Benjamin Fung
#110,240
Most Influential Person Now
Researcher
Benjamin Fung's AcademicInfluence.com Rankings
Benjamin Fungcomputer-science Degrees
Computer Science
#4761
World Rank
#5026
Historical Rank
Data Mining
#156
World Rank
#156
Historical Rank
Database
#6816
World Rank
#7055
Historical Rank
Download Badge
Computer Science
Why Is Benjamin Fung Influential?
(Suggest an Edit or Addition)According to Wikipedia, Benjamin Fung is a Hong Kong-born Canadian computer scientist. Fung holds the positions of Canada Research Chair in Data Mining for Cybersecurity and Full Professor in the School of Information Studies at McGill University. His research focuses on developing data mining and machine learning methods in the areas of cyber security, data privacy, malware analysis, and authorship analysis.
Benjamin Fung's Published Works
Published Works
- Privacy-preserving data publishing: A survey of recent developments (2010) (1719)
- Top-down specialization for information and privacy preservation (2005) (674)
- Hierarchical Document Clustering using Frequent Itemsets (2003) (529)
- A systematic procedure to study the influence of occupant behavior on building energy consumption (2011) (513)
- A decision tree method for building energy demand modeling (2010) (478)
- Anonymizing Classification Data for Privacy Preservation (2007) (416)
- Differentially private data release for data mining (2011) (366)
- Anonymizing sequential releases (2006) (273)
- Publishing set-valued data via differential privacy (2011) (244)
- Privacy-preserving trajectory data publishing by local suppression (2013) (223)
- Differentially private transit data publication: a case study on the montreal transportation system (2012) (213)
- Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization (2019) (192)
- Mining writeprints from anonymous e-mails for forensic investigation (2010) (188)
- Security and privacy challenges in smart cities (2018) (185)
- Direct Discovery of High Utility Itemsets without Candidate Generation (2012) (174)
- Correlated network data publication via differential privacy (2013) (174)
- Centralized and Distributed Anonymization for High-Dimensional Healthcare Data (2010) (164)
- Handicapping attacker's confidence: an alternative to k-anonymization (2007) (145)
- Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques (2010) (143)
- A novel approach of mining write-prints for authorship attribution in e-mail forensics (2008) (142)
- A review of the-state-of-the-art in data-driven approaches for building energy prediction (2020) (140)
- Template-based privacy preservation in classification problems (2005) (138)
- Anonymity for continuous data publishing (2008) (131)
- Detecting breaking news rumors of emerging topics in social media (2020) (124)
- Privacy-preserving data publishing (2007) (121)
- Mining High Utility Patterns in One Phase without Generating Candidates (2016) (119)
- A novel methodology for knowledge discovery through mining associations between building operational data (2012) (119)
- Anonymizing healthcare data: a case study on the blood transfusion service (2009) (115)
- A unified data mining solution for authorship analysis in anonymous textual communications (2013) (112)
- A methodology for identifying and improving occupant behavior in residential buildings (2011) (109)
- Advances and challenges in building engineering and data mining applications for energy-efficient communities (2016) (101)
- m-Privacy for collaborative data publishing (2011) (91)
- Privacy-preserving data publishing for cluster analysis (2009) (83)
- Anonymity meets game theory: secure data integration with malicious participants (2011) (81)
- Walking in the crowd: anonymizing trajectory data for pattern analysis (2009) (79)
- Extracting knowledge from building-related data — A data mining framework (2013) (78)
- Privacy-preserving data mashup (2009) (77)
- Learning Stylometric Representations for Authorship Analysis (2016) (76)
- Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data (2014) (74)
- Differentially Private Trajectory Data Publication (2011) (70)
- A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction (2019) (68)
- Mining criminal networks from unstructured text documents (2012) (67)
- BinClone: Detecting Code Clones in Malware (2014) (67)
- e-mail authorship verification for forensic investigation (2010) (66)
- Publishing Sensitive Transactions for Itemset Utility (2008) (62)
- Service-Oriented Architecture for High-Dimensional Private Data Mashup (2012) (62)
- Development of building energy saving advisory: A data mining approach (2018) (61)
- Hierarchical Document Clustering (2009) (59)
- Anonymizing trajectory data for passenger flow analysis (2014) (55)
- Integrating Private Databases for Data Analysis (2005) (54)
- Privacy-preserving heterogeneous health data sharing (2013) (51)
- Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering (2016) (48)
- Privacy-preserving trajectory stream publishing (2014) (44)
- Secure Distributed Framework for Achieving ε-Differential Privacy (2012) (41)
- Privacy protection for RFID data (2009) (39)
- Quantifying the costs and benefits of privacy-preserving health data publishing (2014) (39)
- Systematic approach to provide building occupants with feedback to reduce energy consumption (2020) (38)
- Frequent grams based embedding for privacy preserving record linkage (2012) (38)
- Medical Concept Embedding with Multiple Ontological Representations (2019) (37)
- E-mail authorship attribution using customized associative classification (2015) (37)
- Product customization of tablet computers based on the information of online reviews by customers (2015) (35)
- Development of a ranking procedure for energy performance evaluation of buildings based on occupant behavior (2019) (33)
- Malware classification and composition analysis: A survey of recent developments (2021) (31)
- A cross-national study of apparel consumer preferences and the role of product-evaluative cues (2017) (30)
- Scalable code clone search for malware analysis (2015) (28)
- Anonymizing data with quasi-sensitive attribute values (2010) (27)
- Wordnet-Based Criminal Networks Mining for Cybercrime Investigation (2019) (27)
- SafePath: Differentially-private publishing of passenger trajectories in transportation systems (2018) (26)
- A Visualizable Evidence-Driven Approach for Authorship Attribution (2015) (25)
- Mining Criminal Networks from Chat Log (2012) (25)
- Subject-based semantic document clustering for digital forensic investigations (2013) (25)
- Preserving RFID data privacy (2009) (22)
- Young Chinese Consumers’ Choice between Product-Related and Sustainable Cues—The Effects of Gender Differences and Consumer Innovativeness (2020) (21)
- Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption (2015) (20)
- Parallel Eclat for Opportunistic Mining of Frequent Itemsets (2015) (19)
- Preserving Privacy and Utility in RFID DataPublishing (2010) (19)
- Service-Oriented Architecture for Privacy-Preserving Data Mashup (2009) (19)
- D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups (2014) (18)
- Towards discovering criminal communities from textual data (2011) (18)
- Mining known attack patterns from security-related events (2015) (18)
- Analyzing topics and authors in chat logs for crime investigation (2014) (17)
- A framework for privacy-preserving cluster analysis (2008) (17)
- Learning Phenotypes and Dynamic Patient Representations via RNN Regularized Collective Non-Negative Tensor Factorization (2019) (16)
- Revealing determinant factors for early breast cancer recurrence by decision tree (2017) (16)
- ER-AE: Differentially Private Text Generation for Authorship Anonymization (2019) (16)
- A study of apparel consumer behaviour in China and Taiwan (2018) (15)
- Investigating the relation between lexical smells and change- and fault-proneness: an empirical study (2017) (15)
- Preserving privacy and frequent sharing patterns for social network data publishing (2013) (14)
- Preserving Privacy for Location-Based Services with Continuous Queries (2009) (14)
- Exploring the Meanings of Hijab through Online Comments in Canada (2016) (13)
- Privacy-preserving data mashup model for trading person-specific information (2016) (12)
- Privacy Preserving Record Linkage via grams Projections (2012) (12)
- Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care (2019) (11)
- Arabic Authorship Attribution (2018) (11)
- Improving interpretations of topic modeling in microblogs (2018) (11)
- Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup (2015) (10)
- I-MAD: Interpretable malware detector using Galaxy Transformer (2019) (10)
- Differentially private multidimensional data publishing (2018) (9)
- Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning (2019) (9)
- Authorship Verification (2020) (9)
- Season-Based Occupancy Prediction in Residential Buildings Using Machine Learning Models (2021) (8)
- Opportunistic mining of top-n high utility patterns (2018) (8)
- sf SecDM: privacy-preserving data outsourcing framework with differential privacy (2020) (8)
- Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization (2018) (8)
- Using RFID tags to improve pilgrimage management (2009) (8)
- A Study of Children Facial Recognition for Privacy in Smart TV (2016) (8)
- An Efficient Hybrid Hierarchical Document Clustering Method (2008) (7)
- I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer (2019) (7)
- Modeling, extraction, and transformation of semantics in computer aided engineering systems (2013) (7)
- Differentially private data publishing for arbitrarily partitioned data (2021) (7)
- The Topic Confusion Task: A Novel Evaluation Scenario for Authorship Attribution (2021) (7)
- Clone Search for Malicious Code Correlation (2012) (6)
- Trends and Applications in Knowledge Discovery and Data Mining (2018) (6)
- TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling (2021) (6)
- Privacy-Aware Health Information Sharing (2010) (5)
- A cross-national study of young female consumer behaviour, innovativeness and apparel evaluation: China and India (2019) (5)
- Detecting High-Engaging Breaking News Rumors in Social Media (2020) (5)
- Anonymizing Social Network Data for Maximal Frequent-Sharing Pattern Mining (2015) (5)
- An Advanced Noise Reduction and Edge Enhancement Algorithm (2021) (5)
- Embedding for Anomaly Detection on Health Insurance Claims (2020) (5)
- Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information (2021) (5)
- Trade-off Between Accuracy and Fairness of Data-driven Building and Indoor Environment Models: A Comparative Study of Pre-processing Methods (2021) (5)
- Document Clustering Method Based on Frequent Co-occurring Words (2006) (5)
- Using data mining to analyse fashion consumers’ preferences from a cross-national perspective (2014) (4)
- Heterogeneous data release for cluster analysis with differential privacy (2020) (4)
- Machine Learning for Authorship Attribution and Cyber Forensics (2020) (4)
- A Security Study for Smart Metering Systems (2018) (3)
- Panel: The State of Data: Invited Paper from panelists (2016) (3)
- Artificial Intelligence And Digital Forensics (2020) (3)
- Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting (2021) (3)
- Anonymizing location-based RFID data (2009) (3)
- VirtualGAN: Reducing Mode Collapse in Generative Adversarial Networks Using Virtual Mapping (2021) (3)
- Learning Inter-Modal Correspondence and Phenotypes From Multi-Modal Electronic Health Records (2020) (2)
- Deep learning-enabled anomaly detection for IoT systems (2022) (2)
- Encyclopedia of Data Warehousing and Mining Volume I A-h Idea Group Reference 0 Hierarchical Document Clustering (2006) (2)
- SecDM\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \usepackage{upgreek} \setlength{\oddsidemargin}{-69pt} \begin{document}$${\textsf {SecDM}}$$\end{document}: privacy-preserving data outsou (2019) (2)
- Secure Distributed Data Anonymization and Integration with m-Privacy (2013) (2)
- Verification of data pattern for interactive privacy preservation model (2011) (2)
- Service-oriented architecture for sharing private spatial-temporal data (2011) (2)
- The Topic Confusion Task: A Novel Scenario for Authorship Attribution (2021) (2)
- Factors influencing consumer choice: a study of apparel and sustainable cues from Canadian and Indian consumers’ perspectives (2021) (2)
- DUGRA: Dual-Graph Representation Learning for Health Information Networks (2020) (2)
- Smart TV Face Monitoring for Children Privacy (2018) (1)
- Distinguishing between fake news and satire with transformers (2022) (1)
- Privacy-Preserving Medical Reports Publishing for Cluster Analysis (2014) (1)
- Product customization of tablet computers based on the information of online reviews by customers (2013) (1)
- Privacy Preserving Data Portals (2007) (1)
- Extracting knowledge from building-related data — A data mining framework (2013) (1)
- Authorship Analysis Approaches (2020) (1)
- Image Dehazing in Disproportionate Haze Distributions (2021) (1)
- Authorship Attribution Using Customized Associative Classification (2020) (1)
- Analyzing topics and authors in chat logs for crime investigation (2013) (1)
- Automatic Fall Risk Detection based on Imbalanced Data (2021) (1)
- Cybersecurity And Cybercrime Investigation (2020) (1)
- Correlated network data publication via differential privacy (2013) (1)
- Towards Adaptive Cybersecurity for Green IoT (2022) (1)
- Enabling Technologies for Energy Cloud (2021) (1)
- Tweet-to-Act: Towards Tweet-Mining Framework for Extracting Terrorist Attack-related Information and Reporting (2021) (1)
- Writeprint Mining For Authorship Attribution (2020) (1)
- The generalizability of pre-processing techniques on the accuracy and fairness of data-driven building models: a case study (2022) (1)
- DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense (2022) (1)
- Anonymization for Classification Analysis: A Case Study on the Red Cross (2010) (0)
- The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions (2023) (0)
- An Efficient Collaborative Data Publishing by M-Privacy Technique (2017) (0)
- Analyzing Network Level Information (2020) (0)
- In-Processing Fairness Improvement Methods for Regression Data-Driven Building Models: Achieving Uniform Energy Prediction (2022) (0)
- Mining textual data for software engineering (2015) (0)
- Investigating the relation between lexical smells and change- and fault-proneness: an empirical study (2016) (0)
- VDGraph2Vec: Vulnerability Detection in Assembly Code using Message Passing Neural Networks (2022) (0)
- A Novel and Dedicated Machine Learning Model for Malware Classification (2021) (0)
- A Data Mining Analysis of Cross-Regional Study of Apparel Consumption (2021) (0)
- A Unified RFID Data Anonymization Platform (2011) (0)
- Authorship Characterization (2020) (0)
- Extended Data Publishing Scenarios (2010) (0)
- Anonymization for Data Mining (2010) (0)
- Anonymizing Transaction Data (2010) (0)
- Anonymizing Complex Data (2010) (0)
- A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques (2022) (0)
- Multiple Views Publishing (2010) (0)
- Preface to the fourth IEEE workshop on privacy aspects of data mining (2013) (0)
- A Cross-National Study of Consumer Behaviour, Innovativeness and Apparel (2019) (0)
- Other Privacy-Preserving Techniques and Future Trends (2010) (0)
- Criminal Information Mining (2020) (0)
- Differentially private multidimensional data publishing (2017) (0)
- H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection (2022) (0)
- Messaging Forensics In Perspective (2020) (0)
- Differentially Private Release of Heterogeneous Network for Managing Healthcare Data (2023) (0)
- Preface (2015) (0)
- Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications (2022) (0)
- A Novel Neural Network-Based Malware Severity Classification System (2021) (0)
- Collaborative Anonymization for Vertically Partitioned Data (2010) (0)
- TR-2011-004 m-privacy for collaborative data publishing (2012) (0)
- Anonymizing Sequential Releases with New Attributes (2010) (0)
- Deep Learning-based Stress Determinator for Mouse Psychiatric Analysis using Hippocampus Activity (2020) (0)
- Revealing determinant factors for early breast cancer recurrence by decision tree (2017) (0)
- JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence (2022) (0)
- VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution (2023) (0)
- Tutorial : Mining textual data for software engineering (2015) (0)
- Anonymization for Classification Analysis (2010) (0)
- PETSE 2011 Organizing Committee (2011) (0)
- Anonymizing Incrementally Updated Data Records (2010) (0)
- Anonymization for Cluster Analysis (2010) (0)
- Collaborative Anonymization for Horizontally Partitioned Data (2010) (0)
- Achieving Multidimensional K-Anonymity by a Greedy Approach (2017) (0)
- Authorship Attribution With Few Training Samples (2020) (0)
- Sanitizing Textual Data (2010) (0)
- The 43rd Annual Meeting of the Canadian College of Neuropsychopharmacology, November 4, 2021 (2022) (0)
- An Efficient and Secure Protocol for Querying High-Dimensional Data in the Cloud Technical Report (2015) (0)
- Attack Models and Privacy Models (2010) (0)
- Anonymizing Trajectory Data (2010) (0)
- On the Effectiveness of Interpretable Feedforward Neural Network (2021) (0)
This paper list is powered by the following services:
Other Resources About Benjamin Fung
What Schools Are Affiliated With Benjamin Fung?
Benjamin Fung is affiliated with the following schools: