analysis",
booktitle = "Proc.
of the 18th ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1441-1444",
address = "Hong Kong",
month = "November",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{TFH09icws,
author = "T. Trojer and B. C. M.
Fung and P. C. K. Hung",
title = "Service-Oriented
Architecture for Privacy-Preserving Data Mashup",
booktitle = "Proc. of the
7th IEEE International Conference on Web Services (ICWS)",
pages = "767-774",
address = "Los Angeles, CA",
month = "July",
year = "2009",
publisher = "IEEE Computer
Society Press",
}
@inproceedings{MFHL09kdd,
author = "N. Mohammed and B. C.
M. Fung and P. C. K. Hung and C. Lee",
title = "Anonymizing Healthcare
Data: A Case Study on the Blood Transfusion Service",
booktitle = "Proc. of the
15th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining (SIGKDD)",
pages = "1285-1294",
address = "Paris, France",
month = "June",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{WWF09icc,
author = "Y. Wang and L. Wang and B. C. M.
Fung",
title = "Preserving
Privacy for Location-Based Services with Continuous Queries",
booktitle = "Proc. of the
12th International Conference on Communications (ICC)",
pages = "1-5",
address = "Dresden, Germany",
month = "June",
year = "2009",
publisher = "IEEE Press",
}
@inproceedings{SSSF09c3s2e,
author = "J. Singh
and Q. Shi and H. Sandhu
and B. C. M. Fung",
title = "Anonymizing
location-based data",
booktitle = "Proc. of the
2009 C3S2E",
pages = "27-33",
address = "Montreal, Canada",
month = "May",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{FAC09rfid,
author = "B. C. M.
Fung and K. Al-Hussaeni and M. Cao",
title = "Preserving {RFID} Data
Privacy",
booktitle = "Proc. of the
2009 International Conference on RFID",
address = "Orlando, FL",
pages = "200-207",
month = "April",
year = "2009",
publisher = "IEEE Communications
Society",
}
@inproceedings{MFWH09edbt,
author = "N. Mohammed and B. C. M.
Fung and K. Wang and P. C. K. Hung",
title = "Privacy-Preserving
Data Mashup",
booktitle = "Proc. of the
12th International Conference on Extending Database
Technology (EDBT)",
pages = "228-239",
address = "Saint-Petersburg,
Russia",
month = "March",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{FCDX09sac,
author = "B. C. M. Fung and M.
Cao and B. C. Desai and H. Xu",
title = "Privacy Protection for
{RFID} Data",
booktitle = "Proc. of the
24th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1528-1535",
address = "Honolulu, HI",
month = "March",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{XFWFP08icdm,
author = "Y. Xu and B. C. M. Fung and
K. Wang and A. W. C. Fu and J. Pei",
title = "Publishing sensitive
transactions for itemset utility",
booktitle = "Proc. of the 8th IEEE
International Conference on Data Mining (ICDM)",
pages = "1109-1114",
month = "December",
year = "2008",
address = "Pisa, Italy",
publisher = "IEEE Computer Society",
}
@inproceedings{ZFMC08fskd,
author = "Y. Zhu and B. C. M.
Fung and D. Mu and Y. Li",
title = "An Efficient Hybrid
Document Clustering Method",
booktitle = "Proc. of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)",
address = "Jinan, China",
month = "August",
year = "2008",
volume = "2",
pages = "395-399",
}
@inproceedings{FWWD08isi,
author = "B. C. M. Fung and
K. Wang and L. Wang and M. Debbabi",
title = "A Framework for
Privacy-Preserving Cluster Analysis",
booktitle = "Proc. of the 2008 IEEE International Conference on
Intelligence and Security Informatics (ISI 2008)",
volume = "2",
pages = "395-399",
address = "Taipei, Taiwan",
month = "June",
year = "2008",
}
@inproceedings{FWFP08edbt,
author = "B. C. M.
Fung and K. Wang and A. W. C. Fu and J. Pei",
title = "Anonymity for Continuous Data Publishing",
booktitle = "Proc. of the
11th International Conference on Extending Database
Technology (EDBT)",
address = "Nantes,
France",
pages = "264--275",
month = "March",
year = "2008",
publisher = "ACM Press",
}
@inproceedings{ZDFM06paclic,
author = "Y. H. Zhu and G. Z.
Dai and B. C. M. Fung and D. J. Mu",
title = "Document Clustering
Method based on Frequent Co-Occurring Words",
booktitle = "Proc. of the
20th Pacific Asia Conference on Language, Information and Computation (PACLIC)",
address = "Wuhan, China",
pages = "442--445",
month = "November",
year = "2006",
}
@inproceedings{WF06kdd,
author = "K. Wang and B. C. M.
Fung",
title = "Anonymizing Sequential
Releases",
booktitle = "Proc. of the 12th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)",
address = "Philadelphia, PA",
pages = "414--423",
month = "August",
year = "2006",
publisher = "ACM Press",
}
@inproceedings{WFY05icdm,
author = "K. Wang and B. C. M.
Fung and P. S. Yu",
title = "Template-Based Privacy
Preservation in Classification Problems",
booktitle = "Proc. of the 5th IEEE International Conference on
Data Mining (ICDM)",
address = "Houston, TX",
pages = "466--473",
month = "November",
year = "2005",
publisher = "IEEE Computer Society",
}
@inproceedings{WFD05isi,
author = "K. Wang and B. C. M. Fung and
G. Dong",
title = "Integrating Private
Databases for Data Analysis",
booktitle = "Proc. of the 2005 IEEE International Conference on
Intelligence and Security Informatics (ISI)",
series = "Lecture Notes in Computer
Science",
volume = "3495",
pages = "171--182",
address = "Atlanta, GA",
month = "May",
year = "2005",
publisher = "Springer-Verlag",
}
@inproceedings{FWY05icde,
author = "B. C. M. Fung and K. Wang and
P. S. Yu",
title = "Top-Down Specialization for Information and Privacy
Preservation",
booktitle = "Proc. of the 21st IEEE International Conference on Data
Engineering (ICDE)",
pages = "205--216",
address = "Tokyo, Japan",
month = "April",
year = "2005",
publisher = "IEEE Computer Society",
}
@inproceedings{FWE03sdm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "Hierarchical Document Clustering Using Frequent Itemsets",
booktitle = "Proc. of the 3rd SIAM International Conference on Data
Mining (SDM)",
pages = "59--70",
address = "San Francisco, CA",
month = "May",
year = "2003",
publisher = "SIAM",
}
Books
@book{IDF20book,
AUTHOR = "F. Iqbal and M. Debbabi and B. C. M. Fung",
TITLE = "Machine Learning for Authorship Attribution and Cyber Forensics",
PUBLISHER = "Springer Nature",
YEAR = "2020",
series = "Computer Entertainment and Media Technology",
month = "December",
isbn = "9783030616748",
}
@book{FWFY10book,
AUTHOR = "B. C. M. Fung and K. Wang and A. W.-C. Fu and P. S. Yu",
TITLE = "Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques",
PUBLISHER = "Chapman \& Hall/CRC",
YEAR = "2010",
series = "Data Mining and Knowledge Discovery",
month = "August",
isbn = "9781420091489",
}
Refereed Book Chapters
@inbook{AFinpress,
author = "K. Al-Hussaeni and B. C. M. Fung",
title = "Encyclopedia of Cryptography, Security and Privacy",
chapter = "(X,Y)-Privacy",
pages = "",
publisher = "Springer",
editor = "H. C. A. van Tilborg
and S. Jajodia, Sushil",
month = "",
year = "in press",
}
@inbook{FJL15lnsn,
author = "B. C. M. Fung
and Y. Jin and J. Li and J. Liu",
title = "Recommendation and Search in Social Networks",
chapter = "Anonymizing social network data for maximal frequent-sharing pattern mining",
pages = "77-100",
publisher = "Springer",
editor = "Alhajj, R., Glässer,
U.",
month = "February",
year = "2015",
}
@inbook{TLFNH10pakd,
author = "T. Trojer and C. K.
Lee and B. C. M. Fung and L. Narupiyakul and P. C. K. Hung",
title = "Privacy-Aware Knowledge
Discovery: Novel Applications and New Techniques",
chapter = "Privacy-aware health
information sharing",
pages = "315-349",
publisher = "Chapman & Hall/CRC",
editor = "Bonchi, F. and
Ferrari, E.",
month = "December",
year = "2010",
}
@inbook{FWE08dwm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "The Encyclopedia of
Data Warehousing and Mining",
chapter = "Hierarchical Document
Clustering",
pages = "970-975",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Wang, J.",
month = "August",
year = "2008",
}
@inbook{Fung07pta,
author = "B. C. M. Fung",
title = "The Encyclopedia of
Portal Technology and Applications",
chapter = "Privacy-Preserving
Data Portals",
pages = "842--847",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Tatnall, A.",
month = "June",
year = "2007",
volume = "2",
}
@inbook{FWE05dwm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "The Encyclopedia of
Data Warehousing and Mining",
chapter = "Hierarchical Document
Clustering",
pages = "555--559",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Wang, J.",
month = "July",
year = "2005",
}
Edited Books and Journal Special Issues
@incollection{BGAWF20jpdc,
editor = "T. Baker and Z. Guo and A. I. Awad and S. Wang and B. C. M. Fung",
title = "Special Issue on Enabling Technologies for Energy Cloud",
journal = "Journal of Parallel and Distributed Computing (JPDC)",
publisher = "Elsevier",
month = "September",
year = "2020",
}
@incollection{BFSP20scs,
editor = "T. Baker and B. C. M. Fung
and M. Sheng and R. Prodan",
title = "Special Issue on Enabling Technologies and Tools for Next Generation Internet Security (Enabling-NxtG-Inter-Sec)",
journal = "Sustainable Cities
and Society (SCS)",
publisher = "Elsevier",
month = "July",
year = "2020",
}
@incollection{IHF20ijdcf,
editor = "F. Iqbal and P. C. K. Hung and B. C. M. Fung",
title = "Special Issue on Cybercrime Investigation and Digital Forensics",
journal = "The International Journal of Digital Crime and Forensics (IJDCF)",
publisher = "Elsevier",
volume = "12",
issue = "1",
year = "2020",
}
@book{GRFW18book,
EDITOR = "M. Ganji and L. Rashidi and B. C. M. Fung and C. Wang",
TITLE = "Trends and Applications
in Knowledge Discovery and Data Mining (Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2018 Workshops)",
PUBLISHER = "Springer",
YEAR = "2018",
series = "Lecture Notes in
Computer Science (LNCS) and Lecture Notes in Artificial Intelligence (LNAI)
11544",
month = "June",
isbn = "9783030045029",
}
@incollection{FIA18scs,
editor = "B. C. M. Fung and F. Iqbal and
A. Ahmad",
title = "Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society",
journal = "Sustainable Cities and Society
(SCS)",
publisher = "Elsevier",
volume = "38",
month = "April",
year = "2018",
}
@incollection{AFFGJ18scs,
editor = "A. Ahmad and B. C. M. Fung
and Y. Fang and L. Gallo and G. Jeon",
title = "Special Issue on Role of Big Data Analytics in a Sustainable Smart City",
journal = "Sustainable Cities and Society
(SCS)",
publisher = "Elsevier",
volume = "38",
month = "April",
year = "2018",
}
@incollection{SFC15fi,
editor = "D. Ślęzak and B. C. M. Fung
and W. K. Cheung",
title = "Special Issue on Domain Knowledge in Knowledge Discovery and Privacy-Aware Intelligent Systems",
journal = "Fundamenta Informaticae",
publisher = "IOS Press",
volume = "137",
number = "2",
pages = "171-304",
month = "March",
year = "2015",
}
@incollection{ZKRFK13advei,
editor = "Y. Zeng
and K.-Y. Kim and V. Raskin and B. C. M. Fung and Y. Kitamura",
title = "Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems",
journal = "Advanced
Engineering Informatics (ADVEI)",
publisher = "Elsevier",
volume = "27",
number = "1",
month = "January",
year = "2013",
}
Refereed Tutorial Papers
@inproceedings{GFLKH15ase,
author = "L. Guerrouj and B. C. M. Fung and D. Lo and F. Khomh and A. Hamou-Lhadj",
title = "Mining Textual Data for Software Engineering
Tasks",
booktitle = "Proc. of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
pages = "5 pages",
address = "Lincoln, NB",
month = "November",
year = "2015",
publisher = "IEEE
Computer Society",
}
Presentations, Posters and Abstracts
@inbook{Fung20FakeNews,
author = "B. C. M. Fung"
title = "Navigating Fake News, Alternative Facts, and Misinformation in a Post-Truth World",
chapter = "Forward",
pages = "xv--xvi",
publisher = "IGI Global",
editor = "Dalkir, K. and Katz,
R.",
month = "February",
year = "2020",
}
@inproceedings{PHLBRNRRLFSDBGSGSD19napcrg,
author = "P. Pluye
and Q. N. Hong and M.-L. Laroche and Q. Bao and T. Rios and J.-Y. Nie and A. G. Reyes
and S. Rahimi and M. Li and B. C. M. Fung and R. El Sherif and M. Di Carlo
and M. Benigeri and R. Grad and A. Soliman and V. Granikov and R. Souto and M. Dawes",
title = "Evidence-based artificial intelligence in primary care: Development of the Patient Oriented Machine Learning Appraisal Tool",
booktitle = "the 47th North American Primary Care Research Group (NAPCRG) Annual Meeting",
address = "Toronto, Canada",
month = "November",
year = "2019",
}
@unpublished{BLLLLWFW19douglas,
author = "D. Bian and T. Lin and K. Y. K. Liu and D. Liu and A. Larosa and A. S. Wong and B. C. M. Fung and T. P. Wong",
title = "An Accurate and Markerless Tracking of Multiple Mice Using the Deep Learning Program DeepLabCut",
note = "Poster Presentation in the Undergraduate Research Expo of the Douglas Institute Research Centre",
address = "Montreal,
Canada",
month = "August",
year = "2019",
}
@unpublished{AIF18autodesk,
author = "M. H. Altakrori and F. Iqbal and B. C. M. Fung",
title = "Arabic Authorship Attribution: An Extensive Study on Twitter Posts",
note = "Poster Session of the Deep Learning Montreal at AutoDesk Canada",
address = "Montreal, Canada",
month = "March",
year = "2018",
}
@inproceedings{FMBF17gardeso,
author = "F. Fortin and S. Meloche and R. Bhateja and B. C. M. Fung",
title = "Prédire la menace grâce au machine learning: étude de cas",
booktitle = "Colloque GARDESO",
address = "Montreal, Canada",
month = "June",
year = "2017",
}
@inproceedings{RF16eof,
author = "O. Rahman and B. C. M. Fung",
title = "A
Cross-cultural Perspective on Fashion Selection and Consumption",
booktitle = "Proc. of of The End of Fashion: an international conference and exhibition",
pages = "",
address = "Wellington, New Zealand",
month = "December",
year = "2016",
}
@unpublished{DFC16serene-risc,
author = "S. H. H. Ding and B. C.
M. Fung and P. Charland",
title = "Kam1n0: Simplifying Reverse Engineering of Software for Security Analysis",
note = "Poster Session of the Smart Cybersecurity Network (SERENE-RISC) Workshop",
address = "Ottawa,
ON",
month = "October",
year = "2016",
}
Magazine Articles
@article{F18wef,
author = "B. C. M.
Fung",
title = "Cyber Security",
editor = "J. Letzing",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-9",
month = "May",
year = "2018",
}
@article{KF17wef,
author = "K. Kolody and B. C. M.
Fung",
title = "Cyber Security:
Technology and the Law, and Cybercrime",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-4",
month = "April",
year = "2017",
}
@article{BF16wef,
author = "T. Braun and B. C. M.
Fung",
title = "Cyber Security: Cyber
War, Critical Infrastructure Protection, Privacy, System Risk and
Resilience, New Norms of Collaboration, Cybercrime, and Security of Things",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-14",
month = "June",
year = "2016",
}
@article{MF13pentest,
author = "N. Mohammed and B. C. M.
Fung",
title = "Privacy-preserving Data
Publishing",
journal = "Pentest Magazine:
Pester's Development Kit",
volume = "3",
number = "5",
pages = "16-22",
month = "August",
year = "2013",
}
Copyrighted Work
@unpublished{PFNS18copyright,
author = "P. Pierre and B. C. M. Fung and J.-Y. Nie and T. Schuster",
title = "Patient Oriented Machine Learning Appraisal Tool (POMLAT)",
year = "2018",
month = "December",
note = "Registration of Copyright (#1155590)",
source = "Canadian Intellectual Property Office, Industry Canada",
}
Technical Reports
@TECHREPORT{LDF20adrdc,
author = "M. Q. Li and S. H. H. Ding and B. C. M. Fung",
title = "Assembly code data
mining: data mining techniques design and prototyping & functionality design and prototyping",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA05)",
}
@TECHREPORT{DLF20bdrdc,
author = "S. H. H. Ding and M.
Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: plug-in development",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA04)",
}
@TECHREPORT{DLF20adrdc,
author = "S. H. H. Ding and M.
Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: functionality design and prototyping & security product evaluation",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA03)",
}
@TECHREPORT{LAF20M2ideas,
author = "M. Q. Li and A. Abusitta and B. C. M. Fung",
title = "AI-powered Assembly Code Analytics for
Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2020",
number = "W7714-207117 (Milestone
2)",
}
@TECHREPORT{ALF19M1ideas,
author = "A.
Abusitta and M. Q. Li and B. C. M. Fung",
title = "AI-powered Assembly Code Analytics for
Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "October",
year = "2019",
number = "W7714-207117 (Milestone 1)",
}
@TECHREPORT{LDF1903bdrdc,
author = "M.
Q. Li and S. H. H.
Ding and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping & security product evaluation",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2019",
number = "W7701-176483
(TA02)",
}
@TECHREPORT{LDF1903adrdc,
author = "M.
Q. Li and S. H. H.
Ding and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2019",
number = "W7701-176483
(TA01)",
}
@TECHREPORT{DLF1803drdc,
author = "S. H. H.
Ding and M. Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping (part 7)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2018",
number = "W7701-155902/001/QCL
(TA07)",
}
@TECHREPORT{DFLF1801drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. Q. Li and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 6)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2018",
number = "W7701-155902/001/QCL
(TA06)",
}
@TECHREPORT{TF17mcalear,
author = "D.
Tweed and B. C. M. Fung",
title = "Demonstration of a Secure
Credential Transfer Protocol",
institution = "McAlear
Management Inc.",
month = "February",
year = "2017",
}
@TECHREPORT{DFF1702drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 5)",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2017",
number = "W7701-155902/001/QCL
(TA05)",
}
@TECHREPORT{DFF1701drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 4)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2017",
number = "W7701-155902/001/QCL
(TA04)",
}
@TECHREPORT{DFZ1603drdc,
author = "S. H. H.
Ding and B. C. M. Fung and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 3)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2016",
number = "W7701-155902/001/QCL
(TA02)",
}
@TECHREPORT{DFZ1602drdc,
author = "S. H. H.
Ding and B. C. M. Fung and K. Zhao",
title = "Assembly code data
mining: porting to other platforms",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2016",
number = "W7701-155902/001/QCL
(TA03)",
}
@TECHREPORT{FDZ1601drdc,
author = "B. C. M. Fung and S. H. H.
Ding and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 2)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2016",
number = "W7701-155902/001/QCL
(TA01)",
}
@TECHREPORT{FDFZ15drdc,
author = "B. C. M. Fung
and S. H. H. Ding and M. R. Farhadi and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 1)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2015",
number = "W7701-155902/001/QCL
(Firm Portion)",
}
@TECHREPORT{FFPD14drdc,
author = "M. R. Farhadi and B. C. M. Fung
and S. Preda and M. Debbabi",
title = "Progress update on the
implementation of assembly code clone detection systems",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2014",
}
@TECHREPORT{FFF13drdc,
author = "Y. B. Fung and M. R. Farhadi
and B. C. M. Fung",
title = "Semantic code clone
search",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2013",
}
@TECHREPORT{FFD12drdc,
author = "B. C. M. Fung and M. R. Farhadi and
M. Debbabi",
title = "Assembly code clone
search",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2012",
}
@TECHREPORT{FOBFD11drdc,
author = "B. C. M. Fung and T. Ormerod
and A. Boukhetouta and M. R. Farhadi and
M. Debbabi",
title = "A survey of assembly
code analysis techniques",
institution = "Defence Research
and Development Canada",
month = "September",
year = "2011",
}
@TECHREPORT{MFD10tr,
author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
title = "Preserving Privacy and Utility in {RFID} Data Publishing",
institution = "Concordia University",
year = "2010",
month = "October",
address = "Montreal, QC, Canada",
number = "6850",
}
Thesis
@phdthesis{Fung07thesis,
author = "B. C. M. Fung",
title = "Privacy-Preserving Data
Publishing",
school = "Simon Fraser University",
year = "2007",
address = "Burnaby, BC, Canada",
month = "May",
}
@masterthesis{Fung02thesis,
author = "B. C. M. Fung",
title = "Hierarchical document clustering using frequent itemsets",
school = "Simon Fraser University",
year = "2002",
address = "Burnaby, BC, Canada",
month = "September",
}