Recguru: Adversarial learning of generalized user representations for cross-domain recommendation C Li, M Zhao, H Zhang, C Yu, L Cheng, G Shu, B Kong, D Niu Proceedings of the fifteenth ACM international conference on web search and …, 2022 | 45 | 2022 |
Privacy-preserving similarity joins over encrypted data X Yuan, X Wang, C Wang, C Yu, S Nutanong IEEE Transactions on Information Forensics and Security 12 (11), 2763-2775, 2017 | 41 | 2017 |
TransRec: Learning Transferable Recommendation from Mixture-of-Modality Feedback J Wang, F Yuan, M Cheng, JM Jose, C Yu, B Kong, Z Wang, H Bo, L Zang arXiv preprint arXiv:2206.06190, 2022 | 39* | 2022 |
A fast LSH-based similarity search method for multivariate time series C Yu, L Luo, LLH Chan, T Rakthanmanon, S Nutanong Information Sciences 476, 337-356, 2019 | 33 | 2019 |
Systems and methods for privacy-assured similarity joins over encrypted datasets C Wang, S Nutanong, X Yuan, X Wang, C Yu US Patent 10,496,638, 2019 | 29 | 2019 |
A generic method for accelerating LSH-based similarity join processing C Yu, S Nutanong, H Li, C Wang, X Yuan IEEE Transactions on Knowledge and Data Engineering 29 (4), 712-726, 2016 | 29 | 2016 |
Tenrec: A large-scale multipurpose benchmark dataset for recommender systems G Yuan, F Yuan, Y Li, B Kong, S Li, L Chen, M Yang, C Yu, B Hu, Z Li, ... Advances in Neural Information Processing Systems 35, 11480-11493, 2022 | 28* | 2022 |
$ CAG $: Stylometric authorship attribution of multi-author documents using a co-authorship graph R Sarwar, N Urailertprasert, N Vannaboot, C Yu, T Rakthanmanon, ... IEEE Access 8, 18374-18393, 2020 | 26 | 2020 |
A scalable framework for stylometric analysis query processing S Nutanong, C Yu, R Sarwar, P Xu, D Chow 2016 IEEE 16th International Conference on Data Mining (ICDM), 1125-1130, 2016 | 21 | 2016 |
A scalable framework for stylometric analysis of multi-author documents R Sarwar, C Yu, S Nutanong, N Urailertprasert, N Vannaboot, ... Database Systems for Advanced Applications: 23rd International Conference …, 2018 | 20 | 2018 |
An effective and scalable framework for authorship attribution query processing R Sarwar, C Yu, N Tungare, K Chitavisutthivong, S Sriratanawilai, Y Xu, ... IEEE Access 6, 50030-50048, 2018 | 19 | 2018 |
Secure MQ coder: An efficient way to protect JPEG 2000 images in wireless multimedia sensor networks T Xiang, C Yu, F Chen Signal Processing: Image Communication 29 (9), 1015-1027, 2014 | 19 | 2014 |
Degradative encryption: An efficient way to protect SPIHT compressed images T Xiang, J Qu, C Yu, X Fu Optics Communications 285 (24), 4891-4900, 2012 | 16 | 2012 |
C2Net: A network-efficient approach to collision counting LSH similarity join H Li, S Nutanong, H Xu, C Yu, F Ha IEEE Transactions on Knowledge and Data Engineering 31 (3), 423-436, 2018 | 12 | 2018 |
Fast encryption of JPEG 2000 images in wireless multimedia sensor networks T Xiang, C Yu, F Chen Wireless Algorithms, Systems, and Applications: 8th International Conference …, 2013 | 12 | 2013 |
One for all, all for one: Learning and transferring user embeddings for cross-domain recommendation C Li, Y Xie, C Yu, B Hu, Z Li, G Shu, X Qie, D Niu Proceedings of the Sixteenth ACM International Conference on Web Search and …, 2023 | 11 | 2023 |
A hardware-accelerated solution for hierarchical index-based merge-join Z Zhou, C Yu, S Nutanong, Y Cui, C Fu, CJ Xue IEEE Transactions on Knowledge and Data Engineering 31 (1), 91-104, 2018 | 10 | 2018 |
Research on the security of DICOM medical images based on improved AES encryption algorithm T Xiang, CY Yu, JY Qu, XS Luo Dianzi Xuebao(Acta Electronica Sinica) 40 (2), 406-411, 2012 | 4 | 2012 |
Cryptanalysis of secure arithmetic coding based on interval swapping T Xiang, C Yu, J Qu, X Fu 2011 8th International Conference & Expo on Emerging Technologies for a …, 2011 | 3 | 2011 |
Graph Neural Networks with Feature and Structure Aware Random Walk W Zhuo, C Yu, G Tan arXiv preprint arXiv:2111.10102, 2021 | 1 | 2021 |