Wendy Hui Wang
Associate Professor
Stevens Institute of Technology
Department of Computer Science
Castle Point on Hudson
Hoboken, NJ 07030

Office: Babbio 620
Phone: +1 201-216-8736
Fax: +1 201-216-8249
Email: Hui.Wang AT stevens DOT edu
[Bio] [Research]| [Teaching]| [Publication| [Service&Activities]| [Talks]| [Students]

Brief Bio:
Dr. Hui (wendy) Wang is an associate professor of Computer Science Department of the Stevens Institute of Technology. She received her Ph.D. from University of British Columbia, Vancouver, Canada. Her research interests lie on database management and data mining in general, with particular focus on database security and data privacy. She was awarded NSF CAREER award in 2014 for her research in verifiable computations in cloud computing.

Full CV

 

Research Interests: 

  • Database security
  • Data privacy
  • Semi-structured (XML) Database
  • Data mining
  • Data management on networks
  • Semantic Web
Note to prospective students: I am recruiting well-motivated and hard-working doctoral students who are interested in information security&privacy and database management. If you are interested, please send me email with your CV and transcripts.

Teaching:

Selected Publications:

  • Journal
    • Ruilin Liu, Hui Wang. Hiding Outliers into Crowd: Privacy-preserving Data publishing with Outliers. Elsevier Data & Knowledge Engineering (DKE) 100: 94 - 115. 2015
    • Boxiang Dong, Ruilin Liu, Hui Wang. Trust-but-Verify: Verifying Result Correctness of Outsourced Frequent Itemset Mining. IEEE Transaction of Service Computing 9(1): 18 - 32 (2016)
    • Hongbo Liu, Hui Wang, Yingying Chen, Dayong Jia. Defending against Frequency-based Attacks on Distributed Data Storage in Wireless Networks. Transactions on Sensor Networks [pdf]. In press.
    • Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, Timos Sellis. Optimizing XML Queries: Bitmapped Materialized Views vs. Indexes [pdf], Information System 38(6): 863-884 (2013).
    • Xiuyuan Zheng, Yingying Chen, Hui Wang, Hongbo Liu, Ruilin Liu, Neighborhood Prediction Based Decentralized Key Management for Mobile Wireless Networks [pdf], Wireless Networks 19(6): 1387-1406 (2013).
    • Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, Hui (Wendy) Wang, Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases in Clouds [pdf], IEEE Systems Journal 7(3): 385-395 (2013).
    • Juan Li, Hui Wang, Samee Ullah Khan, Qingrui Li, Albert Y. Zomaya, "A Fully Distributed Scheme for Disceroy of Semantic Relationships", Transactions on Services Computing (Impact factor: 3.7 (2011)), in press.
    • Juan Li, Hui Wang, Samee U. Khan, "A Semantics-Based Approach to Large-Scale Mobile Social Networking", in Journal of Mobile Networks and Applications (Impact factor: 1.013 (2009)), Volume 17, Issue (2) (2012), Page 192-205.
    • Ruilin LIu, Xiuyuan Zheng, Hongbo Liu, Hui Wang, Yingying Chen, "Metadata-guided evaluation of resource-constrained queries in content caching based wireless networks", Wireless networks: Volum 17, Issue 8 (2011), Page 1833-1850.
    • Francesco Bonchi, Laks V.S. Lakshmanan, Hui Wendy Wang, Trajectory Anonymity in Publishing Personal Mobility Data [pdf], SIGKDD Exploration, Volume 13, Issue 1, 2011.
    • Hui Wang, Ruilin Liu, "Privacy-Preserving Publishing Microdata with Full Functional Dependencies", in Journal of Data & Knowledge Engineering (DKE) (Impact Factor: 1.745 5-Year Impact Factor: 2.036). [pdf], Volume 70, Issue 3, March, 2011
    • Yingying Chen, Hui Wang, Xiuyuan Zheng, and Jie Yang, "A Reinforcement Learning-Based Framework for Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks", in EURASIP Journal on Wireless Communications and Networking, vol. 2010, Article ID 319275, June 2010.
    • Hui Wang, "Privacy-preserving data publishing in cloud computing", Vol.25, No. 3, May 2010, Journal of Computer Science and Technology. [pdf]
    • Nicolas Bruno, Hui Wang, "The Threshold Algorithm: from Middleware Systems to the Relational Engine", IEEE Transaction on Knowledge and Data Engineering (TKDE), Volume 19, No. 4, April 2007. [pdf]
  • Conferences
    • Bo Zhang, Boxiang Dong and Hui Wang. Budget-constrained Result Integrity Verification of Outsourced Data Mining Computations. The 31st Annual IFIP WG 11.3 Conference on Data and Applications Security and Privacy (DBSec), Philadelphia, PA, July 19-21, 2017. Acceptance rate: 0.35
    • Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang and Hui Wang. Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. The 37th IEEE International Conference on Distributed Computing (ICDCS) 2017, June 5 - 8, 2017, Atlanta, GA.
    • Xinyang Zhang, Shouling Ji, Hui Wang and Ting Wang. MDL: Accurate and Private Multiparty Deep Learning. The 37th IEEE International Conference on Distributed Computing (ICDCS) 2017, June 5 - 8, 2017, Atlanta, GA.
    • Yanying Li, Boxiang Dong, Dominik Jedruszczak and Hui Wang. Budget-constrained High-quality Data Purchase on Data Markets. Workshop of Women in Data Science. Co-located with SIAM International Conference on Data Mining (SDM), April 27 - 29, 2017, Houston, Texas, USA
    • Boxiang Dong, Hui Wang. Frequency-hiding Dependency-preserving Encryption for Outsourced Databases. IEEE International Conference on Data Engineering (ICDE). April 19 - 22, 2017, San Diego, California.
    • Yijin Li, Hui Wang. Similarity Recoverable, Format-preserving String Encryption. The 18th Asia Pacific Web Conference (APWeb). Sept 23 - 25, 2016, Suzhou, China.
    • Boxiang Dong, Hui Wang. ARM: Authenticated Approximate Record Matching for Outsourced Databases. In the IEEE 17th International Conference on Information Reuse and Integration (IRI), Pittsburgh, PA, July 28 - 30, 2016. Acceptance rate: 25.6%.
    • Hui Wang, Yu Tao, Kai Wang. Developing Online Privacy Education Tools with Inputs from the Crowd. The 22nd Americas Conference on Information Systems (AMCIS). San Diego, August 11 - 14, 2016.
    • Anna Monreale, Hui Wang. Privacy-preserved Data Mining in Cloud (Invited paper). SIMICE workshop, colocated with the 40th IEEE Computer Society International Conference on Computers, Software & Applications. Atlanta, Georgia, June 10-14, 2016.
    • Boxiang, Hui Wang, Jie Yang. Secure Data Outsourcing with Adversarial Data Dependency Constraints. The IEEE International Conference on Big Data Security on Cloud (BigDataSecurity 2016). New York. April 9 - 10, 2016.
    • Ruilin Liu, Wendy Wang. Result Integrity Verification of Outsource Privacy-preserving Frequent Itemset Mining, SIAM International Conference on Data Mining (SDM). Vancouver, Canada, Apri 30 - May 2, 2015.
    • Boxiang Dong, Ruilin Liu, Wendy Hui Wang. PraDa: Privacy-preserving Data-Deduplication-as-a-Service, ACM International Conference on Information and Knowledge Management (CIKM), Nov 3 - 7, 2014, Shanghai, P.R.China. Acceptance rate: 25/123 = 20%.
    • Ruilin Liu, Wendy Hui Wang, Changhe Yuan. Result Integrity Verification of Outsourced Bayesian Network Structure Learning [pdf], 2014 SIAM International Conference on Data Mining (SDM), April 24 - 26, 2014, Philadephia, Pennsylvania, USA.
    • Ruilin Liu, Wendy Hui Wang, Flip Korn. iCoDA: Interactive Exploratory Data Completeness Analysis [pdf], IEEE International Conference on Data Engineering (ICDE). Chicago, IL, March 31 - April 4, 2014.
    • Boxiang Dong, Ruilin Liu, Wendy Hui Wang. Integrity Verification of Outsourced Frequent Itemset Mining with Deterministic Guarantee [pdf], IEEE International Conference on Data Mining (ICDM), Dec. 2013. Acceptance rate: 159/809 = 19.7%.
    • Boxiang Dong, Ruilin Liu, Wendy Hui Wang, Result Integrity Verification of Outsourced Frequent Itemset Mining [pdf]. The 27th Annual IFIP WG 11.3 Working Conference on Data and Applications Security and Privacy, Newark, NJ, July 15 -17, 2013.
    • Anna Monreale, Wendy Hui Wang, Francesca Pratesi, Salvatore Rinzivillo, Dino Pedreschi, Gennady Andrienko, Natalia Andrienko, Privacy-preserving Distributed Movement Data Aggregation [pdf], 16th AGILE Conference on Geographic Information Science, 14-17 May 2013, Leuven, Belgium.
    • Ruilin Liu, Hui(Wendy) Wang, Philippos Mordohai, Hui Xiong. Integrity Verification of K-means Clustering Outsourced to Infrastructure as a Service (IaaS) Providers [pdf], 2013 SIAM International Conference on Data Mining (SDM), May 2 - 4, 2013, Austi, Texas, USA.
    • Flip Korn, Ruilin Liu, Hui Wang. Understanding Data Completeness in Network Monitoring Systems (Full paper; 10.7% acceptance rate for 756 submissions) [pdf]. The IEEE International Conference on Data Mining (ICDM), Dec 10 - 13, 2012.
    • Hui Wang, Integrity Verification of Cloud-hosted Data Analytics Computations [pdf], VLDB Cloud Intelligence workshop, August 27 -31, 2012, Istanbul, Turkey.
    • Ruilin Liu, Hui Wang, Anna Monreale, Dino Pedreschi, Fosca Giannotti, Wenge Guo, AUDIO: An Integrity Auditing Framework of Outlier-mining-as-a-service Systems [pdf], The Euopean Conference on Machine Learning and Principles and Practice of Knowledge Discovry in Databases (ECML/PKDD), (acceptance ratio: 109/443=23%), September 24 - 28, 2012, Bristol, UK.
    • Fosca Giannotti, Laks V. S. Lakshmanan, Anna Monreale, Dino Pedreschi, Wendy Hui Wang: Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases. Twentieth Italian Symposium on Advanced Database Systems (SEBD): 233-242. June 24 - 27, 2012, Venice, Italy.
    • Qingrui Li, Juan Li, Hui Wang, Ashok Ginjala, "Semantics-enhanced Privacy Recommendation for Social Networking Sites", The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 11), Changsha, China, November 16-18, 2011.
    • Hui Wang, Ruilin Liu, Dimitri Theodoratos and Xiaoying Wu, "Efficient Storage and Temporal Query Evaluation in Hierarchical Data Archiving Systems", 23rd Scientific and Statistical Database Management Conference (SSDBM'11), July 20-22, 2011, Portland, OR, USA
    • Xiuyuan Zheng, Hui Wang, Yingying Chen, Hongbo Liu, Ruilin Liu, "A Decentralized Key Management Scheme via Neighborhood Prediction in Mobile Wireless Networks", the 7th IEEE International Conference on Mobile Ad-hoc and Sensor Systems (MASS 2010), acceptance ratio: 51/185=0.28), Nov. 8-12, 2010, San Francisco, CA. [pdf]
    • Angela Bonifati, Hui Wang, Ruilin Liu, "SPAC: A Distributed, Peer-to-Peer, Secure and Privacy-aware Social Space", the 19th International Conference on Information and Knowledge Management (CIKM'10), Demo track, Oct. 26 - 30, 2010, Toronto, Canada.
    • Angela Bonifati, Hui Wang, Ruilin Liu, "Distributed and Secure Access Control in P2P Databases", the 24th Annual IFIP WG 11.3 Working Conference on Data and Applications Security (DBSec), June 21 - 23, 2010, Rome, Italy. [pdf]
    • Hongbo Liu, Hui Wang, Yingying Chen, "Ensuring Data Storage Security against Frequency-based Attacks in Wireless Networks", The 6th IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS '10), June 21 - 23, 2010, Santa Barbara, California. [pdf]
    • Juan Li, Hui Wang, "Distributed Discovery of Semantic Relationships", IEEE International Workshop on Knowledge Management for Future Services and Networks (KMFSAN), April 23, 2010, Osaka, Japan. [pdf]
    • Chih-Cheng Chang, Brian Thompson, Hui Wang, Danfeng Yao, "Towards Publishing Recommendation Data With Predictive Anonymization", ACM Symposium on Information, Computer and Communications Security (AsiaCCS), April 13-16, 2010, Beijing, China (Acceptance ratio: 25/166=0.15). [pdf]
    • Hui Wang, Ruilin Liu, "Privacy-Preserving Publishing Data with Full Functional Dependencies", International Conference on Database Systems for Advanced Applications (DASFAA), April 1-4, 2010, Tsukuba, Japan (Acceptance ratio: 55/237=0.23). [pdf]
    • Fosca Giannotti, Laks V.S. Lakshmanan, Anna Monreale, Dino Pedreschi, Hui Wang, "Privacy-preserving Mining of Association Rules from Outsourced Transaction Databases" (position paper), the workshop on Security and Privacy in Cloud Computing (SPCC2010), in conjunction with the international conference on Computers, Privacy and Data Protection, January, 2010, Brussels, Belgium. [pdf]
    • Hui Wang, Ruilin Liu, Xiuyuan Zheng, Yingying Chen, Hongbo Liu, "To Do or Not to Do: Metadata-guided Query Evaluation in Content Caching Networks", IEEE Globecom, Nov. 30 - Dec. 4, 2009, Hawaii, USA. [pdf]
    • Xiaoying Wu, Dimitri Theodoratos, Wendy Hui Wang, "Answering XML Queries Using Materialized Views Revisited", Full paper (acceptance ratio: 123/847 = 14.5%), The 18th ACM Conference on Information and Knowledge Management (CIKM), November 2-6, 2009, Hong Kong, China. [pdf]
    • Yingying Chen, Hui Wang, Xiuyuan Zheng, Jie Yang, "Prediction of Near Likely Nodes in Data-Centric Mobile Wireless Networks", in Proceedings of IEEE MILCOM, Oct 18 - 21, 2009, Boston, USA. [pdf]
    • Ruilin Liu, Hui Wang. "Integrity Verification of Outsourced XML Databases". IEEE International Conference on Privacy, Security, Risk and Trust (PASSAT-09)(Acceptance ratio: 15%). August 29-31, 2009, Vancouver, Canada. [pdf]
    • Brian Thompson, Chih-Cheng Chang, Hui Wang, Danfeng Yao. "Privacy-aware publishing of Netflix data". IEEE Security & Privacy Symposium, Oakland, May 17-20, 2009. Extended Abstract. [pdf]
    • Hui Wang, Ruilin Liu, "Hiding Distinguished Ones into Crowd: Privacy-Preserving Publishing Data with Outliers", the 12th International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 23-26, 2009 (Average acceptance ratio: 16%). [pdf]
    • Roman Yarovoy, Francesco Bonchi, Laks V. S. Lakshmanan, Hui Wang, "Anonymizing Moving Objects: How to Hide a MOB in a Crowd?", the 12th International Conference on Extending Database Technology (EDBT), Saint-Petersburg, Russia, March 23-26, 2009 (Average acceptance ratio: 16%). [pdf]
    • Hui Wang, "Ambiguity: Hide the Presence of Individuals and Their Privacy with Low Information Loss", the 14th International Conference on Management of Data (COMAD), Mumbai, India, Dec 17 - 19, 2008 (acceptance ratio: 38%). [pdf]
    • Hui Wang, Laks V.S. Lakshmanan, "Probabilistic Privacy Analysis of Published Views", Workshop on Privacy in the Electronic Society (WPES), CCS, Alexandria, VA USA, Oct. 2006. [pdf]
    • Hui Wang, Laks V.S Lakshmanan, Efficient Secure Query Evaluation over Encrypted XML Database. VLDB'06. [pdf] .
    • Laks V.S Lakshmanan, Hui Wang, Jessica Zheng Zhao, "Answering Tree Pattern Queries Using Views". VLDB'06. [pdf]
    • Laks V.S Lakshmanan, Ganesh Ramesh, Hui Wang, Jessica Zheng Zhao, "Testing Satisfiability of Tree Pattern Queries". VLDB'04. [pdf] .
  • Book Chapter
    • Hui Wang, Divesh Srivastava, Laks V.S. Lakshmanan, Sungran Cho, Sihem Amer-Yahia, "Optimizing Tree Pattern Queries over Secure XML Databases", Book "Security in Decentralized Data Management", Springer, 2006. [pdf]

Students:

  • Previous Students
    • Ruilin Liu (PhD., first employment: Huawei Ltd., Bridgewater, NJ)
    • Boxiang Dong (PhD., first employment: Assistant professor, Montclair State University, NJ)
    • Yijin Li (MSc., first employment: Apple Inc.)
    • Junning Tong (MSc., first employment: Nasdaq)
  • Current students
    • Bo Zhang (Ph.D, joined Fall 2015)
    • Haipei Sun (Ph.D, joined Fall 2016)
    • Yanying Li (Ph.D), joined Spring 2017)