Systematic clustering method for l-diversity model

Paper


Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Paper/Presentation Title

Systematic clustering method for l-diversity model

Presentation TypePaper
AuthorsKabir, Md Enamul (Author), Wang, Hua (Author), Bertino, Elisa (Author) and Chi, Yunxiang (Author)
EditorsShen, Heng Tao and Bouguettaya, Athman
Journal or Proceedings TitleConferences in Research and Practice in Information Technology (CRPIT)
ERA Conference ID42492
Journal Citation104, pp. 93-102
Number of Pages10
Year2010
Place of PublicationSydney, Australia
ISBN9781920682859
Web Address (URL) of Paperhttp://crpit.com/Vol104.html
Conference/EventADC 2010: 21st Australasian Conference on Database Technologies
Australasian Database Conference
Event Details
Australasian Database Conference
ADC
Rank
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
Event Details
ADC 2010: 21st Australasian Conference on Database Technologies
Event Date
18 to end of 22 Jan 2010
Event Location
Brisbane, Australia
Abstract

Nowadays privacy becomes a major concern and many research efforts have been dedicated to the development of privacy protecting technology. Anonymization techniques provide an e±cient approach to protect data privacy. We recently proposed a systematic clustering1 method based on k- anonymization technique that minimizes the information loss and at the same time assures data quality. In this paper, we extended our previous work on the systematic clustering method to l-diversity model that assumes that every group of indistinguishable records contains at least l distinct sensitive attributes values. The proposed technique adopts to group similar data together with l-diverse sensitive values and then anonymizes each group individually. The structure of systematic clustering problem for l-diversity model is defined, investigated through paradigm and is implemented in two steps, namely clustering step for k- anonymization and l-diverse step. Finally, two algorithms of the proposed problem in two steps are developed and shown that the time complexity is in O(n^2/k) in the first step, where n is the total number of records containing individuals concerning their privacy and k is the anonymity parameter for k-anonymization.

Keywordsprivacy; k-anonymity; l-diversity; systematic clustering
ANZSRC Field of Research 2020469999. Other information and computing sciences not elsewhere classified
460401. Cryptography
460508. Information retrieval and web search
Public Notes

File reproduced in accordance with the copyright policy of the publisher/author.

Byline AffiliationsDepartment of Mathematics and Computing
Purdue University, United States
Toowoomba Pearl Company, Australia
Permalink -

https://research.usq.edu.au/item/9zq5v/systematic-clustering-method-for-l-diversity-model

Download files


Accepted Version
Kabir_Wang_Bertino_Chi_AV.pdf
File access level: Anyone

  • 2006
    total views
  • 414
    total downloads
  • 7
    views this month
  • 1
    downloads this month

Export as

Related outputs

Socio-demographic factors and mental health trajectories in Australian children and primary carers: Implications for policy and intervention using latent class analysis
Afroz, Nahida, Kabir, Enamul and Alam, Khorshed. 2024. "Socio-demographic factors and mental health trajectories in Australian children and primary carers: Implications for policy and intervention using latent class analysis." Applied Psychology: Health and Well-Being. 16 (4), pp. 2147-2168. https://doi.org/10.1111/aphw.12584
An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network
Siuly, Siuly, Khare, Smith K., Kabir, Enamul, Sadiq, Muhammad Tariq and Wang, Hua. 2024. "An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network." Computers in Biology and Medicine. 174. https://doi.org/10.1016/j.compbiomed.2024.108462
Editorial: Education in public health: 2022
Orlando, Stefano, Kabir, Enamul, Harver, Andrew and Hu, Jie. 2024. "Editorial: Education in public health: 2022." Frontiers in Public Health. 12. https://doi.org/10.3389/fpubh.2024.1385350
Exploring the prevalence of depression, anxiety, and stress among university students in Bangladesh and their determinants
Kamruzzaman, Md., Hossain, Ahammad, Islam, Md. Aminul, Ahmed, Md. Shakil, Kabir, Enamul and Khan, Md. Nuruzzaman. 2024. "Exploring the prevalence of depression, anxiety, and stress among university students in Bangladesh and their determinants." Clinical Epidemiology and Global Health. 28. https://doi.org/10.1016/j.cegh.2024.101677
Impact of prenatal maternal dietary exclusion on childhood obesity and overweight risk
Horne, Brenton, Kabir, Enamul and Alam, Khorshed. 2024. "Impact of prenatal maternal dietary exclusion on childhood obesity and overweight risk." PLoS One. 19 (3). https://doi.org/10.1371/journal.pone.0297614
Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Investigating School Absenteeism and Refusal among Australian Children and Adolescents using Apriori Association Rule Mining
Haque, Umme Marzia, Kabir, Enamul and Khanam, Rasheda. 2024. "Investigating School Absenteeism and Refusal among Australian Children and Adolescents using Apriori Association Rule Mining." Scientific Reports. 14. https://doi.org/10.1038/s41598-024-51230-4
Exploring Frequency Band-Based Biomarkers of EEG Signals for Mild Cognitive Impairment Detection
Tawhid, Md. Nurul Ahad, Siuly, Siuly, Kabir, Enamul and Li, Yan. 2024. "Exploring Frequency Band-Based Biomarkers of EEG Signals for Mild Cognitive Impairment Detection." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 32, pp. 189-199. https://doi.org/10.1109/TNSRE.2023.3347032
Public opinion on COVID-19 pandemic in Bangladesh: Disruption to public lives and trust in government’s immunization performance
Biswas, Raaj Kishore, Afiaz, Awan, Huq, Samin, Farzana, Maysha and Kabir, Enamul. 2024. "Public opinion on COVID-19 pandemic in Bangladesh: Disruption to public lives and trust in government’s immunization performance." International Journal of Health Planning and Management. 39 (1), pp. 119-134. https://doi.org/10.1002/hpm.3721
Detection of Depression and Its Likelihood in Children and Adolescents: Evidence from a 15-Years Study
Haque, Umme Marzia, Kabir, Enamul and Khanam, Rasheda. 2023. "Detection of Depression and Its Likelihood in Children and Adolescents: Evidence from a 15-Years Study ." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Singapore . https://doi.org/10.1007/978-981-99-7108-4_1
Identifying social determinants and measuring socioeconomic inequalities in the use of four different mental health services by Australian adolescents aged 13-17 years: Results from a nationwide study
Islam, Md Irteja, Salam, Shumona Sharmin, Kabir, Enamul and Khanam, Rasheda. 2023. "Identifying social determinants and measuring socioeconomic inequalities in the use of four different mental health services by Australian adolescents aged 13-17 years: Results from a nationwide study." Healthcare. 11 (18). https://doi.org/10.3390/healthcare11182537
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
Early detection of paediatric and adolescent obsessive–compulsive, separation anxiety and attention deficit hyperactivity disorder using machine learning algorithms
Haque, Umme Marzia, Kabir, Enamul and Khanam, Rasheda. 2023. "Early detection of paediatric and adolescent obsessive–compulsive, separation anxiety and attention deficit hyperactivity disorder using machine learning algorithms." Health Information Science and Systems. 11 (1), pp. 1-14. https://doi.org/10.1007/s13755-023-00232-z
Public opinion on COVID-19 vaccine prioritization in Bangladesh: Who gets the vaccine and whom do you leave out?
Biswas, Raaj Kishore, Afiaz, Awan, Huq, Samin, Farzana, Maysha and Kabir, Enamul. 2023. "Public opinion on COVID-19 vaccine prioritization in Bangladesh: Who gets the vaccine and whom do you leave out? " Vaccine. 41 (34), pp. 5018-5028. https://doi.org/10.1016/j.vaccine.2023.06.050
Association of maternal physical and mental health characteristics with the hazard of having any medical condition or disability in Australian children: A 15-year birth cohort study
Ahmad, Kabir, Ormsby, Gail M., Kabir, Enamul and Khanam, Rasheda. 2023. "Association of maternal physical and mental health characteristics with the hazard of having any medical condition or disability in Australian children: A 15-year birth cohort study ." SSM - Population Health. 22. https://doi.org/10.1016/j.ssmph.2023.101385
The Healthcare Cost Burden of Asthma in Children: A Longitudinal Population-Based Study
Ahmad, Kabir, Khanam, Rasheda, Kabir, Enamul and Jurges, Hendrik. 2023. "The Healthcare Cost Burden of Asthma in Children: A Longitudinal Population-Based Study ." Value in Health. 26 (8), pp. 1201-1209. https://doi.org/10.1016/j.jval.2023.04.003
Clustering of lifestyle and health behaviours in Australian adolescents and associations with obesity, self-rated health and quality of life
Ahmad, Kabir, Keramat, Syed Afroz, Ormsby, Gail M., Kabir, Enamul and Khanam, Rasheda. 2023. "Clustering of lifestyle and health behaviours in Australian adolescents and associations with obesity, self-rated health and quality of life ." BMC Public Health. 23. https://doi.org/10.1186/s12889-023-15724-6
A latent class analysis of the socio-demographic factors and associations with mental and behavioral disorders among Australian children and adolescentss
Afroz, Nahida, Kabir, Enamul and Alam, Khorshed. 2023. "A latent class analysis of the socio-demographic factors and associations with mental and behavioral disorders among Australian children and adolescentss." PLoS One. 18 (5), p. e0285940. https://doi.org/10.1371/journal.pone.0285940
Determinants of maternal morbidity during pregnancy in urban Bangladesh
Hossain, Zakir, Afroz, Nilima, Sharmin, Sabina, Sharmin, Sayema and Kabir, Enamul. 2023. "Determinants of maternal morbidity during pregnancy in urban Bangladesh." PLoS One. 18 (2), pp. 1-11. https://doi.org/10.1371/journal.pone.0268487
Correction to: Working conditions and occupational stress among nurses in Bangladesh: a cross-sectional pilot study
Islam, Md Irteja, Alam, Kh Md Watin, Keramat, Syed Afroz, Murshid, Munzur E., Haque, Rezwanul, Kabir, Enamul, Khanam, Rasheda and Khan, Manjurul Haque. 2023. "Correction to: Working conditions and occupational stress among nurses in Bangladesh: a cross-sectional pilot study ." Journal of Public Health: Zeitschrift fuer Gesundheitswissenschaften. 31 (1), pp. 161-161. https://doi.org/10.1007/s10389-021-01482-5
Detection of Obsessive-Compulsive Disorder in Australian Children and Adolescents Using Machine Learning Methods
Haque, Umme Maezia, Kabir, Enamul and Khanam, Rasheda. 2022. "Detection of Obsessive-Compulsive Disorder in Australian Children and Adolescents Using Machine Learning Methods." Traina, Agma, Wang, Hua, Zhang, Yong and Siuly, Siuly (ed.) 11th International Conference on Health Information Science (HIS 2022). Biarritz, France 28 - 30 Oct 2022 Switzerland. https://doi.org/10.1007/978-3-031-20627-6_2
Carer involvement with children and child-friendly book ownership in Bangladesh
Biswas, Raaj Kishore, Arusha, Anowara Rayhan, Ananna, Nurjahan, Kabir, Enamul and Bhowmik, Jahar. 2023. "Carer involvement with children and child-friendly book ownership in Bangladesh." Children and Society: the international journal of childhood and children's services. 37 (2), pp. 326-342. https://doi.org/10.1111/chso.12594
Differences in levels of E. coli contamination of point of use drinking water in Bangladesh
Hasan, Md. Masud, Hoque, Zahirul, Kabir, Enamul and Hossain, Shahadut. 2022. "Differences in levels of E. coli contamination of point of use drinking water in Bangladesh." PLoS One. 17 (5), pp. 1-12. https://doi.org/10.1371/journal.pone.0267386
Association of infant and child health characteristics with the hazard of any medical condition or disability in Australian children
Ahmad, Kabir, Keramat, Syed Afroz, Sathi, Nusrat Jahan, Kabir, Enamul and Khanam, Rasheda. 2022. "Association of infant and child health characteristics with the hazard of any medical condition or disability in Australian children." Archives of Public Health. 80, pp. 1-11. https://doi.org/10.1186/s13690-022-00913-3
An assessment of random forest technique using simulation study: illustration with infant mortality in Bangladesh
Rahman, Atikur, Hossain, Zakir, Kabir, Enamul and Rois, Rumana. 2022. "An assessment of random forest technique using simulation study: illustration with infant mortality in Bangladesh." Health Information Science and Systems. 10 (1), pp. 1-8. https://doi.org/10.1007/s13755-022-00180-0
Determinants of children ever born among ever-married women in Bangladesh: evidence from the Demographic and Health Survey 2017–2018
Rahman, Atikur, Hossain, Zakir, Rahman, Mohammad Lutfor and Kabir, Enamul. 2022. "Determinants of children ever born among ever-married women in Bangladesh: evidence from the Demographic and Health Survey 2017–2018." BMJ Open. 12 (6), pp. 1-11. https://doi.org/10.1136/bmjopen-2021-055223
The gap between perceived mental health needs and actual service utilization in Australian adolescents
Islam, Md Irteja, Yunus, Fakir Md, Isha, Samia Naz, Kabir, Enamul, Khanam, Rasheda and Martiniuk, Alexandra. 2022. "The gap between perceived mental health needs and actual service utilization in Australian adolescents." Scientific Reports. 12, pp. 1-13. https://doi.org/10.1038/s41598-022-09352-0
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
Mental health services use among adolescent bullying victims in Australia: results from a nationwide survey
Islam, Md Irteja, Yunus, Fakir Md., Salam, Shumona Sharmin, Kabir, Enamul and Khanam, Rasheda. 2022. "Mental health services use among adolescent bullying victims in Australia: results from a nationwide survey." Children and Youth Services Review. 132, pp. 1-11. https://doi.org/10.1016/j.childyouth.2021.106312
Depression and anxiety have a larger impact on bullied girls than on boys to experience self-harm and suicidality: a mediation analysis
Islam, Md Irteja, Khanam, Rasheda and Kabir, Enamul. 2022. "Depression and anxiety have a larger impact on bullied girls than on boys to experience self-harm and suicidality: a mediation analysis." Journal of Affective Disorders. 297, pp. 250-258. https://doi.org/10.1016/j.jad.2021.10.061
Working conditions and occupational stress among nurses in Bangladesh: a cross-sectional pilot study
Islam, Md Irteja, Alam, Kh Md Watin, Keramat, Syed Afroz, Murshid, Munzur E., Haque, Rezwanul, Kabir, Enamul, Khanam, Rasheda and Khan, Manjurul Haque. 2022. "Working conditions and occupational stress among nurses in Bangladesh: a cross-sectional pilot study." Journal of Public Health: Zeitschrift fuer Gesundheitswissenschaften. 30 (9), pp. 2211-2219. https://doi.org/10.1007/s10389-020-01415-8
Detection of child depression using machine learning methods
Haque, Umme Marzia, Kabir, Enamul and Khanam, Rasheda. 2021. "Detection of child depression using machine learning methods." PLoS One. 16 (12), pp. 1-13. https://doi.org/10.1371/journal.pone.0261131
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Clustering of asthma and related comorbidities and their association with maternal health during pregnancy: evidence from an Australian birth cohort
Ahmad, Kabir, Kabir, Enamul, Ormsby, Gail M. and Khanam, Rasheda. 2021. "Clustering of asthma and related comorbidities and their association with maternal health during pregnancy: evidence from an Australian birth cohort." BMC Public Health. 21 (1), pp. 1-13. https://doi.org/10.1186/s12889-021-11997-x
Are wheezing, asthma and eczema in children associated with mother’s health during pregnancy? Evidence from an Australian birth cohort
Ahmad, Kabir, Kabir, Enamul, Ormsby, Gail M. and Khanam, Rasheda. 2021. "Are wheezing, asthma and eczema in children associated with mother’s health during pregnancy? Evidence from an Australian birth cohort." Archives of Public Health. 79 (1), pp. 1-18. https://doi.org/10.1186/s13690-021-00718-w
Effective Tensor Based PCA Machine Learning Techniques for Glaucoma Detection and ASPP – EffUnet Classification
Venkatachalam, K., Bacanin, Nebojsa, Kabir, Enamul and Parbu, P.. 2021. "Effective Tensor Based PCA Machine Learning Techniques for Glaucoma Detection and ASPP – EffUnet Classification ." Siuly, Siuly, Wang, Hua, Chen, Lu, Guo, Yanhui and Xing, Chunxiao (ed.) 10th International Conference on Health Information Science (HIS 2021). Melbourne, Australia 25 - 28 Oct 2021 Switzerland. https://doi.org/10.1007/978-3-030-90885-0_17
Machine learning algorithm for modelling infant mortality in Bangladesh
Rahman, Atikur, Hossain, Zakir, Kabir, Enamul and Rois, Rumana. 2021. "Machine learning algorithm for modelling infant mortality in Bangladesh." Siuly, Siuly, Wang, Hua, Chen, Lu, Guo, Yanhui and Xing, Chunxiao (ed.) 10th International Conference on Health Information Science (HIS 2021). Melbourne, Australia 25 - 28 Oct 2021 Switzerland. https://doi.org/10.1007/978-3-030-90885-0_19
A hybrid approach for COVID-19 detection using biogeography-based optimization and deep learning
Venkatachalam, K., Siuly, Siuly, Kumar, M. Vinoth, Lalwani, Praveen, Mishra, Manas and Kabir, Enamul. 2021. "A hybrid approach for COVID-19 detection using biogeography-based optimization and deep learning." Computers, Materials and Continua. 70 (2), pp. 3717-3732. https://doi.org/10.32604/cmc.2022.018487
Special issue on “Artificial Intelligence in Health Informatics”
Siuly, Siuly, Aickelin, Uwe, Kabir, Enamul, Huang, Zhisheng and Zhang, Yanchun. 2021. "Special issue on “Artificial Intelligence in Health Informatics”." Health Information Science and Systems. 9 (1), pp. 1-4. https://doi.org/10.1007/s13755-021-00155-7
Estimating income-related and area-based inequalities in mental health among nationally representative adolescents in Australia: the concentration index approach
Islam, Md Irteja, Ormsby, Gail M., Kabir, Enamul and Khanam, Rasheda. 2021. "Estimating income-related and area-based inequalities in mental health among nationally representative adolescents in Australia: the concentration index approach." PLoS One. 16 (9), pp. 1-14. https://doi.org/10.1371/journal.pone.0257573
Maternal health and health-related behaviours and their associations with child health: evidence from an Australian birth cohort
Ahmad, Kabir, Kabir, Enamul, Keramat, Sayed Afroz and Khanam, Rasheda. 2021. "Maternal health and health-related behaviours and their associations with child health: evidence from an Australian birth cohort." PLoS One. 16 (9), pp. 1-18. https://doi.org/10.1371/journal.pone.0257188
Resampling methods for generating continuous multivariate synthetic data for disclosure control
Khan, Atikur R. and Kabir, Enamul. 2021. "Resampling methods for generating continuous multivariate synthetic data for disclosure control." Journal of Data, Information and Management. 3, pp. 225-235. https://doi.org/10.1007/s42488-021-00054-2
A national assessment of elective cesarean sections in Bangladesh and the need for health literacy and accessibility
Afiaz, Awan, Arusha, Anowara Rayhan, Ananna, Nurjahan, Kabir, Enamul and Biswas, Raaj Kishore. 2021. "A national assessment of elective cesarean sections in Bangladesh and the need for health literacy and accessibility." Scientific Reports. 11 (1), pp. 1-12. https://doi.org/10.1038/s41598-021-96337-0
Evaluating Risk and Protective Factors for Suicidality and Self-Harm in Australian Adolescents With Traditional Bullying and Cyberbullying Victimizations
Islam, Md Irteja, Yunus, Fakir Md, Kabir, Enamul and Khanam, Rasheda. 2022. "Evaluating Risk and Protective Factors for Suicidality and Self-Harm in Australian Adolescents With Traditional Bullying and Cyberbullying Victimizations." American Journal of Health Promotion. 36 (1), pp. 73-83. https://doi.org/10.1177/08901171211034105
Smoker’s characteristics, general health and their perception of smoking in the social environment: a study of smokers in Rajshahi City, Bangladesh
Kamruzzaman, Md., Hossain, Ahammad and Kabir, Enamul. 2021. "Smoker’s characteristics, general health and their perception of smoking in the social environment: a study of smokers in Rajshahi City, Bangladesh." Journal of Public Health. 30 (6), pp. 1501-1512. https://doi.org/10.1007/s10389-020-01413-w
Interaction between the place of residence and wealth on the risk of overweight and obesity in Bangladeshi women
Ahmad, Kabir, Khanam, Taslima, Keramat, Sayed Afroz, Islam, Md. Irteja, Kabir, Enamul and Khanam, Rasheda. 2020. "Interaction between the place of residence and wealth on the risk of overweight and obesity in Bangladeshi women." PLoS One. 15 (12), pp. 1-15. https://doi.org/10.1371/journal.pone.0243349
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2021. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
Bullying victimization, mental disorders, suicidality and self-harm among Australian high schoolchildren: Evidence from nationwide data
Islam, Md. Irteja, Khanam, Rasheda and Kabir, Enamul. 2020. "Bullying victimization, mental disorders, suicidality and self-harm among Australian high schoolchildren: Evidence from nationwide data." Psychiatry Research. 292. https://doi.org/10.1016/j.psychres.2020.113364
The use of mental health services by Australian adolescents with mental disorders and suicidality: findings from a nationwide cross-sectional survey
Islam, Md. Irteja, Khanam, Rasheda and Kabir, Enamul. 2020. "The use of mental health services by Australian adolescents with mental disorders and suicidality: findings from a nationwide cross-sectional survey." PLoS One. 15 (4). https://doi.org/10.1371/journal.pone.0231180
Suicidality, mental disorder and the utilization of mental health services among Australian adolescents
Islam, Md. Irteja, Kabir, Enamul and Khanam, Rasheda. 2020. "Suicidality, mental disorder and the utilization of mental health services among Australian adolescents." Children and Youth Services Review. 111. https://doi.org/10.1016/j.childyouth.2020.104821
Modelling zero-truncated overdispersed antenatal health care count data of women in Bangladesh
Hossain, Zakir, Akter, Rozina, Sultana, Nasrin and Kabir, Enamul. 2020. "Modelling zero-truncated overdispersed antenatal health care count data of women in Bangladesh." PLoS One. 15 (1). https://doi.org/10.1371/journal.pone.0227824
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
Analysis of overdispersed antenatal health care count data
Hossain, Zakir and Kabir, Enamul. 2019. "Analysis of overdispersed antenatal health care count data." Melbourne International Business and Social Science Research Conference 2019. Melbourne, Australia 28 - 30 Sep 2019 Australia.
A pilot study to assess the effects of Tai Chi on health indicators in type 1 diabetes patients
Liu, Xin, Russell, Anthony, Kabir, Enamul and Brown, Wendy. 2019. "A pilot study to assess the effects of Tai Chi on health indicators in type 1 diabetes patients." Health. 11, pp. 341-350. https://doi.org/10.4236/health.2019.113030
A quantitative approach to influential factors in One Day International cricket: analysis based on Bangladesh
Khan, Jahidur Rahmna, Biswas, Raaj Kishore and Kabir, Enamul. 2019. "A quantitative approach to influential factors in One Day International cricket: analysis based on Bangladesh." Journal of Sports Analytics. 5, pp. 57-63. https://doi.org/10.3233/JSA-170260
Causes of urban migration in Bangladesh: evidence from the urban health survey
Biswas, Raaj Kishore, Kabir, Enamul and Khan, Hafiz T. A.. 2019. "Causes of urban migration in Bangladesh: evidence from the urban health survey." Population Research and Policy Review. 38 (4), pp. 593-614. https://doi.org/10.1007/s11113-019-09532-3
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
Presence of books for children in the households of Bangladesh: a district-wise distribution
Biswas, Raaj Kishore, Sarker, Elizabeth Bianca, Kabir, Enamul and Senserrick, Teresa. 2020. "Presence of books for children in the households of Bangladesh: a district-wise distribution." Reading and Writing Quarterly: overcoming learning difficulties. 36 (1), pp. 65-79. https://doi.org/10.1080/10573569.2019.1624665
Trend of child marriage in Bangladesh: a reflection on significant socioeconomic factors
Biswas, Raaj Kishore, Khan, Jahidur Rahman and Kabir, Enamul. 2019. "Trend of child marriage in Bangladesh: a reflection on significant socioeconomic factors." Children and Youth Services Review. 104, pp. 1-9. https://doi.org/10.1016/j.childyouth.2019.06.017
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
Cloud service description model: an extension of USDL for cloud services
Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
A New Way of Channel Selection in the Motor Imagery Classification for BCI Applications
Joadder, Md. A. Mannan, Siuly, Siuly and Kabir, Enamul. 2018. "A New Way of Channel Selection in the Motor Imagery Classification for BCI Applications ." Siuly, Siuly, Lee, Ickjai, Huang, Zhisheng, Zhou, Rui, Wang, Hua and Xiang, Wei (ed.) 7th International Conference on Health Information Science (HIS 2018). Cairns, Australia 05 - 07 Oct 2018 Switzerland. https://doi.org/10.1007/978-3-030-01078-2_10
Investment in research and development compared to military expenditure: is research worthwhile?
Biswas, Raaj Kishore, Kabir, Enamul and Rafi, Refat Bin Reza. 2019. "Investment in research and development compared to military expenditure: is research worthwhile?" Defence and Peace Economics. 30 (7), pp. 846-857. https://doi.org/10.1080/10242694.2018.1477235
A macro-level approach to assess the early developmental vulnerabilities of children in Australia: a local government area-based analysis
Biswas, Raaj Kishore and Kabir, Enamul. 2018. "A macro-level approach to assess the early developmental vulnerabilities of children in Australia: a local government area-based analysis." Children and Youth Services Review. 93, pp. 161-169. https://doi.org/10.1016/j.childyouth.2018.07.005
Socioeconomic transition and its influence on body mass index (BMI) pattern in Bangladesh
Biswas, Raaj Kishore, Kabir, Enamul and Khan, Hafiz T. A.. 2019. "Socioeconomic transition and its influence on body mass index (BMI) pattern in Bangladesh." Journal of Evaluation in Clinical Practice. 25 (1), pp. 130-141. https://doi.org/10.1111/jep.13028
Does income inequality matters for accessing health facility? Evidence from Bangladesh
Kabir, Enamul and Biswas, Raaj Kishore. 2018. "Does income inequality matters for accessing health facility? Evidence from Bangladesh." Melbourne International Business and Social Science Research Conference (MIBSRC 2018). Melbourne, Australia 27 - 28 Oct 2018 Australia.
Does national investment on R&D compared to military expenditure achieve greater development?
Kabir, Enamul, Biswas, Raaj and Rafi, Refat Bin Reza. 2017. "Does national investment on R&D compared to military expenditure achieve greater development?" Melbourne International Business and Social Science Research Conference 2017. Melbourne, Australia 28 - 30 Oct 2017 Australia.
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
BMI transitions in Australian women: amount and causes of weight change associated with progression from healthy to unhealthy BMI over 16 years
Brown, Wendy J., Kabir, Enamul, Gomersall, Sjaan and Clark, Bronwyn. 2017. "BMI transitions in Australian women: amount and causes of weight change associated with progression from healthy to unhealthy BMI over 16 years." 24th European Congress on Obesity (ECO2017). Porto, Portugal 17 - 20 May 2017
Women’s opinion on the justification of physical spousal violence: a quantitative approach to model the most vulnerable households in Bangladesh
Biswas, Raaj Kishore, Rahman, Nusma, Kabir, Enamul and Raihan, Farabi. 2017. "Women’s opinion on the justification of physical spousal violence: a quantitative approach to model the most vulnerable households in Bangladesh." PLoS One. 12 (11). https://doi.org/10.1371/journal.pone.0187884
Effect of sex and age on traumatic brain injury: a geographical comparative study
Biswas, Raaj Kishore, Kabir, Enamul and King, Rachel. 2017. "Effect of sex and age on traumatic brain injury: a geographical comparative study." Archives of Public Health. 75 (1). https://doi.org/10.1186/s13690-017-0211-y
Influence of distance between residence and health facilities on non-communicable diseases: an assessment over hypertension and diabetes in Bangladesh
Biswas, Raaj Kishore and Kabir, Enamul. 2017. "Influence of distance between residence and health facilities on non-communicable diseases: an assessment over hypertension and diabetes in Bangladesh." PLoS One. 12 (5). https://doi.org/10.1371/journal.pone.0177027
What factors should we focus on to prevent progression from healthy to unhealthy BMI in Australian women?
Brown, Wendy, Kabir, Enamul, Clark, Bronwyn and Gomersall, Sjaan. 2016. "What factors should we focus on to prevent progression from healthy to unhealthy BMI in Australian women?" 6th International Congress on Physical Activity and Public Health (ISPAH 2016). Bangkok, Thailand 16 - 19 Nov 2016 Thailand.
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Modeling of agricultural drought risk pattern using Markov chain and GIS in the western part of Bangladesh
Kamruzzaman, Md., Kabir, Md Enamul, Rahman, A. T. M. Sakiur, Jahan, Chowdhury Sarwar, Mazumder, Quamrul Hasan and Rahman, M. Sayedur. 2018. "Modeling of agricultural drought risk pattern using Markov chain and GIS in the western part of Bangladesh." Environment, Development and Sustainability: a multidisciplinary approach to the theory and practice of sustainable development. 20 (2), pp. 569-588. https://doi.org/10.1007/s10668-016-9898-0
Trade-off between Type I error and power: a requirement of robust technique for analysing ordinal outcomes
Biswas, Raaj, King, Rachel and Kabir, Enamul. 2016. "Trade-off between Type I error and power: a requirement of robust technique for analysing ordinal outcomes." Australian Statistical Conference 2016. Canberra, Australia 05 - 09 Dec 2016 Australia.
Maintaining a healthy BMI: data from a 16-year study of young Australian women
Brown, Wendy J., Kabir, Enamul, Clark, Bronwyn K. and Gomersall, Sjaan R.. 2016. "Maintaining a healthy BMI: data from a 16-year study of young Australian women." American Journal of Preventive Medicine. 51 (6), pp. e165-e178. https://doi.org/10.1016/j.amepre.2016.09.007
Spatio-temporal analysis of climatic variables in the western part of Bangladesh
Kamruzzaman, Md., Rahman, A. T. M. Sakiur, Ahmed, Md. Shakil, Kabir, Md Enamul, Mazumder, Quamrul Hasan, Rahman, M. Sayedur and Jahan, Chowdhury Sarwar. 2018. "Spatio-temporal analysis of climatic variables in the western part of Bangladesh." Environment, Development and Sustainability: a multidisciplinary approach to the theory and practice of sustainable development. 20 (1), pp. 89-108. https://doi.org/10.1007/s10668-016-9872-x
New multi-dimensional sorting based k-anonymity microaggregation for statistical disclosure control
Mahmood, Abdun Naser, Kabir, Md Enamul and Mustofa, Abdul K.. 2013. "New multi-dimensional sorting based k-anonymity microaggregation for statistical disclosure control." 8th International ICST Conference, SecureComm 2012: Security and Privacy in Communication Networks. Padua, Italy 03 - 05 Sep 2012 https://doi.org/10.1007/978-3-642-36883-7_16
Modelling corporate stakeholder orientation: does the relationship between stakeholder background characteristics and corporate social performance matter?
Erdiaw-Kwasie, Michael O., Alam, Khorshed and Kabir, Enamul. 2017. "Modelling corporate stakeholder orientation: does the relationship between stakeholder background characteristics and corporate social performance matter?" Business Strategy and the Environment. 26 (4), pp. 465-479. https://doi.org/10.1002/bse.1930
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Shewhart control chart for individual measurement: an application in a weaving mill
Biswas, Raaj Kishore, Masud, Mohammad Shahed and Kabir, Enamul. 2015. "Shewhart control chart for individual measurement: an application in a weaving mill." Melbourne International Business and Social Science Research Conference 2015. Melbourne, Australia 02 - 04 Oct 2015 Australia.
Epileptic seizure detection from EEG signals using logistic model trees
Kabir, Enamul, Siuly, . and Zhang, Yanchun. 2016. "Epileptic seizure detection from EEG signals using logistic model trees." Brain Informatics. 3 (2), pp. 93-100. https://doi.org/10.1007/s40708-015-0030-2
Cluster analysis of behavioural weight management strategies and associations with weight change in young women: a longitudinal analysis
Madigan, C. D., Daley, A. J., Kabir, E., Aveyard, P. and Brown, W.. 2015. "Cluster analysis of behavioural weight management strategies and associations with weight change in young women: a longitudinal analysis." International Journal of Obesity. 39 (11), pp. 1601-1606. https://doi.org/10.1038/ijo.2015.116
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
K−means clustering microaggregation for statistical disclosure control
Kabir, Md Enamul, Mahmood, Abdur Naser and Mustafa, Abdul K.. 2012. "K−means clustering microaggregation for statistical disclosure control." 2012 International Conference on Advances in Computing (ICADC 2012). Bangalore 04 - 06 Jul 2012 https://doi.org/10.1007/978-81-322-0740-5_135
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Novel iterative min-max clustering to minimize information loss in statistical disclosure control
Mahmood, Abdun Naser, Kabir, Md Enamul and Mustafa, Abdul K.. 2014. "Novel iterative min-max clustering to minimize information loss in statistical disclosure control." 10th International Conference on Security and Privacy in Communication Networks (SecureComm 2014). Beijing, China 24 - 26 Sep 2014 Germany. https://doi.org/10.1007/978-3-319-23802-9_14
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
A statistical framework for intrusion detection system
Kabir, Md Enamul and Hu, Jiankun. 2014. "A statistical framework for intrusion detection system." Zhang, Defu (ed.) 11th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2014). Xiamen, China 19 - 21 Aug 2014 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2014.6980966
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Using automated individual white list to protect web digital identities
Han, Weili, Cao, Ye, Bertino, Elisa and Yong, Jianming. 2012. "Using automated individual white list to protect web digital identities ." Expert Systems with Applications. 39 (15), pp. 11861-11869. https://doi.org/10.1016/j.eswa.2012.02.020
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
Access control management and privacy-preserving
Kabir, Md Enamul. 2010. Access control management and privacy-preserving. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Estimation of univariate normal mean using p-value
Kabir, Md Enamul and Khan, Shahjahan. 2007. "Estimation of univariate normal mean using p-value." 9th Islamic Countries Conference on Statistical Sciences. Shah Alam, Malaysia 12 - 14 Dec 2007 Kuala Lumpur, Malaysia.
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers: a journal of research and innovation. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Replacing lost or stolen e-passports
Yong, Jianming and Bertino, Elisa. 2007. "Replacing lost or stolen e-passports." Computer. 40 (10), pp. 89-91. https://doi.org/10.1109/MC.2007.360
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
Extended RBAC with role attributes
Yong, Jianming, Bertino, Elisa, Toleman, Mark and Roberts, Dave. 2006. "Extended RBAC with role attributes." Tan, Bernard (ed.) 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 Sheffield, UK.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Distribution of future location vector and residual sum of squares for multivariate location-scale model with spherically contoured errors
Khan, Shahjahan and Kabir, Md Enamul. 2006. "Distribution of future location vector and residual sum of squares for multivariate location-scale model with spherically contoured errors." Journal of Statistical Theory and Applications. 5 (2), pp. 91-104.