Menu:

Book

@book{FWFY10book,
        AUTHOR = "B. C. M. Fung and K. Wang and A. W.-C. Fu and P. S. Yu",
        TITLE = "Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques",
        PUBLISHER = "Chapman \& Hall/CRC",
        YEAR = "2010",
        series = "Data Mining and Knowledge Discovery",
        month = "August",
        isbn = "9781420091489",
}

Refereed Journal Articles

@article{DFIC18cyb,
        author = "S. H. H. Ding and B. C. M. Fung and F. Iqbal and W. K. Cheung",
        title = "Learning Stylometric Representations for Authorship Analysis",
        journal = "IEEE Transactions on Cybernetics (CYB)",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "",
}

@article{AFRH18jasist,
        author = "S. A. Alkhodair and B. C. M. Fung and O. Rahman and P. C. K. Hung",
        title = "Improving Interpretations of Topic Modeling in Microblogs",
        journal = "Journal of the Association for Information Science and Technology (JASIST)",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "",
}

@article{AFILH18kais,
        author = "K. Al-Hussaeni and B. C. M. Fung and F. Iqbal and J. Liu and P. C. K. Hung",
        title = "Differentially-private Multidimensional Data Publishing",
        journal = "Knowledge and Information Systems (KAIS)",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "",
}

@article{GFIKTML17isf,
        author = "J. Guo and B. C. M. Fung and F. Iqbal and P. J. K. Kuppen and R. A. E. M. Tollenaar and W. E. Mesker and J.-J. Lebrun",
        title = "Revealing Determinant Factors for Early Breast Cancer Recurrence by Decision Tree",
        journal = "Information Systems Frontiers (ISF)",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "in press",
}

@article{HKIHFFMT17jit,
        author = "P. C. K. Hung and K. Kanev and F. Iqbal and S.-C. Huang and B. C. M. Fung and M. Fantinato and D. Mettrick and P. Tuwanut ",
        title = "Smart TV Face Monitoring for Children Privacy",
        journal = "Journal of Internet Technology (JIT): Special Issue on Behavior Data Analytics for Cybersecurity",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "in press",
}

@article{RFCCG17tfdt,
        author = "O. Rahman and B. C. M. Fung and Z. Chen and W.-L. Chang and X. Gao",
        title = "A Study of Apparel Consumer Behaviour in China and Taiwan",
        journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
        volume = "",
        number = "",
        pages = "",
        month = "",
        year = "in press",
}

@article{RFCG17apjml,
        author = "O. Rahman and B. C. M. Fung and Z. Chen and X. Gao",
        title = "A Cross-National Study of Apparel Consumers’ Preferences and the Role of Product Evaluative Cues",
        journal = "Asia Pacific Journal of Marketing and Logistics (APJML)",
        volume = "29",
        number = "4",
        pages = "796-812",
        month = "September",
        year = "2017",
}

@article{GKAFKAG17sqjo,
        author = "L. Guerrouj and Z. Kermansaravi and V. Arnaoudouva and B. C. M. Fung and F. Khomh and G. Antoniol and Y.-G. Guéhéneuc",
        title = "Investigating the Relation between Lexical Smells and Change- and Fault- Proneness: An Empirical Study",
        journal = "Software Quality Journal (SQJO)",
        volume = "25",
        number = "3",
        pages = "641-670",
        month = "September",
        year = "2017",
}

@article{KFIAB16ecra,
        author = "R. H. Khokhar and B. C. M. Fung and F. Iqbal and D. Alhadidi and J. Bentahar",
        title = "Privacy-preserving Data Mashup Model for Trading Person-specific Information",
        journal = "Electronic Commerce Research and Applications (ECRA)",
        volume = "17",
        pages = "19-37",
        month = "May-June",
        year = "2016",
}

@article{YHF16scs,
        author = "Z. Yu and F. Haghighat and B. C. M. Fung",
        title = "Advances and Challenges in Building Engineering and Data Mining Applications for Energy-efficient Communities",
        journal = "Sustainable Cities and Society (SCS)",
        volume = "25",
        pages = "33-38",
        month = "August",
        year = "2016",
}

@article{LWF16tkde,
        author = "J. Liu and K. Wang and B. C. M. Fung",
        title = "Mining High Utility Patterns in One Phase without Generating Candidates",
        journal = "IEEE Transactions on Knowledge and Data Engineering (TKDE)",
        volume = "28",
        number = "5",
        pages = "1245-1257",
        month = "May",
        year = "2016",
}

@article{RFY16jicr,
        author = "O. Rahman and B. C. M. Fung and A. Yeo",
        title = "Exploring the Meanings of Hijab through Online Comments in Canada",
        journal = "Journal of Intercultural Communication Research (JICR)",
        volume = "45",
        number = "3",
        pages = "214-232",
        month = "April",
        year = "2016",
}

@article{FFFCPD15diin,
        author = "M. R. Farhadi and B. C. M. Fung and Y. B. Fung and P. Charland and S. Preda and M. Debbabi",
        title = "Scalable Code Clone Search for Malware Analysis",
        journal = "Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis",
        volume = "15",
        pages = "46-60",
        month = "December",
        year = "2015",
}

@article{SFK15peerjcs,
        author = "N. Scarabeo and B. C. M. Fung and R. H. Khokhar",
        title = "Mining Known Attack Patterns from Security-related Events",
        journal = "PeerJ Computer Science",
        volume = "1",
        number = "e25",
        pages = "1-21",
        month = "October",
        year = "2015",
}

@article{SIF15diin,
        author = "M. Schmid and F. Iqbal and B. C. M. Fung",
        title = "E-mail Authorship Attribution using Customized Associative Classification",
        journal = "Digital Investigation (DIIN)",
        volume = "14",
        number = "1",
        pages = "S116-S126",
        month = "August",
        year = "2015",
}

@article{DFD15tissec,
        author = "S. H. H. Ding and B. C. M. Fung and M. Debbabi",
        title = "A Visualizable Evidence-Driven Approach for Authorship Attribution",
        journal = "ACM Transactions on Information and System Security (TISSEC)",
        volume = "17",
        number = "3",
        articleno = "12",
        pages = "12:1-12:30",
        month = "March",
        year = "2015",
}

@article{LNF15jim,
        author = "S. Li and K. Nahar and B. C. M. Fung",
        title = "Product Customization of Tablet Computers based on the Information of Online Reviews by Customers",
        journal = "Journal of Intelligent Manufacturing (JIM)",
        volume = "26",
        number = "1",
        pages = "97-110",
        month = "February",
        year = "2015",
}

@article{AFC14dke,
        author = "K. Al-Hussaeni and B. C. M. Fung and W. K. Cheung",
        title = "Privacy-Preserving Trajectory Stream Publishing",
        journal = "Data \& Knowledge Engineering (DKE)",
        volume = "94",
        number = "A",
        pages = "89-109",
        month = "November",
        year = "2014",
}

@article{GXF14tkde,
        author = "S. Goryczka and L. Xiong and B. C. M. Fung",
        title = "$m$-privacy for collaborative data publishing",
        journal = "IEEE Transactions on Knowledge and Data Engineering (TKDE)",
        volume = "26",
        number = "10",
        pages = "2520-2533",
        month = "October",
        year = "2014",
}

@article{CFYD14vldbj,
        author = "R. Chen and B. C. M. Fung and P. S. Yu and B. C. Desai",
        title = "Correlated Network Data Publication via Differential Privacy",
        journal = "Very Large Data Bases Journal (VLDBJ)",
        volume = "23",
        number = "4",
        pages = "653-676",
        month = "August",
        year = "2014",
}

@article{KCFL14jbi,
        author = "R. H. Khokhar and R. Chen and B. C. M. Fung and S. M. Lui",
        title = "Quantifying the costs and benefits of privacy-preserving health data publishing",
        journal = "Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy",
        volume = "50",
        pages = "107-121",
        month = "August",
        year = "2014",
}

@article{BF14kais,
        author = "A. Basher and B. C. M. Fung",
        title = "Analyzing topics and authors in chat logs for crime investigation",
        journal = "Knowledge and Information Systems (KAIS)",
        volume = "39",
        number = "2",
        pages = "351-381",
        month = "May",
        year = "2014",
}

@article{RFL14tfdt,
        author = "O. Rahman and B. C. M. Fung and W.-S. Liu",
        title = "Using Data Mining to Analyse Fashion Consumers' Preferences from a Cross-national Perspective",
        journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
        volume = "7",
        number = "1",
        pages = "42-49",
        month = "March",
        year = "2014",
}

@article{MAFD14tdsc,
        author = "N. Mohammed and D. Alhadidi and B. C. M. Fung and M. Debbabi",
        title = "Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data",
        journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
        volume = "11",
        number = "1",
        pages = "59-71",
        month = "January/February",
        year = "2014",
}

@article{GFCA14trc,
        author = "M. Ghasemzadeh and B. C. M. Fung and R. Chen and A. Awasthi",
        title = "Anonymizing trajectory data for passenger flow analysis",
        journal = "Transportation Research Part C: Emerging Technologies (TRC)",
        volume = "39",
        pages = "63-79",
        month = "February",
        year = "2014",
}

@article{DF13dke,
        author = "G. G. Dagher and B. C. M. Fung",
        title = "Subject-based Semantic Document Clustering for Digital Forensic Investigations",
        journal = "Data \& Knowledge Engineering (DKE)",
        volume = "86",
        pages = "224-241",
        month = "July",
        year = "2013",
}

@article{YFH13buil,
        author = "Z. Yu and B. C. M. Fung and F. Haghighat",
        title = "Extracting knowledge from building-related data - a data mining framework",
        journal = "Building Simulation (BUIL): An International Journal",
        volume = "6",
        number = "2",
        pages = "207-222",
        month = "June",
        year = "2013",
}

@article{MJCFO13jamia,
        author = "N. Mohammed and X. Jiang and R. Chen and B. C. M. Fung and L. Ohno-Machado",
        title = "Privacy-preserving heterogeneous health data sharing",
        journal = "Journal of the American Medical Informatics Association (JAMIA)",
        volume = "20",
        number = "3",
        pages = "462-469",
        month = "May",
        year = "2013",
}

@article{CFMDW13ins,
        author = "R. Chen and B. C. M. Fung and N. Mohammed and B. C. Desai",
        title = "Privacy-preserving trajectory data publishing by local suppression",
        journal = "Information Sciences: Special Issue on Data Mining for Information Security",
        volume = "231",
        pages = "83-97",
        month = "May",
        year = "2013",
}

@article{IBFD13ins,
        author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
        title = "A unified data mining solution for authorship analysis in anonymous textual communications",
        journal = "Information Sciences: Special Issue on Data Mining for Information Security",
        volume = "231",
        pages = "98-112",
        month = "May",
        year = "2013",
}

@article{FTHXAD12tsc,
        author = "B. C. M. Fung and T. Trojer and P. C. K. Hung and L. Xiong and K. Al-Hussaeni and R. Dssouli",
        title = "Service-oriented architecture for high-dimensional private data mashup",
        journal = "IEEE Transactions on Services Computing (TSC)",
        volume = "5",
        number = "3",
        pages = "373-386",
        month = "July-September",
        year = "2012",
}

@article{YHFZ12enb,
        author = "Z. Yu and F. Haghighat and B. C. M. Fung and L. Zhou",
        title = "A novel methodology for knowledge discovery through mining associations between building operational data",
        journal = "Energy and Buildings",
        volume = "47",
        number = "",
        pages = "430-440",
        month = "April",
        year = "2012",
}

@article{AFYF12diin,
        author = "R. Al-Zaidy and B. C. M. Fung and A. M. Youssef and F. Fortin",
        title = "Mining criminal networks from unstructured text documents",
        journal = "Digital Investigation (DIIN)",
        volume = "8",
        number = "3-4",
        pages = "147-160",
        month = "February",
        year = "2012",
}

@article{YHFMY11egy,
        author = "Z. Yu and F. Haghighat and B. C. M. Fung and E. Morofsky and H. Yoshino",
        title = "A methodology for identifying and improving occupant behavior in residential buildings",
        journal = "Energy",
        volume = "36",
        number = "11",
        pages = "6596-6608",
        month = "November",
        year = "2011",
}

@article{MFD11vldbj,
        author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
        title = "Anonymity meets game theory: secure data integration with malicious participants",
        journal = "Very Large Data Bases Journal (VLDBJ)",
        volume = "20",
        number = "4",
        pages = "567-588",
        month = "August",
        year = "2011",
}

@article{CMFDX11vldb,
        author = "R. Chen and N. Mohammed and B. C. M. Fung and B. C. Desai and L. Xiong",
        title = "Publishing Set-Valued Data via Differential Privacy",
        journal = "The Proceedings of the VLDB Endowment (PVLDB)",
        volume = "4",
        number = "11",
        pages = "1087-1098",
        month = "August",
        year = "2011",
}

@article{YFHYM11enb,
        author = "Z. Yu and B. C. M. Fung and F. Haghighat and H. Yoshino and E. Morofsky",
        title = "A systematic procedure to study the influence of occupant behavior on building energy consumption",
        journal = "Energy and Buildings",
        volume = "43",
        number = "6",
        pages = "1409-1417",
        month = "June",
        year = "2011",
}

@article{MFHL10tkdd,
        author = "N. Mohammed and B. C. M. Fung and P. C. K. Hung and C. Lee",
        title = "Centralized and distributed anonymization for high-dimensional healthcare data",
        journal = "ACM Transactions on Knowledge Discovery from Data (TKDD)",
        volume = "4",
        number = "4",
        pages = "18:1--18:33",
        articleno = "18",
        month = "October",
        year = "2010",
}

@article{IBFD10di,
        author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
        title = "Mining writeprints from anonymous e-mails for forensic investigation",
        journal = "Digital Investigation",
        volume = "7",
        number = "1-2",
        pages = "56-64",
        month = "October",
        year = "2010",
}

@article{YHFY10enb,
        author = "Z. Yu and F. Haghighat and B. C. M. Fung and H. Yoshino",
        title = "A decision tree method for building energy demand modeling",
        journal = "Energy and Buildings",
        volume = "42",
        number = "10",
        pages = "1637-1646",
        month = "October",
        year = "2010",
}

@article{FWCY10csur,
        author = "B. C. M. Fung and K. Wang and R. Chen and P. S. Yu",
        title = "Privacy-Preserving Data Publishing: A Survey of Recent Developments",
        journal = "ACM Computing Surveys",
        volume = "42",
        number = "4",
        pages = "14:1-14:53",
        articleno = "14",
        month = "June",
        year = "2010",
}

@article{FWWH09dke,
        author = "B. C. M. Fung and K. Wang and L. Wang and P. C. K. Hung",
        title = "Privacy-Preserving Data Publishing for Cluster Analysis",
        journal = "Data \& Knowledge Engineering (DKE)",
        volume = "68",
        number = "6",
        pages = "552-575",
        month = "June",
        year = "2009",
}

@article{IHFD08di,
        author = "F. Iqbal and R. Hadjidj and B. C. M. Fung and M. Debbabi",
        title = "A Novel Approach of Mining Write-Prints for Authorship Attribution in E-mail Forensics",
        journal = "Digital Investigation",
        volume = "5",
        number = "1",
        pages = "S42-S51",
        month = "September",
        year = "2008",
}

@article{FWY07tkde,
        author = "B. C. M. Fung and Ke Wang and P. S. Yu",
        title = "Anonymizing Classification Data for Privacy Preservation",
        journal = "IEEE Transactions on Knowledge and Data Engineering (TKDE)",
        volume = "19",
        number = "5",
        pages = "711--725",
        month = "May",
        year = "2007",
}

@article{WFY07kais,
        author = "K. Wang and B. C. M. Fung and P. S. Yu",
        title = "Handicapping Attacker's Confidence: An Alternative to k-Anonymization",
        journal = "Knowledge and Information Systems (KAIS)",
        volume = "11",
        number = "3",
        pages = "345--368",
        month = "April",
        year = "2007",
}

Refereed Conference Papers

@inproceedings{HIHFR18icsci,
        author = "M. Hasan and F. Iqbal and P. C. K. Hung and B. C. M. Fung and L. Rafferty",
        title = "A Security Study for Smart Metering Systems",
        booktitle = "Proc. of the 20th International Conference on Smart Cities and Infrastructure (ICSCI)",
        pages = "",
        address = "Paris, France",
        month = "January",
        year = "2018",
        publisher = "",
}

@inproceedings{HKIMRPHF16compIMAGE,
        author = "P. C. K. Hung and K. Kanev and F. Iqbal and D. Mettrick and L. Rafferty and G.-P. Pan and S.-C. Huang and B. C. M. Fung",
        title = "A Study of Children Facial Recognition for Privacy in Smart TV",
        booktitle = "Proc. of the International Symposium on Computational Modeling of Objects Represented in Images (CompIMAGE), LNCS 10149",
        pages = "229-240",
        address = "Niagara Falls, NY",
        month = "September",
        year = "2016",
        publisher = "Springer",
}

@inproceedings{DFC16kdd,
        author = "S. H. H. Ding and B. C. M. Fung and P. Charland",
        title = "Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering",
        booktitle = "Proc. of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
        pages = "461-470",
        address = "San Francisco, CA",
        month = "August",
        year = "2016",
        publisher = "ACM Press",
}

@inproceedings{BDDFOU16ideas,
        author = "M. Bonenfant and B. C. Deasi and D. Desai and B. C. M. Fung and M. T. Özsu and J. D. Ullman",
        title = "Panel: The State of Data",
        booktitle = "Proc. of the 20th International Database Engineering & Applications Symposium (IDEAS)",
        pages = "2-11",
        address = "Montreal, Canada",
        month = "July",
        year = "2016",
        publisher = "ACM Press",
}

@inproceedings{DFAF15icpads,
        author = "G. G. Dagher and F. Iqbal and M. Arafati and B. C. M. Fung",
        title = "Fusion: Privacy-preserving Distributed Protocol for High-Dimensional Data Mashup",
        booktitle = "Proc. of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS)",
        pages = "760-769",
        address = "Melbourne, Australia",
        month = "December",
        year = "2015",
        publisher = "IEEE Computer Society",
}

@inproceedings{LLXF15dawak,
        author = "J. Liu and J. Li and S. Xu and B. C. M. Fung",
        title = "Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption",
        booktitle = "Proc. of the 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWak),
        volume = "LNCS 9263",
        pages = "70-81",
        address = "València, Spain",
        month = "September",
        year = "2015",
        publisher = "Springer",
}

@inproceedings{LWZFCY15dexa,
        author = "J. Liu and Y. Wu and Q. Zhou and B. C. M. Fung and F. Chen and B. Yu",
        title = "Parallel Eclat for Opportunities Mining of Frequent Itemsets",
        booktitle = "Proc. of the 26th International Conference on Database and Expert Systems Applications (DEXA),
        volume = "LNCS 9261",
        pages = "401-405",
        address = "València, Spain",
        month = "September",
        year = "2015",
        publisher = "Springer",
}

@inproceedings{ADFH14cloud,
        author = "M. Arafati and G. G. Dagher and B. C. M. Fung and P. C. K. Hung",
        title = "D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups",
        booktitle = "Proc. of the 8th IEEE International Conference on Cloud Computing (CLOUD)",
        pages = "495-505",
        address = "Anchorage, AK",
        month = "June",
        year = "2014",
        publisher = "IEEE Computer Society",
}

@inproceedings{FFCD14sere,
        author = "M. R. Farhadi and B. C. M. Fung and P. Charland and M. Debbabi",
        title = "BinClone: Detecting Code Clones in Malware ",
        booktitle = "Proc. of the 8th IEEE International Conference on Software Security and Reliability (SERE)",
        pages = "78-87",
        address = "San Francisco, CA",
        month = "June",
        year = "2014",
        publisher = "IEEE Reliability Society",
}

@inproceedings{HFI14ntms,
        author = "A. K. Hmood and B. C. M. Fung and F. Iqbal",
        title = "Privacy-Preserving Medical Reports Publishing for Cluster Analysis",
        booktitle = "Proc. of the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS)",
        pages = "1-8",
        address = "Dubai, UAE",
        month = "March",
        year = "2014",
        publisher = "IEEE Computer Society",
}

@inproceedings{FJL13asonam,
        author = "B. C. M. Fung and Y. Jin and J. Li",
        title = "Preserving Privacy and Frequent Sharing Patterns for Social Network Data Publishing",
        booktitle = "Proc. of the 5th IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM)",
        pages = "479-485",
        address = "Niagara Falls, Canada",
        month = "August",
        year = "2013",
        publisher = "IEEE Computer Society",
}

@inproceedings{LWF12icdm,
        author = "J. Liu and K. Wang and B. C. M. Fung",
        title = "Direct Discovery of High Utility Itemsets without Candidate Generation",
        booktitle = "Proc. of the 12th IEEE International Conference on Data Mining (ICDM)",
        pages = "984-989",
        address = "Brussels, Belgium",
        month = "December",
        year = "2012",
        publisher = "IEEE Computer Society",
}

@inproceedings{IFD12wi,
        author = "F. Iqbal and B. C. M. Fung and M. Debbabi",
        title = "Mining Criminal Networks from Chat Logs",
        booktitle = "Proc. of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT)",
        pages = "332-337",
        address = "Macau",
        month = "December",
        year = "2012",
        publisher = "IEEE Computer Society",
}

@inproceedings{BXCF12cikm,
        author = "L. Bonomi and L. Xiong and R. Chen and B. C. M. Fung",
        title = "Frequent grams based Embedding for Privacy Preserving Record Linkage",
        booktitle = "Proc.
of the 21st ACM Conference on Information and Knowledge Management (CIKM)",
        pages = "1597-1601",
        address = "Maui, HI",
        month = "October",
        year = "2012",
        publisher = "ACM Press",
}

@inproceedings{CFF12ist,
        author = "P. Charland and B. C. M. Fung and M. R. Farhadi",
        title = "Clone Search for Malicious Code Correlation",
        booktitle = "Proc. of the NATO RTO Symposium on Information Assurance and Cyber Defense (IST-111)",
        pages = "1.1-1.12",
        address = "Koblenz, Germany",
        month = "September",
        year = "2012",
}

@inproceedings{CFDS12kdd,
        author = "R. Chen and B. C. M. Fung and B. C. Desai and N. M. Sossou",
        title = "Differentially Private Transit Data Publication: A Case Study on the Montreal Transportation System",
        booktitle = "Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
        pages = "213-221",
        address = "Beijing, China",
        month = "August",
        year = "2012",
        publisher = "ACM Press",
}

@inproceedings{AMFD12pets,
        author = "D. Alhadidi and N. Mohammed and B. C. M. Fung and M. Debbabi",
        title = "Secure Distributed Framework for Achieving ε-Differential Privacy",
        booktitle = "Proc. of the 12th Privacy Enhancing Technologies Symposium (PETS)",
        volume = "LNCS 7384",
        pages = "120-139",
        address = "Vigo, Spain",
        month = "July",
        year = "2012",
        publisher = "Springer-Verlag",
}

@inproceedings{AF11csc,
        author = "H. AbuSharkh and B. C. M. Fung",
        title = "Service-Oriented Architecture for Sharing Private Spatial-Temporal Data",
        booktitle = "Proc. of the IEEE International Conference on Cloud and Service Computing (CSC)",
        pages = "40-47",
        address = "Hong Kong",
        month = "December",
        year = "2011",
        publisher = "IEEE Computer Society",
}

@inproceedings{GXF11collaboratecom,
        author = "S. Goryczka and L. Xiong and B. C. M. Fung",
        title = "$m$-privacy for collaborative data publishing",
        booktitle = "Proc. of the 7th IEEE International Conference on Collaborative Computing (CollaborateCom)",
        pages = "",
        address = "Orlando, FL",
        month = "October",
        year = "2011",
        publisher = "",
}

@inproceedings{MCFY11kdd,
        author = "N. Mohammed and R. Chen and B. C. M. Fung and P. S. Yu",
        title = "Differentially Private Data Release for Data Mining",
        booktitle = "Proc. of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
        pages = "493-501",
        address = "San Diego, CA",
        month = "August",
        year = "2011",
        publisher = "ACM Press",
}

@inproceedings{CF11rfid,
        author = "R. Chen and B. C. M. Fung",
        title = "A Unified RFID Data Anonymization Platform",
        booktitle = "Proc. of the 5th International Conference on RFID",
        pages = "95-96",
        address = "Orlando, FL",
        month = "April",
        year = "2011",
        publisher = "IEEE Communications Society",
}

@inproceedings{AFY11sac,
        author = "R. Al-Zaidy and B. C. M. Fung and A. M. Youssef",
        title = "Towards Discovering Criminal Communities from Textual Data",
        booktitle = "Proc. of the 26th ACM SIGAPP Symposium on Applied Computing (SAC)",
        pages = "172-177",
        address = "TaiChung, Taiwan",
        month = "March",
        year = "2011",
        publisher = "ACM Press",
}

@inproceedings{RNDF11sac,
        author = "S. Ray and M. F. Nizam and S. Das and B. C. M. Fung",
        title = "Verification of data pattern for interactive privacy preservation model",
        booktitle = "Proc. of the 26th ACM SIGAPP Symposium on Applied Computing (SAC)",
        pages = "1716-1723",
        address = "TaiChung, Taiwan",
        month = "March",
        year = "2011",
        publisher = "ACM Press",
}

@inproceedings{SXF10cikm,
        author = "P. Shi and L. Xiong and B. C. M. Fung",
        title = "
Anonymizing Data with Quasi-Sensitive Attribute Values",
        booktitle = "Proc.
of the 19th ACM Conference on Information and Knowledge Management (CIKM)",
        pages = "1389-1392",
        address = "Toronto, Canada",
        month = "October",
        year = "2010",
        publisher = "ACM Press",
}

@inproceedings{IKFD10sac,
        author = "F. Iqbal and L. A. Khan and B. C. M. Fung and M. Debbabi",
        title = "E-mail Authorship Verification for Forensic Investigation",
        booktitle = "Proc. of the 25th ACM SIGAPP Symposium on Applied Computing (SAC)",
        pages = "1591-1598",
        address = "Sierre, Switzerland",
        month = "March",
        year = "2010",
        publisher = "ACM Press",
}

@inproceedings{BMSAF09iit,
        author = "H. Binsalleeh and N. Mohammed and P. S. Sandhu and F. Aljumah and B. C. M. Fung",
        title = "Using {RFID} tags to improve pilgrimage management",
        booktitle = "Proc. of the 6th IEEE International Conference on Innovations in Information Technology (Innovations)",
        pages = "1-5",
        address = "Al Ain, United Arab Emirates",
        month = "December",
        year = "2009",
        publisher = "IEEE Communications Society",
}

@inproceedings{MFD09cikm,
        author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
        title = "
Walking in the Crowd: Anonymizing Trajectory Data for Pattern Analysis",
        booktitle = "Proc.
of the 18th ACM Conference on Information and Knowledge Management (CIKM)",
        pages = "1441-1444",
        address = "Hong Kong",
        month = "November",
        year = "2009",
        publisher = "ACM Press",
}

@inproceedings{TFH09icws,
        author = "T. Trojer and B. C. M. Fung and P. C. K. Hung",
        title = "
Service-Oriented Architecture for Privacy-Preserving Data Mashup",
        booktitle = "Proc. of the 7th IEEE International Conference on Web Services (ICWS)",
        pages = "767-774",
        address = "Los Angeles, CA",
        month = "July",
        year = "2009",
        publisher = "IEEE Computer Society Press",
}

@inproceedings{MFHL09kdd,
        author = "N. Mohammed and B. C. M. Fung and P. C. K. Hung and C.  Lee",
        title = "Anonymizing Healthcare Data: A Case Study on the Blood Transfusion Service",
        booktitle = "Proc. of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
        pages = "1285-1294",
        address = "Paris, France",
        month = "June",
        year = "2009",
        publisher = "ACM Press",
}

@inproceedings{WWF09icc,
        author = "Y. Wang and L. Wang and B. C. M. Fung",
        title = "
Preserving Privacy for Location-Based Services with Continuous Queries",
        booktitle = "Proc. of the 12th International Conference on Communications (ICC)",
        pages = "1-5",
        address = "Dresden, Germany",
        month = "June",
        year = "2009",
        publisher = "IEEE Press",
}

@inproceedings{SSSF09c3s2e,
        author = "
J. Singh and Q. Shi and H. Sandhu and B. C. M. Fung",
        title = "
Anonymizing location-based data",
        booktitle = "Proc. of the 2009 C3S2E",
        pages = "27-33",
        address = "Montreal, Canada",
        month = "May",
        year = "2009",
        publisher = "ACM Press",
}

@inproceedings{FAC09rfid,
        author = "B. C. M. Fung and K. Al-Hussaeni and M. Cao",
        title = "Preserving {RFID} Data Privacy",
        booktitle = "Proc. of the 2009 International Conference on RFID",
        address = "Orlando, FL",
        pages = "200-207",
        month = "April",
        year = "2009",
        publisher = "IEEE Communications Society",
}

@inproceedings{MFWH09edbt,
        author = "N. Mohammed and B. C. M. Fung and K. Wang and P. C. K. Hung",
        title = "Privacy-Preserving Data Mashup",
        booktitle = "Proc. of the 12th International Conference on Extending Database Technology (EDBT)",
        pages = "228-239",
        address = "Saint-Petersburg, Russia",
        month = "March",
        year = "2009",
        publisher = "ACM Press",
}

@inproceedings{FCDX09sac,
        author = "B. C. M. Fung and M. Cao and B. C. Desai and H. Xu",
        title = "Privacy Protection for {RFID} Data",
        booktitle = "Proc. of the 24th ACM SIGAPP Symposium on Applied Computing (SAC)",
        pages = "1528-1535",
        address = "Honolulu, HI",
        month = "March",
        year = "2009",
        publisher = "ACM Press",
}

@inproceedings{XFWFP08icdm,
        author = "Y. Xu and B. C. M. Fung and K. Wang and A. W. C. Fu and J. Pei",
        title = "Publishing sensitive transactions for itemset utility",
        booktitle = "Proc. of the 8th IEEE International Conference on Data Mining (ICDM)",
        pages = "1109-1114",
        month = "December",
        year = "2008",
        address = "Pisa, Italy",
        publisher = "IEEE Computer Society",
}

@inproceedings{ZFMC08fskd,
        author = "Y. Zhu and B. C. M. Fung and D. Mu and Y. Li",
        title = "An Efficient Hybrid Document Clustering Method",
        booktitle = "Proc. of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)",
        address = "Jinan, China",
        month = "August",
        year = "2008",
        volume = "2",
        pages = "395-399",
}

@inproceedings{FWWD08isi,
        author = "B. C. M. Fung and K. Wang and L. Wang and M. Debbabi",
        title = "A Framework for Privacy-Preserving Cluster Analysis",
        booktitle = "Proc. of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI 2008)",
        volume = "2",
        pages = "395-399",
        address = "Taipei, Taiwan",
        month = "June",
        year = "2008",
}

@inproceedings{FWFP08edbt,
        author = "B. C. M. Fung and K. Wang and A. W. C. Fu and J. Pei",
        title = "Anonymity for Continuous Data Publishing",
        booktitle = "Proc. of the 11th International Conference on Extending Database Technology (EDBT)",
        address = "Nantes, France",
        pages = "264--275",
        month = "March",
        year = "2008",
        publisher = "ACM Press",
}

@inproceedings{ZDFM06paclic,
        author = "Y. H. Zhu and G. Z. Dai and B. C. M. Fung and D. J. Mu",
        title = "Document Clustering Method based on Frequent Co-Occurring Words",
        booktitle = "Proc. of the 20th Pacific Asia Conference on Language, Information and Computation (PACLIC)",
        address = "Wuhan, China",
        pages = "442--445",
        month = "November",
        year = "2006",
}

@inproceedings{WF06kdd,
        author = "K. Wang and B. C. M. Fung",
        title = "Anonymizing Sequential Releases",
        booktitle = "Proc. of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)",
        address = "Philadelphia, PA",
        pages = "414--423",
        month = "August",
        year = "2006",
        publisher = "ACM Press",
}

@inproceedings{WFY05icdm,
        author = "K. Wang and B. C. M. Fung and P. S. Yu",
        title = "Template-Based Privacy Preservation in Classification Problems",
        booktitle = "Proc. of the 5th IEEE International Conference on Data Mining (ICDM)",
        address = "Houston, TX",
        pages = "466--473",
        month = "November",
        year = "2005",
        publisher = "IEEE Computer Society",
}

@inproceedings{WFD05isi,
        author = "K. Wang and B. C. M. Fung and G. Dong",
        title = "Integrating Private Databases for Data Analysis",
        booktitle = "Proc. of the 2005 IEEE International Conference on Intelligence and Security Informatics (ISI)",
        series = "Lecture Notes in Computer Science",
        volume = "3495",
        pages = "171--182",
        address = "Atlanta, GA",
        month = "May",
        year = "2005",
        publisher = "Springer-Verlag",
}

@inproceedings{FWY05icde,
        author = "B. C. M. Fung and K. Wang and P. S. Yu",
        title = "Top-Down Specialization for Information and Privacy Preservation",
        booktitle = "Proc. of the 21st IEEE International Conference on Data Engineering (ICDE)",
        pages = "205--216",
        address = "Tokyo, Japan",
        month = "April",
        year = "2005",
        publisher = "IEEE Computer Society",
}

@inproceedings{FWE03sdm,
        author = "B. C. M. Fung and K. Wang and M. Ester",
        title = "Hierarchical Document Clustering Using Frequent Itemsets",
        booktitle = "Proc. of the 3rd SIAM International Conference on Data Mining (SDM)",
        pages = "59--70",
        address = "San Francisco, CA",
        month = "May",
        year = "2003",
        publisher = "SIAM",
}

Refereed Book Chapters

@inbook{FJL15lnsn,
        author = "B. C. M. Fung and Y. Jin and J. Li and J. Liu",
        title = "Recommendation and Search in Social Networks",
        chapter = "Anonymizing social network data for maximal frequent-sharing pattern mining",
        pages = "77-100",
        publisher = "Springer",
        editor = "Alhajj, R., Glässer, U.",
        month = "February",
        year = "2015",
}

@inbook{TLFNH10pakd,
        author = "T. Trojer and C. K. Lee and B. C. M. Fung and L. Narupiyakul and P. C. K. Hung",
        title = "Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques",
        chapter = "Privacy-aware health information sharing",
        pages = "315-349",
        publisher = "Chapman & Hall/CRC",
        editor = "Bonchi, F. and Ferrari, E.",
        month = "December",
        year = "2010",
}

@inbook{FWE08dwm,
        author = "B. C. M. Fung and K. Wang and M. Ester",
        title = "The Encyclopedia of Data Warehousing and Mining",
        chapter = "Hierarchical Document Clustering",
        pages = "970-975",
        address = "Hershey, PA",
        publisher = "Idea Group",
        editor = "Wang, J.",
        month = "August",
        year = "2008",
}

@inbook{Fung07pta,
        author = "B. C. M. Fung",
        title = "The Encyclopedia of Portal Technology and Applications",
        chapter = "Privacy-Preserving Data Portals",
        pages = "842--847",
        address = "Hershey, PA",
        publisher = "Idea Group",
        editor = "Tatnall, A.",
        month = "June",
        year = "2007",
        volume = "2",
}

@inbook{FWE05dwm,
        author = "B. C. M. Fung and K. Wang and M. Ester",
        title = "The Encyclopedia of Data Warehousing and Mining",
        chapter = "Hierarchical Document Clustering",
        pages = "555--559",
        address = "Hershey, PA",
        publisher = "Idea Group",
        editor = "Wang, J.",
        month = "July",
        year = "2005",
}

Editorial

@incollection{SFC15fi,
        editor = "D. Ślęzak and B. C. M. Fung and W. K. Cheung ",
        title = "Special Issue on Domain Knowledge in Knowledge Discovery and Privacy-Aware Intelligent Systems",
        journal = "Fundamenta Informaticae",
        publisher = "IOS Press",
        volume = "137",
        number = "2",
        pages = "171-304",
        month = "March",
        year = "2015",
}

@incollection{ZKRFK13advei,
        editor = "Y. Zeng and K.-Y. Kim and V. Raskin and B. C. M. Fung and Y. Kitamura",
        title = "Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems",
        journal = "Advanced Engineering Informatics (ADVEI)",
        publisher = "Elsevier",
        volume = "27",
        number = "1",
        month = "January",
        year = "2013",
}

Tutorial

@inproceedings{GFLKH15ase,
        author = "L. Guerrouj and B. C. M. Fung and D. Lo and F. Khomh and A. Hamou-Lhadj",
        title = "Mining Textual Data for Software Engineering",
        booktitle = "Proc. of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
        pages = "",
        address = "Lincoln, NB",
        month = "November",
        year = "2015",
        publisher = "IEEE Computer Society",
}

Presentations, Posters and Abstracts

@inproceedings{FMBF17gardeso,
        author = "F. Fortin and S. Meloche and R. Bhateja and B. C. M. Fung",
        title = "Prédire la menace grâce au machine learning: étude de cas",
        booktitle = "Colloque GARDESO",
        address = "Montreal, Canada",
        month = "June",
        year = "2017",
}

@inproceedings{RF16eof,
        author = "O. Rahman and B. C. M. Fung",
        title = "A Cross-cultural Perspective on Fashion Selection and Consumption",
        booktitle = "Proc. of of The End of Fashion: an international conference and exhibition",
        pages = "",
        address = "Wellington, New Zealand",
        month = "December",
        year = "2016",
}

@unpublished{DFC16serene-risc,
        author = "S. H. H. Ding and B. C. M. Fung and P. Charland",
        title = "Kam1n0: Simplifying Reverse Engineering of Software for Security Analysis",
        note = "Poster Session of the Smart Cybersecurity Network (SERENE-RISC) Workshop",
        address = "Ottawa, ON",
        month = "October",
        year = "2016",
}

Magazine Articles

@article{KF17wef,
        author = "K. Kolody and B. C. M. Fung",
        title = "Cyber Security: Technology and the Law, and Cybercrime",
        journal = "World Economic Forum (WEF) TopLink",
        pages = "1-4",
        month = "April",
        year = "2017",
}

@article{BF16wef,
        author = "T. Braun and B. C. M. Fung",
        title = "Cyber Security: Cyber War, Critical Infrastructure Protection, Privacy, System Risk and Resilience, New Norms of Collaboration, Cybercrime, and Security of Things",
        journal = "World Economic Forum (WEF) TopLink",
        pages = "1-14",
        month = "June",
        year = "2016",
}

@article{MF13pentest,
        author = "N. Mohammed and B. C. M. Fung",
        title = "Privacy-preserving Data Publishing",
        journal = "Pentest Magazine: Pester's Development Kit",
        volume = "3",
        number = "5",
        pages = "16-22",
        month = "August",
        year = "2013",
}

Technical Reports

@TECHREPORT{TF17mcalear,
        author = "D. Tweed and B. C. M. Fung",
        title = "Demonstration of a Secure Credential Transfer Protocol",
        institution = "McAlear Management Inc.",
        month = "February",
        year = "2017",
}

@TECHREPORT{DFD1702drdc,
        author = "S. H. H. Ding and B. C. M. Fung and M. R. Farhadi",
        title = "Assembly code data mining: design and prototyping (part 5)",
        institution = "Defence Research and Development Canada",
        month = "February",
        year = "2017",
        number = "W7701-155902/001/QCL (TA05)",
}

@TECHREPORT{DFD1701drdc,
        author = "S. H. H. Ding and B. C. M. Fung and M. R. Farhadi",
        title = "Assembly code data mining: design and prototyping (part 4)",
        institution = "Defence Research and Development Canada",
        month = "January",
        year = "2017",
        number = "W7701-155902/001/QCL (TA04)",
}

@TECHREPORT{DFZ1603drdc,
        author = "S. H. H. Ding and B. C. M. Fung and K. Zhao",
        title = "Assembly code data mining: design and prototyping (part 3)",
        institution = "Defence Research and Development Canada",
        month = "March",
        year = "2016",
        number = "W7701-155902/001/QCL (TA02)",
}

@TECHREPORT{DFZ1602drdc,
        author = "S. H. H. Ding and B. C. M. Fung and K. Zhao",
        title = "Assembly code data mining: porting to other platforms",
        institution = "Defence Research and Development Canada",
        month = "February",
        year = "2016",
        number = "W7701-155902/001/QCL (TA03)",
}

@TECHREPORT{FDZ1601drdc,
        author = "B. C. M. Fung and S. H. H. Ding and K. Zhao",
        title = "Assembly code data mining: design and prototyping (part 2)",
        institution = "Defence Research and Development Canada",
        month = "January",
        year = "2016",
        number = "W7701-155902/001/QCL (TA01)",
}

@TECHREPORT{FDFZ15drdc,
        author = "B. C. M. Fung and S. H. H. Ding and M. R. Farhadi and K. Zhao",
        title = "Assembly code data mining: design and prototyping (part 1)",
        institution = "Defence Research and Development Canada",
        month = "March",
        year = "2015",
        number = "W7701-155902/001/QCL (Firm Portion)",
}

@TECHREPORT{FFPD14drdc,
        author = "M. R. Farhadi and B. C. M. Fung and S. Preda and M. Debbabi",
        title = "Progress update on the implementation of assembly code clone detection systems",
        institution = "Defence Research and Development Canada",
        month = "January",
        year = "2014",
}

@TECHREPORT{FFF13drdc,
        author = "Y. B. Fung and M. R. Farhadi and B. C. M. Fung",
        title = "Semantic code clone search",
        institution = "Defence Research and Development Canada",
        month = "March",
        year = "2013",
}

@TECHREPORT{FFD12drdc,
        author = "B. C. M. Fung and M. R. Farhadi and M. Debbabi",
        title = "Assembly code clone search",
        institution = "Defence Research and Development Canada",
        month = "March",
        year = "2012",
}

@TECHREPORT{FOBFD11drdc,
        author = "B. C. M. Fung and T. Ormerod and A. Boukhetouta and M. R. Farhadi and M. Debbabi",
        title = "A survey of assembly code analysis techniques",
        institution = "Defence Research and Development Canada",
        month = "September",
        year = "2011",
}

@TECHREPORT{MFD10tr,
        author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
        title = "Preserving Privacy and Utility in {RFID} Data Publishing",
        institution = "Concordia University",
        year = "2010",
        month = "October",
        address = "Montreal, QC, Canada",
        number = "6850",
}

Thesis

@phdthesis{Fung07thesis,
        author = "B. C. M. Fung",
        title = "Privacy-Preserving Data Publishing",
        school = "Simon Fraser University",
        year = "2007",
        address = "Burnaby, BC, Canada",
        month = "May",
}

@masterthesis{Fung02thesis,
        author = "B. C. M. Fung",
        title = "Hierarchical document clustering using frequent itemsets",
        school = "Simon Fraser University",
        year = "2002",
        address = "Burnaby, BC, Canada",
        month = "September",
}