Menu:

 

[By Year] [By Google Scholar] [By DBLP] [By RG] [By ORCID]

This page contains the preprint/postprint versions of my published articles. The articles are limited to personal use only. You may find the official versions and the copyright notices from the publishers' websites. Students and postdoctoral fellows under my supervision in the projects are underlined.

[Journals] [Conference Papers] [Book] [Book Chapters] [Editorials] [Tutorials] [Presentations, Posters, and Abstracts] [Magazines] [Reports] [Theses]

Refereed Journal Articles

[45] S. H. H. Ding, B. C. M. Fung, F. Iqbal, and W. K. Cheung. Learning stylometric representations for authorship analysis. IEEE Transactions on Cybernetics (CYB), in press. IEEE Systems, Man, and Cybernetics Society.
[ full paper | bibtex | software with source code - StyloMatrix | JCR impact factor: 7.384, 5-year: 7.678 ]
[44] K. Al-Hussaeni, B. C. M. Fung, F. Iqbal, J. Liu, and P. C. K. Hung. Differentially-private multidimensional data publishing. Knowledge and Information Systems (KAIS): An International Journal, in press. Springer.
[ full paper | bibtex | JCR impact factor: 2.004, 5-year: 2.021 ]
[43] S. A. Alkhodair, B. C. M. Fung, O. Rahman, and P. C. K. Hung. Improving interpretations of topic modeling in microblogs. Journal of the Association for Information Science and Technology (JASIST), in press. Wiley-Blackwell.
[ full paper | bibtex | JCR impact factor: 2.322, 5-year: 2.351 ]
[42] P. C. K. Hung, K. Kanev, F. Iqbal, S.-C. Huang, B. C. M. Fung, M. Fantinato, D. Mettrick, and P. Tuwanut. Smart TV face monitoring for children privacy. Journal of Internet Technology (JIT): Special Issue on Behavior Data Analytics for Cybersecurity, 20 pages, in press. National Dong Hwa University.
[ full paper | bibtex | CiteScore: 0.60 | SJR: 0.237 ]
[41] O. Rahman, B. C. M. Fung, Z. Chen, W.-L. Chang, and X. Gao. A study of apparel consumer behaviour in China and Taiwan. International Journal of Fashion Design, Technology and Education (TFDT), in press. Taylor & Francis.
[ full paper | bibtex | CiteScore: 0.42 | SJR: 0.220 ]
[40] J. Guo, B. C. M. Fung, F. Iqbal, P. J. K. Kuppen, R. A. E. M. Tollenaar, W. E. Mesker, and J.-J. Lebrun. Revealing determinant factors for early breast cancer recurrence by decision tree. Information Systems Frontiers (ISF), 19(6):1233-1241, December 2017. Springer.
[ full paper | bibtex | JCR impact factor: 2.521, 5-year: 2.205 ]
[39] O. Rahman, B. C. M. Fung, Z. Chen, and X. Gao. A cross-national study of apparel consumers' preferences and the role of product evaluative cues. Asia Pacific Journal of Marketing and Logistics (APJML), 29(4):796-812, September 2017. Emerald Group Publishing.
[ full paper | bibtex | CiteScore: 1.04 | SJR: 0.244 ]
[38] L. Guerrouj, Z. Kermansaravi, V. Arnaoudouva, B. C. M. Fung, F. Khomh, G. Antoniol, and Y.-G. Guéhéneuc. Investigating the relation between lexical smells and change- and fault-proneness: an empirical study. Software Quality Journal (SQJO), 25(3):641-670, September 2017. Springer.
[ full paper | bibtex | JCR impact factor: 1.816, 5-year: 2.132 ]
[37] Z. Yu, F. Haghighat, and B. C. M. Fung. Advances and challenges in building engineering and data mining applications for energy-efficient communities. Sustainable Cities and Society (SCS), 25:33-38, August 2016. Elsevier.
[ full paper | bibtex | open access | JCR impact factor: 1.044, 5-year: 1.023 ]
[36] J. Liu, K. Wang, and B. C. M. Fung. Mining high utility patterns in one phase without generating candidates. IEEE Transactions on Knowledge and Data Engineering (TKDE), 28(5):1245-1257, May 2016. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor: 3.438, 5-year: 3.899 ]
[35] R. H. Khokhar, B. C. M. Fung, F. Iqbal, D. Alhadidi, and J. Bentahar. Privacy-preserving data mashup model for trading person-specific information. Electronic Commerce Research and Applications (ECRA), 17:19-37, May-June 2016. Elsevier.
[ full paper | bibtex | JCR impact factor: 1.954, 5-year: 3.181 ]
[34] O. Rahman, B. C. M. Fung, and A. Yeo. Exploring the meanings of hijab through online comments in Canada. Journal of Intercultural Communication Research (JICR), 45(3):214-232, April 2016. Taylor & Francis.
[ full paper | bibtex ]
[33] M. R. Farhadi, B. C. M. Fung, Y. B. Fung, P. Charland, S. Preda, and M. Debbabi. Scalable code clone search for malware analysis. Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis, 15:46-60, December 2015. Elsevier.
[ full paper | bibtex | JCR impact factor: 1.774, 5-year: 2.367 ]
[32] N. Scarabeo, B. C. M. Fung, and R. H. Khokhar. Mining known attack patterns from security-related events. PeerJ Computer Science, 1(e25):1-21, October 2015.
[ full paper | bibtex | open access | collaborated with Hitachi Systems: Above Security ]
[31] M. Schmid, F. Iqbal, and B. C. M. Fung. E-mail authorship attribution using customized associative classification. Digital Investigation (DIIN), 14(1):S116-S126, August 2015. Elsevier.
[ full paper | bibtex | this journal article was presented in the 15th ACM DFRWS | acceptance ratio = 16/46 = 34.8% | JCR impact factor: 1.774, 5-year: 2.367 ]
[30] S. H. H. Ding, B. C. M. Fung, and M. Debbabi. A visualizable evidence-driven approach for authorship attribution. ACM Transactions on Information and System Security (TISSEC), 17(3):12.1-12.30, March 2015. ACM Press.
[ full paper | bibtex | JCR impact factor: 0.759, 5-year: 1.610 | SJR impact factor: 1.772 ]
[29] S. Li, K. Nahar, and B. C. M. Fung. Product customization of tablet computers based on the information of online reviews by customers. Journal of Intelligent Manufacturing (JIM), 26(1):97-110, February 2015. Springer.
[ full paper | bibtex | JCR impact factor: 1.995, 5-year: 2.159 ]
[28] K. Al-Hussaeni, B. C. M. Fung, and W. K. Cheung. Privacy-preserving trajectory stream publishing. Data & Knowledge Engineering (DKE), 94(A):89-109, November 2014. Elsevier.
[ full paper | bibtex | software with source code - ITSA | JCR impact factor in 2014: 1.115, 5-year: 1.594 ]
[27] S. Goryczka, L. Xiong, and B. C. M. Fung. m-privacy for collaborative data publishing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(10):2520-2533, October 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 2.067, 5-year: 2.873 ]
[26] R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai. Correlated network data publication via differential privacy. Very Large Data Bases Journal (VLDBJ), 23(4):653-676, August 2014. Springer.
[ full paper | bibtex | poster | JCR impact factor in 2014: 1.568, 5-year: 2.300 ]
[25] R. H. Khokhar, R. Chen, B. C. M. Fung, and S. M. Lui. Quantifying the costs and benefits of privacy-preserving health data publishing. Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy, 50:107-121, August 2014. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 2.126, 5-year: 3.398 ]
[24] A. Basher and B. C. M. Fung. Analyzing topics and authors in chat logs for crime investigation. Knowledge and Information Systems (KAIS): An International Journal, 39(2):351-381, May 2014. Springer.
[ full paper | bibtex | JCR impact factor in 2014: 1.782, 5-year: 2.016 ]
[23] O. Rahman, B. C. M. Fung, and W.-S. Liu. Using data mining to analyse fashion consumers' preferences from a cross-national perspective. International Journal of Fashion Design, Technology and Education (TFDT), 7(1):42-49, March 2014. Taylor & Francis.
[ full paper | bibtex | SJR impact factor in 2014: 0.24 | indexed by Scopus ]
[22] N. Mohammed, D. Alhadidi, B. C. M. Fung, and M. Debbabi. Secure two-party differentially private data release for vertically-partitioned data. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(1):59-71, January/February 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 1.351, 5-year: 1.652 ]
[21] M. Ghasemzadeh, B. C. M. Fung, R. Chen, and A. Awasthi. Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C: Emerging Technologies (TRC): An International Journal, 39:63-79, February 2014. Elsevier.
[ full paper | bibtex | source code - TALF | JCR impact factor in 2014: 2.818, 5-year: 3.402 ]
[20] G. G. Dagher and B. C. M. Fung. Subject-based semantic document clustering for digital forensic investigations. Data & Knowledge Engineering (DKE), 86:224-241, July 2013. Elsevier.
[ full paper | bibtex | CTV Interview | JCR impact factor in 2013: 1.489, 5-year: 1.609 ]
[19] Z. Yu, B. C. M. Fung, and F. Haghighat. Extracting knowledge from building-related data - a data mining framework. Building Simulation (BUIL): An International Journal, 6(2):207-222, June 2013. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 0.631, 5-year: 0.687 ]
[18] N. Mohammed, X. Jiang, R. Chen, B. C. M. Fung, and L. Ohno-Machado. Privacy-preserving heterogeneous health data sharing. Journal of the American Medical Informatics Association (JAMIA), 20(3):462-469, May 2013. BMJ.
[ full paper | bibtex | software with source code - DiffGen-Hetero | JCR impact factor in 2013: 3.932, 5-year: 4.182 ]
[17] R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang. Privacy-preserving trajectory data publishing by local suppression. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:83-97, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[ This paper presents a local suppression method to achieve LKC-privacy for trajectory data published by a single data provider. ]
[16] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:98-112, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[15] B. C. M. Fung, T. Trojer, P. C. K. Hung, L. Xiong, K. Al-Hussaeni, and R. Dssouli. Service-oriented architecture for high-dimensional private data mashup. IEEE Transactions on Services Computing (TSC), 5(3):373-386, July-September 2012. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2012: 2.460 | the Spotlight Paper for the July-September 2012 issue ]
[ This paper presents a SOA to achieve LKC-privacy in a vertically-partitioned data owned by different data providers. ]
[14] Z. Yu, F. Haghighat, B. C. M. Fung, and L. Zhou. A novel methodology for knowledge discovery through mining associations between building operational data. Energy and Buildings (ENB), 47:430-440, April 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 ]
[13] R. Al-Zaidy, B. C. M. Fung, A. M. Youssef, and F. Fortin. Mining criminal networks from unstructured text documents. Digital Investigation (DIIN), 8(3-4):147-160, February 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 1.648, 5-year: 1.318 ]
[12] Z. Yu, F. Haghighat, B. C. M. Fung, E. Morofsky, and H. Yoshino. A methodology for identifying and improving occupant behavior in residential buildings. Energy, 36(11):6596-6608, November 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 4.159, 5-year: 4.465 ]
[11] N. Mohammed, B. C. M. Fung, and M. Debbabi. Anonymity meets game theory: secure data integration with malicious participants. Very Large Data Bases Journal (VLDBJ), 20(4):567-588, August 2011. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 1.701, 5-year: 2.111 ]
[ This paper presents a secure protocol to achieve k-anonymity in a vertically-partitioned data owned by different malicious data providers. ]
[10] R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. The Proceedings of the VLDB Endowment (PVLDB), 4(11):1087-1098, August 2011. VLDB Endowment.
[ research track full paper | slides | bibtex | source code - DiffPart | this journal paper was presented at the 37th International Conference of Very Large Data Bases (VLDB 2011) | acceptance ratio: 18.1% = 100/553 ]
[ This paper presents a differentially-private sanitization method for transaction data published by a single data provider. ]
[9] Z. Yu, B. C. M. Fung, F. Haghighat, H. Yoshino, and E. Morofsky. A systematic procedure to study the influence of occupant behavior on building energy consumption. Energy and Buildings (ENB), 43(6):1409-1417, June 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 | one of the most cited articles in ENB since 2010 ]
[8] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Transactions on Knowledge Discovery from Data (TKDD), 4(4):18:1-18:33, October 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2012: 1.676 ]
[ This paper presents a secure protocol to achieve LKC-privacy in a horizontally-partitioned data owned by different data providers. ]
[7] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. Mining writeprints from anonymous e-mails for forensic investigation. Digital Investigation (DIIN), 7(1-2):56-64, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2010: 0.836, 5-year: 1.043 ]
[6] Z. Yu, F. Haghighat, B. C. M. Fung, and H. Yoshino. A decision tree method for building energy demand modeling. Energy and Buildings (ENB), 42(10):1637-1646, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 ]
[5] B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR), 42(4):14:1-14:53, June 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2010: 8.000, 5-year: 10.910 | cited by the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) in NIST IR 8053 DRAFT "De-Identification of Personally Identifiable Information" | This is the most cited article in Concordia University according to ACM Digital Library. ]
[4] B. C. M. Fung, K. Wang, L. Wang, and P. C. K. Hung. Privacy-preserving data publishing for cluster analysis. Data & Knowledge Engineering (DKE), 68(6):552-575, June 2009. Elsevier.
[ full paper | bibtex | publisher link | JCR impact factor in 2009: 1.745, 5-year: 2.036 ]
[3] F. Iqbal, R. Hadjidj, B. C. M. Fung, and M. Debbabi. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation (DIIN), 5(1):S42-S51. September 2008. Elsevier.
[ full paper | slides | bibtex | JCR impact factor in 2008: 0.961 | accepted 17 papers | this journal paper was presented in the 8th DFRWS | The research results were reported by media worldwide. ]
[2] B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711-725, May 2007. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2009: 2.285, 5-year: 3.691 ]
[1] K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker's confidence: an alternative to k-anonymization. Knowledge and Information Systems (KAIS): An International Journal, 11(3):345-368, April 2007. Springer-Verlag.
[ full paper | bibtex | JCR impact factor in 2009: 2.211, 5-year: 2.302 ]

Refereed Conference Papers

[44] M. Hasan, F. Iqbal, P. C. K. Hung, B. C. M. Fung, and L. Rafferty. A security study for smart metering systems. In Proceedings of the 20th International Conference on Smart Cities and Infrastructure (ICSCI), Paris, France, January 2018.
[ full paper | bibtex ]
[43] P. C. K. Hung, K. Kanev, F. Iqbal, D. Mettrick, L. Rafferty, G.-P. Pan, S.-C. Huang, and B. C. M. Fung. A study of children facial recognition for privacy in smart TV. In Proceedings of the International Symposium on Computational Modeling of Objects Represented in Images (CompIMAGE), LNCS 10149, pages 229-240, Niagara Falls, NY: Springer, September 2016.
[ full paper | bibtex ]
[42] S. H. H. Ding, B. C. M. Fung, and P. Charland. Kam1n0: MapReduce-based assembly clone search for reverse engineering. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 461-470, San Francisco, CA: ACM Press, August 2016.
[ full paper with poster presentationbibtex | video | slides | poster | software and source code: Kam1n0 | Hex-Rays plug-in contest award | acceptance ratio: (70+72)/784 = 18% | collaborated with Defence Research & Development Canada (DRDC) ]
[41] M. Bonenfant, B. C. Deasi, D. Desai, B. C. M. Fung, M. T. Özsu, and J. D. Ullman. Panel: The State of Data. In Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS), pages 2-11, Montreal, Canada: ACM Press, July 2016.
invited paper | bibtex | poster | The authors are sorted in an alphabetical order. ]
[40] G. G. Dagher, F. Iqbal, M. Arafati, and B. C. M. Fung. Fusion: privacy-preserving distributed protocol for high-dimensional data mashup. In Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS), pages 760-769, Melbourne, Australia: IEEE Computer Society, December 2015.
[ full paper | bibtex | acceptance ratio = 82/230 = 35.7% ]
[39] J. Liu, J. Li, S. Xu, and B. C. M. Fung. Secure outsourced frequent pattern mining by fully homomorphic encryption. In Proceedings of the 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWak), LNCS 9263, pages 70-81, València, Spain: Springer, September 2015.
[ full paper | bibtex ]
[38] J. Liu, Y. Wu, Q. Zhou, B. C. M. Fung, F. Chen, and B. Yu. Parallel eclat for opportunities mining of frequent itemsets. In Proceedings of the 26th International Conference on Database and Expert Systems Applications (DEXA), LNCS 9261, pages 401-415, València, Spain: Springer, September 2015.
[ full paper | bibtex ]
[37] M. Arafati, G. G. Dagher, B. C. M. Fung, and P. C. K. Hung. D-Mash: a framework for privacy-preserving data-as-a-service mashups. In Proceedings of the 7th IEEE International Conference on Cloud Computing (CLOUD), pages 498-505, Anchorage, AK: IEEE Computer Society, June 2014.
[ full paper | bibtex | acceptance ratio = 30% ]
[36] M. R. Farhadi, B. C. M. Fung, P. Charland, and M. Debbabi. BinClone: detecting code clones in malware. In Proceedings of the 8th IEEE International Conference on Software Security and Reliability (SERE), pages 78-87, San Francisco, CA: IEEE Reliability Society, June 2014.
[ full paper | bibtex | source code - BinClone | acceptance ratio = 30% | the conference has been renamed as IEEE QRS since 2015 ]
[35] A. K. Hmood, B. C. M. Fung, and F. Iqbal. Privacy-preserving medical reports publishing for cluster analysis. In Proceedings of the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS): Security Track, pages 1-8, Dubai, UAE: IEEE Computer Society, March 2014.
[ full paper | bibtex ]
[34] B. C. M. Fung, Y. Jin, and J. Li. Preserving privacy and frequent sharing patterns for social network data publishing. In Proceedings of the 5th IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), pages 479-485, Niagara Falls, Canada: IEEE Computer Society, August 2013.
[ short paper | bibtex | acceptance ratio: 28% = 13% + 15% ]
[33] J. Liu, K. Wang, and B. C. M. Fung. Direct discovery of high utility itemsets without candidate generation. In Proceedings of the 12th IEEE International Conference on Data Mining (ICDM), pages 984-989, Brussels, Belgium: IEEE Computer Society, December 2012.
[ short paper | bibtex | acceptance ratio: 20% = (81+70)/756 ]
[32] F. Iqbal, B. C. M. Fung, and M. Debbabi. Mining criminal networks from chat log. In Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT), pages 332-337, Macau: IEEE Computer Society, December 2012.
[ research track short paper | bibtex ]
[31] L. Bonomi, L. Xiong, R. Chen, and B. C. M. Fung. Frequent grams based embedding for privacy preserving record linkage. In Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), pages 1597-1601, Maui, HI: ACM Press, October 2012.
[ database track short paper | bibtex | acceptance ratio: 27.7% = (146+156)/1088 ]
[30] P. Charland, B. C. M. Fung, and M. R. Farhadi. Clone search for malicious code correlation. In Proceedings of the NATO RTO Symposium on Information Assurance and Cyber Defense (STO-MP-IST-111), pages 1.1-1.12, Koblenz, Germany, September 2012.
[ full paper | bibtex | first runner-up for the best paper award ]
[29] R. Chen, B. C. M. Fung, B. C. Desai, and N. M. Sossou. Differentially private transit data publication: a case study on the Montreal transportation system. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 213-221, Beijing, China: ACM Press, August 2012.
[ full paper with oral presentation | slides | poster | bibtex | acceptance ratio: 17.6% = 133/755 ]
[ This paper presents a differentially-private sanitization method for sequential data published by a single data provider. ]
[28] D. Alhadidi, N. Mohammed, B. C. M. Fung, and M. Debbabi. Secure distributed framework for achieving ε-differential privacy. In Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS), LNCS 7834, pages 120-139, Vigo, Spain: Springer-Verlag, July 2012.
[ full paper | slides | bibtex | acceptance ratio: 22.2% = 16/72 ]
[ This paper presents a secure protocol to achieve differential privacy in a horizontally-partitioned data owned by different data providers. ]
[27] H. AbuSharkh and B. C. M. Fung. Service-oriented architecture for sharing private spatial-temporal data. In Proceedings of the IEEE International Conference on Cloud and Service Computing (CSC), pages 40-47, Hong Kong: IEEE Computer Society, December 2011.
[ full paper | slides | bibtex ]
[ This paper presents a SOA to achieve LKC-privacy on spatial-temporal data. It is an extension of the ICDM08 paper, which focuses on anonymizing transaction data. ]
[26] S. Goryczka, L. Xiong, and B. C. M. Fung. m-privacy for collaborative data publishing. In Proceedings of the 7th IEEE International Conference on Collaborative Computing (CollaborateCom), 10 pages, Orlando, FL, October 2011.
[ full paper | slides | bibtex ]
[25] N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 493-501, San Diego, CA: ACM Press, August 2011.
[ full paper with oral presentation | slides | poster | bibtex | software with source code - DiffGen | acceptance ratio (with oral presentation): 7.8% = 56/714 ]
[ This paper presents a differentially-private sanitization method for relational data published by a single data provider. ]
[24] R. Chen and B. C. M. Fung. A unified RFID data anonymization platform. In Proceedings of the 5th IEEE International Conference on RFID, pages 95-96, Orlando, FL: IEEE Communications Society, April 2011.
[ poster paper | poster | bibtex ]
[23] R. Al-Zaidy, B. C. M. Fung, and A. M. Youssef. Towards discovering criminal communities from textual data. In Proceedings of the 26th ACM SIGAPP Symposium on Applied Computing (SAC), pages 172-177, TaiChung, Taiwan: ACM Press, March 2011.
[ computer forensics track full paper | slides | bibtex | acceptance ratio: 30% = 237/790 ]
[22] S. Ray, M. F. Nizam, S. Das, and B. C. M. Fung. Verification of data pattern for interactive privacy preservation model. In Proceedings of the 26th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1716-1723, TaiChung, Taiwan: ACM Press, March 2011.
[ TRECK track full paper | bibtex | acceptance ratio: 30% = 237/790 ]
[ This paper is an extension of a course project in INSE 6180. ]
[21] P. Shi, L. Xiong, and B. C. M. Fung. Anonymizing data with quasi-sensitive attribute values. In Proceedings of the 19th ACM Conference on Information and Knowledge Management (CIKM), pages 1389-1392, Toronto, Canada: ACM Press, October 2010.
[ database track short paper | poster | bibtex | acceptance ratio: 34.7% = (123+171)/847 ]
[20] F. Iqbal, L. A. Khan, B. C. M. Fung, and M. Debbabi. E-mail authorship verification for forensic investigation. In Proceedings of the 25th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1591-1598, Sierre, Switzerland: ACM Press, March 2010.
[ computer forensics track full paper | slides | bibtex | acceptance ratio: 25% ]
[19] H. Binsalleeh, N. Mohammed, P. S. Sandhu, F. Aljumah, and B. C. M. Fung. Using RFID tags to improve pilgrimage management. In Proceedings of the 6th IEEE International Conference on Innovations in Information Technology (IIT), pages 1-5, Al Ain, United Arab Emirates: IEEE Communications Society, December 2009.
[ full paper | bibtex ]
[18] N. Mohammed, B. C. M. Fung, and M. Debbabi. Walking in the crowd: anonymizing trajectory data for pattern analysis. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pages 1441-1444, Hong Kong: ACM Press, November 2009.
[ database track short paper | poster | bibtex ]
[ This paper uses global suppressions to achieve LKC-privacy while preserving frequent sequences in trajectory data. See the technical report for details. ]
[17] T. Trojer, B. C. M. Fung, and P. C. K. Hung. Service-oriented architecture for privacy-preserving data mashup. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS), pages 767-774, Los Angeles, CA: IEEE Computer Society Press, July 2009.
[ industrial track full paper | slides | bibtex | acceptance ratio: 18% = 61/339 ]
[ See TSC11 for an extended version. ]
[16] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Anonymizing healthcare data: a case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285-1294, Paris, France: ACM Press, June 2009.
[ industrial track full paper | video presentation | slides | bibtex | software with source code - PAIS | acceptance ratio: 10% | best student paper award ]
[ This paper presents an anonymization method to achieve LKC-privacy for relational data published by a single data provider. See TKDD10 for an extended version. ]
[15] Y. Wang, L. Wang, and B. C. M. Fung. Preserving privacy for location-based services with continuous queries. In Proceedings of the 12th IEEE International Conference on Communications (ICC): Communication and Information Systems Security, pages 1-5, Dresden, Germany: IEEE Press, June 2009.
[ full paper | slides | bibtex | acceptance ratio: 28% ]
[14] J. Singh, Q. Shi, H. Sandhu, and B. C. M. Fung. Anonymizing location-based data. In Proceedings of the 2009 C3S2E, pages 27-33, Montreal, Canada: ACM Press, May 2009.
[ full paper | slides | bibtex | acceptance ratio: 17% ]
[13] B. C. M. Fung, K. Al-Hussaeni, and M. Cao. Preserving RFID data privacy. In Proceedings of the 2009 IEEE International Conference on RFID, pages 200-207, Orlando, FL: IEEE Communications Society, April 2009.
[ full paper | slides | bibtex | acceptance ratio: 27% = 47/175 ]
[ This paper is an extension of SAC09. The primary contribution of this paper is to present experimental results conducted on real-life data. See Concordia Technical Report 6850 for an extended version. ]
[12] N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung. Privacy-preserving data mashup. In Proceedings of the 12th International Conference on Extending Database Technology (EDBT), pages 228-239, Saint-Petersburg, Russia: ACM Press, March 2009.
[ research track full paper | slides | bibtex | average acceptance ratio: 16% ]
[ See VLDBJ11 for an extended version to malicious participants. ]
[ See ICWS11 and TSC11 for extensions to SOA and high-dimensional data anonymization. ]
[11] B. C. M. Fung, M. Cao, B. C. Desai, and H. Xu. Privacy protection for RFID data. In Proceedings of the 24th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1528-1535, Honolulu, HI: ACM Press, March 2009.
[ database track full paper | slides | bibtex | acceptance ratio: 29% = 316/1084 ]
[ This paper uses global suppressions to achieve LKC-privacy for RFID data while preserving general information usefulness. See Concordia Technical Report 6850 for an extended version. ]
[10] Y. Xu, B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM), pages 1109-1114, Pisa, Italy: IEEE Computer Society, December 2008.
[ short paper | slides | slides with audio | bibtex | acceptance ratio: 19.9% = (70+74)/724 ]
[9] Y. Zhu, B. C. M. Fung, D. Mu, and Y. Li. An efficient hybrid document clustering method. In Proceedings of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), volume 2, pages 395-399, Shandong, China, August 2008.
[ full paper | bibtex ]
[8] B. C. M. Fung, K. Wang, L. Wang, and M. Debbabi. A framework for privacy-preserving cluster analysis. In Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 46-51, Taipei, Taiwan, June 2008.
[ full paper | slides | bibtex | acceptance ratio: 22% ]
[ See DKE09 for an extended version. ]
[7] B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proceedings of the 11th International Conference on Extending Database Technology (EDBT), pages 264-275, Nantes, France: ACM Press, March 2008.
[ research track full paper | slides | bibtex | research track acceptance ratio: 16.7% = 52/311 ]
[6] Y. H. Zhu, G. Z. Dai, B. C. M. Fung, and D. J. Mu. Document Clustering Method based on Frequent Co-Occurring Words. In Proceedings of the 20th Pacific Asia Conference on Language, Information and Computation (PACLIC), pages 442-445, November 2006.
[ short paper | bibtex ]
[5] K. Wang and B. C. M. Fung. Anonymizing sequential releases. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 414-423, Philadelphia, PA: ACM Press, August 2006.
[ research track full paper | slides | bibtex | research track acceptance ratio: 10.9% = 50/457 ]
[4] K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In Proceedings of the 5th IEEE International Conference on Data Mining (ICDM), pages 466-473, Houston, TX: IEEE Computer Society, November 2005.
[ full paper | slides | bibtex | acceptance ratio: 11.0% = 69/630 ]
[ Selected as one of the best papers to appear in Knowledge and Information Systems ]
[ See KAIS07 for an extended version. ]
[3] K. Wang, B. C. M. Fung, and G. Dong. Integrating private databases for data analysis. In Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics (ISI), Lecture Notes in Computer Science (LNCS), 3495, pages 171-182, Atlanta, GA: Springer-Verlag, May 2005.
[ full paper | slides | bibtex |
© Springer-Verlag | accepted 28 full papers ]
[ See EDBT09 for an extended version. ]
[2] B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE), pages 205-216, Tokyo, Japan: IEEE Computer Society, April 2005.
[ research track full paper | slides | bibtex | software with source code: enhanced version in SIGKDD09: PAIS | one of the top 3 most cited papers in ICDE05 | research track acceptance ratio: 12.9% = 67/521 ]
[ See TKDE07 for an extended version. ]
[1] B. C. M. Fung, K. Wang, and M. Ester. Hierarchical document clustering using frequent itemsets. In Proceedings of the 3rd SIAM International Conference on Data Mining (SDM), pages 59-70, San Francisco, CA: SIAM, May 2003.
[ full paper | slides | bibtex | software - FIHC | acceptance ratio: 19.8% = 21/106 | Crawl-By-Example ]

Book

[1] B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques, ser. Data Mining and Knowledge Discovery. 376 pages, Chapman & Hall/CRC, August 2010.
[ book | bibtex | ISBN: 9781420091489 ]

Refereed Book Chapters

[5] B. C. M. Fung, Y. Jin, J. Li, and J. Liu. Recommendation and Search in Social Networks, chapter Anonymizing social network data for maximal frequent-sharing pattern mining. Lecture Notes in Social Networks (LNSN), pages 77-100, February 2015. Springer.
[ book chapter | bibtex | This book chapter is an extension of ASONAM13. ]
[4] T. Trojer, C. K. Lee, B. C. M. Fung, L. Narupiyakul, and P. C. K. Hung. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, chapter Privacy-aware health information sharing, pages 315-349, ser. Data Mining and Knowledge Discovery. Chapman & Hall/CRC, December 2010.
[ book chapter | bibtex ]
[3] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, 2nd ed., chapter Hierarchical document clustering, pages 970-975. Idea Group, Hershey, PA, August 2008.
[ book chapter | bibtex |
© Idea Group ]
[2] B. C. M. Fung. The Encyclopedia of Portal Technologies and Applications, chapter Privacy-preserving data portals, pages 842-847. Idea Group, Hershey, PA, June 2007.
[ book chapter | bibtex |
© Idea Group ]
[1] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, chapter Hierarchical document clustering, pages 555-559. Idea Group, Hershey, PA, July 2005.
[ book chapter | bibtex |
© Idea Group ]

Editorials

[2] D. Ślęzak, B. C. M. Fung, and W. K. Cheung (Eds.). Fundamenta Informaticae: Special Issue on Domain Knowledge in Knowledge Discovery and Privacy-Aware Intelligent Systems, 137(2):171-304, March 2015. IOS Press.
[ editorial | bibtex | JCR impact factor in 2014: 0.717, 5-year: 0.712 ]
[1] Y. Zeng, K.-Y. Kim, V. Raskin, B. C. M. Fung, and Y. Kitamura (Eds.). Advanced Engineering Informatics (ADVEI): Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems, 27(1), January 2013. Elsevier.
[ editorial | bibtex | JCR impact factor in 2012: 1.593, 5-year: 1.708 ]

Tutorials

[1] L. Guerrouj, B. C. M. Fung, D. Lo, F. Khomh, and A. Hamou-Lhadj. Mining textual data for software engineering. In Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), Lincoln, NB: IEEE Computer Society, November 2015.
[ tutorial | bibtex ]

Presentations, Posters and, Abstracts

[3] F. Fortin, S. Meloche, R. Bhateja, and B. C. M. Fung. Prédire la menace grâce au machine learning: étude de cas. In Colloque GARDESO, Montreal, Canada, June 2017.
[ abstract | bibtex ]
[2] O. Rahman and B. C. M. Fung. A cross-cultural perspective on fashion selection and consumption. In Proceedings of The End of Fashion: an international conference and exhibition, 2 pages, Wellington, New Zealand, December 2016.
[ abstract | bibtex ]
[1] S. H. H. Ding, B. C. M. Fung, and P. Charland. Kam1n0: simplifying reverse engineering of software for security analysis. In Research Showcase of the Smart Cybersecurity Network (SERENE-RISC) Fall Workshop, Ottawa, ON, October 2016.
[ poster | bibtex | best poster award ]

Magazine Articles

[3] T. Kolody and B. C. M. Fung. Cyber Security: Technology and the Law, and Cybercrime. World Economic Forum (WEF) TopLink, 4 pages, April 2017.
[ summary of 2 cyber security key issues for world leaders | bibtex ]
[2] T. Braun and B. C. M. Fung. Cyber Security: Cyber War, Critical Infrastructure Protection, Privacy, System Risk and Resilience, New Norms of Collaboration, Cybercrime, and Security of Things. World Economic Forum (WEF) TopLink, 14 pages, June 2016.
[ summaries of 7 cyber security key issues for world leaders | prominently featured on the Transformation Map of WEF's year-in-review | bibtex ]
[1] N. Mohammed and B. C. M. Fung. Privacy-preserving data publishing. PenTest Magazine: Pentester's Development Kit, 3(5):16-22, August 2013.
[ magazine article | bibtex ]

Technical Reports

[12] D. Tweed and B. C. M. Fung. Demonstration of a secure credential transfer protocol. Technical Report, McAlear Management Inc., 11 pages, February 2017.
[ report | bibtex | source code ]
[11] S. H. H. Ding, B. C. M. Fung, and M. R. Farhadi. Assembly code data mining: design and prototyping (part 5). Technical Report W7701-155902/001/QCL (TA05), Defence Research and Development Canada, 18 pages, February 2017.
[ report | bibtex ]
[10] S. H. H. Ding, B. C. M. Fung, and M. R. Farhadi. Assembly code data mining: design and prototyping (part 4). Technical Report W7701-155902/001/QCL (TA04), Defence Research and Development Canada, 17 pages, January 2017.
[ report | bibtex ]
[9] S. H. H. Ding, B. C. M. Fung, and K. Zhao. Assembly code data mining: design and prototyping (part 3). Technical Report W7701-155902/001/QCL (TA02), Defence Research and Development Canada, 36 pages, March 2016.
[ report | bibtex ]
[8] S. H. H. Ding, B. C. M. Fung, and K. Zhao. Assembly code data mining: porting to other platforms. Technical Report W7701-155902/001/QCL (TA03), Defence Research and Development Canada, 35 pages, February 2016.
[ report | bibtex ]
[7] B. C. M. Fung, S. H. H. Ding, and K. Zhao. Assembly code data mining: design and prototyping (part 2). Technical Report W7701-155902/001/QCL (TA01), Defence Research and Development Canada, 41 pages, January 2016.
[ report | bibtex ]
[6] B. C. M. Fung, S. H. H. Ding, M. R. Farhadi, and K. Zhao. Assembly code data mining: design and prototyping (part 1). Technical Report W7701-155902/001/QCL (Firm Portion), Defence Research and Development Canada, 36 pages, March 2015.
[ report | bibtex ]
[5] M. R. Farhadi, B. C. M. Fung, S. Preda, and M. Debbabi. Progress update on the implementation of assembly code clone detection systems. Technical Report, Defence Research and Development Canada, 18 pages, January 2014.
[ report | bibtex ]
[4] Y. B. Fung, M. R. Farhadi, and B. C. M. Fung. Semantic code clone search. Technical Report, Defence Research and Development Canada, 23 pages, March 2013.
[ report | bibtex ]
[3] B. C. M. Fung, M. R. Farhadi, and M. Debbabi. Assembly code clone search. Technical Report, Defence Research and Development Canada, 71 pages, March 2012.
[ report | bibtex ]
[2] B. C. M. Fung, T. Ormerod, A. Boukhetouta, M. R. Farhadi, and M. Debbabi. A survey of assembly code analysis techniques. Technical Report, Defence Research and Development Canada, 98 pages, September 2011.
[ report | bibtex ]
[1] N. Mohammed, B. C. M. Fung, and M. Debbabi. Preserving Privacy and Utility in RFID Data Publishing. Technical Report 6850, Concordia University, Montreal, QC, Canada, October 2010.
[ report | bibtex ]

Theses

[2] B. C. M. Fung. Privacy-preserving data publishing. Ph.D. thesis, Simon Fraser University, Burnaby, BC, Canada, May 2007.
[ thesis | bibtex ]
[1] B. C. M. Fung. Hierarchical document clustering using frequent itemsets. Master's thesis, Simon Fraser University, Burnaby, BC, Canada, September 2002.
[ thesis | bibtex ]