ZJU VAI
Home
Blog
Members
Publications
Projects
Talks
Contact
Xumeng Wang
Visual Analytics
Privacy Preservation
Latest
FraudAuditor: A Visual Analytics Approach for Collusive Fraud in Health Insurance
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Collusive fraud, in which multiple fraudsters collude to defraud health insurance funds, threatens the operation of the healthcare …
Jiehui Zhou
,
Xumeng Wang
,
Jie Wang
,
Hui Ye
,
Huanliang Wang
,
Zihan Zhou
,
Dongming Han
,
Haochao Ying
,
Jian Wu
,
Wei Chen
PDF
Video
Cite
DOI
CohortVA: A Visual Analytic System for Interactive Exploration of Cohorts based on Historical Data
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
In history research, cohort analysis seeks to identify social structures and figure mobilities by studying the group-based behavior of …
Wei Zhang
,
Jason K. Wong
,
Xumeng Wang
,
Youcheng Gong
,
Rongchen Zhu
,
Kai Liu
,
Zihan Yan
,
Siwei Tan
,
Huamin Qu
,
Siming Chen
,
Wei Chen
Cite
DOI
DPVisCreator: Incorporating Pattern Constraints to Privacy-preserving Visualizations via Differential Privacy
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Data privacy is an essential issue in publishing data visualizations. However, it is challenging to represent multiple data patterns in …
Jiehui Zhou
,
Xumeng Wang
,
Jason K. Wong
,
Huanliang Wang
,
Zhongwei Wang
,
Xiaoyu Yang
,
Xiaoran Yan
,
Haozhe Feng
,
Huamin Qu
,
Haochao Ying
,
Wei Chen
PDF
Code
Video
Cite
DOI
HetVis: A Visual Analysis Approach for Identifying Data Heterogeneity in Horizontal Federated Learning
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Horizontal federated learning (HFL) enables distributed clients to train a shared model and keep their data privacy. In training …
Xumeng Wang
,
Wei Chen
,
Jiazhi Xia
,
Zhen Wen
,
Rongchen Zhu
,
Tobias Schreck
Cite
DOI
Umbra: A Visual Analysis Approach for Defense Construction Against Inference Attacks on Sensitive Information
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Collecting and analyzing anonymous personal information is required as a part of data analysis processes, such as medical diagnosis and …
Xumeng Wang
,
Chris Bryan
,
Yiran Li
,
Rusheng Pan
,
Yanling Liu
,
Wei Chen
,
Kwan-Liu Ma
Cite
DOI
ConceptExplorer: Visual Analysis of Concept Drifts in Multi-source Time-series Data
IEEE VAST
|
IEEE Conference on Visual Analytics Science and Technology
Time-series data is widely studied in various scenarios, like weather forecast, stock market, customer behavior analysis. To …
Xumeng Wang
,
Wei Chen
,
Jiazhi Xia
,
Zexian Chen
,
Dongshi Xu
,
Xiangyang Wu
,
Mingliang Xu
,
Tobias Schreck
PDF
Video
Cite
A User Study on the Capability of Three Geo-Based Features in Analyzing and Locating Trajectories.
IEEE TITS
|
IEEE Transactions on Intelligent Transportation Systems
Visual analysis is widely applied to study human mobility due to the ability in integrating contextual information multiple data …
Xumeng Wang
,
Tianlong Gu
,
Xiwen Cai
,
Tianyi Lao
,
Wenlong Chen
,
Yingcai Wu
,
Jinhui Yu
,
Wei Chen
PDF
Cite
GraphProtector: A Visual Interface for Employing and Assessing Multiple Privacy Preserving Graph Algorithms.
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Analyzing social networks reveals the relationships between individuals and groups in the data. However, such analysis can also lead to …
Xumeng Wang
,
Wei Chen
,
Jia-Kai Chou
,
Chris Bryan
,
Huihua Guan
,
Wenlong Chen
,
Rusheng Pan
,
Kwan-Liu Ma
PDF
Slides
Video
Video
Cite
Relationlines: Visual Reasoning of Egocentric Relations from Heterogeneous Urban Data
ACM TIST
|
ACM Transactions on Intelligent Systems and Technology
The increased accessibility of urban sensor data and the popularity of social network applications is enabling the discovery of crowd …
Wei Chen
,
Jing Xia
,
Xumeng Wang
,
Yi Wang
,
Jun Chen
,
Tianlong Gu
PDF
Cite
A Utility-aware Visual Approach for Anonymizing Multi-attribute Tabular Data.
IEEE TVCG
|
IEEE Transactions on Visualization and Computer Graphics
Sharing data for public usage requires sanitization to prevent sensitive information from leaking. Previous studies have presented …
Xumeng Wang
,
Jia-Kai Chou
,
Wei Chen
,
Huihua Guan
,
Wenlong Chen
,
Tianyi Lao Kwan-Liu Ma
PDF
Video
Video
Cite
Cite
×