Mining public opinion about economic issues: Twitter and the us presidential election A Karami, LS Bennett, X He International Journal of Strategic Decision Sciences (IJSDS) 9 (1), 18-28, 2018 | 120 | 2018 |
Effective anonymization of query logs Y Hong, X He, J Vaidya, N Adam, V Atluri Proceedings of the 18th ACM conference on Information and knowledge …, 2009 | 62 | 2009 |
Preserving privacy in social networks: A structure-aware approach X He, J Vaidya, B Shafiq, N Adam, V Atluri 2009 IEEE/WIC/ACM International Joint Conference on Web Intelligence and …, 2009 | 50 | 2009 |
Privacy preserving integration of health care data N Adam, T White, B Shafiq, J Vaidya, X He AMIA Annual Symposium proceedings 2007, 1, 2007 | 23 | 2007 |
Is social media a fad? A study of the adoption and use of social media in SMEs X He | 15 | 2014 |
The effects of consumer engagement behavior on the growth of social media brand community: Evidence from an SME X He, A Negahban International Journal of E-Business Research (IJEBR) 13 (1), 25-43, 2017 | 14 | 2017 |
Reachability analysis in privacy-preserving perturbed graphs X He, J Vaidya, B Shafiq, N Adam, X Lin 2010 IEEE/WIC/ACM International Conference on Web Intelligence and …, 2010 | 14 | 2010 |
Catch a fad or capture a value?: Social media leverage in SMEs X He, H Lu Journal of Organizational and End User Computing (JOEUC) 28 (3), 67-81, 2016 | 13 | 2016 |
Examining the effects of online social relations on product ratings and adoption: evidence from an online social networking and rating site X He, A Karami, C Deng International Journal of Web Based Communities 13 (3), 344-363, 2017 | 10 | 2017 |
Towards ranking the importance of patents X He, F Zhang, N Adam 2008 IEEE Symposium on Advanced Management of Information for Globalized …, 2008 | 8 | 2008 |
Privacy-preserving link discovery X He, B Shafiq, J Vaidya, N Adam Proceedings of the 2008 ACM symposium on Applied computing, 909-915, 2008 | 8 | 2008 |
Efficient privacy-preserving link discovery X He, J Vaidya, B Shafiq, N Adam, E Terzi, T Grandison Advances in Knowledge Discovery and Data Mining: 13th Pacific-Asia …, 2009 | 6 | 2009 |
Usability test of personality type within a roommate matching website: A case study M Shekhawat, S Deshmukh, G Monroy, A Tiwari, X He, H Shin, Y Hong, ... Journal of International Technology and Information Management 25 (1), 5, 2016 | 5 | 2016 |
Secure construction and publication of contingency tables from distributed data X He, H Lu, J Vaidya, N Adam Journal of Computer Security 19 (3), 453-484, 2011 | 5 | 2011 |
Patent citations and value: through the lens of a social network approach F Zhang, G Jiang, X He International Journal of Management and Network Economics 4 (2), 115-143, 2018 | 4 | 2018 |
Privacy preserving integration of health care data X He, J Vaidya, B Shafiq, N Adam, T White Innovations in Data Methodologies and Computational Algorithms for Medical …, 2012 | 4 | 2012 |
Teaching introductory programming online: Lessons learned X He | 3 | 2020 |
Fault-tolerant tile mining H Lu, W Zhu, J Phan, M Ghiassi, Y Fang, Y Hong, X He Expert Systems with Applications 101, 25-42, 2018 | 2 | 2018 |
What Makes Video Ads Viral: Quantifying the Impact of Marketer-and User-Generated Content C Deng, Y Lu, T Ravichandran, X He | 2 | 2016 |
Secure construction of contingency tables from distributed data H Lu, X He, J Vaidya, N Adam Data and Applications Security XXII: 22nd Annual IFIP WG 11.3 Working …, 2008 | 2 | 2008 |