A robust ensemble classification method analysis

Edited book (chapter)


Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "A robust ensemble classification method analysis." Arabnia, Hamid R. (ed.) Advances in computational biology. New York, NY. United States. Springer. pp. 149-155
Chapter Title

A robust ensemble classification method analysis

Book Chapter CategoryEdited book (chapter)
ERA Publisher ID3337
Book TitleAdvances in computational biology
AuthorsZhang, Zhongwei (Author), Li, Jiuyong (Author), Hu, Hong (Author) and Zhou, Hong (Author)
EditorsArabnia, Hamid R.
Volume680
Page Range149-155
SeriesAdvances in Experimental Medicine and Biology
Chapter Number17
Number of Pages7
Year2010
PublisherSpringer
Place of PublicationNew York, NY. United States
ISBN9781441959126
9781441959133
ISSN0065-2598
Digital Object Identifier (DOI)https://doi.org/10.1007/978-1-4419-5913-3_17
Web Address (URL)https://link.springer.com/chapter/10.1007/978-1-4419-5913-3_17
Abstract

Apart from the dimensionality problem, the uncertainty of Microarray data quality is another major challenge of Microarray classification. Microarray data contains various levels of noise and quite often are high levels of noise, and these data lead to unreliable and low accuracy analysis as well as the high dimensionality problem. In this paper, we propose a new Microarray data classification method, based on diversified multiple trees. The new method contains features that, (1) make most use of the information from the abundant genes in the Microarray data, and (2) use a unique diversity measurement in the ensemble decision committee. The experimental results show that the proposed classification method (DMDT) and the well known method (CS4), which diversifies trees by using distinct tree roots, are more accurate on average than other well-known ensemble methods, including Bagging, Boosting and Random Forests. The experiments also indicate that using diversity measurement of DMDT improves the classification accuracy of ensemble classification on Microarray data.

Keywordsmicroarray gene data; classification method; ensemble decision tree; diversity; accuracy
ANZSRC Field of Research 2020490399. Numerical and computational mathematics not elsewhere classified
310505. Gene expression (incl. microarray and other genome-wide approaches)
310499. Evolutionary biology not elsewhere classified
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsDepartment of Mathematics and Computing
University of South Australia
Centre for Sustainable Business and Development
Department of Electrical, Electronic and Computer Engineering
Event2009 International Conference on Bioinformatics and Computational Biology
Event Details
2009 International Conference on Bioinformatics and Computational Biology
Event Date
13 to end of 16 Jul 2009
Event Location
Las Vegas, NV. United States
Permalink -

https://research.usq.edu.au/item/q01q9/a-robust-ensemble-classification-method-analysis

Download files


Accepted Version
Zhang_Li_Hu_Zhou_AV.pdf
File access level: Anyone

  • 1937
    total views
  • 641
    total downloads
  • 1
    views this month
  • 1
    downloads this month

Export as

Related outputs

A framework of developing health care application systems using 6LoWPAN based wireless sensor networks
Zhang, Zhongwei, Wang, Jianxiong and Hu, Xiaohua. 2020. "A framework of developing health care application systems using 6LoWPAN based wireless sensor networks." Ever, Enver and Al-Turjman, Fadi (ed.) 1st EAI International Conference on Forthcoming Networks and Sustainability in the IoT Era. Turkey 01 - 02 Oct 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-69431-9_12
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738
Software Defined Networking Managed Hybrid IoT as a Service
Edge, Peter, Davar, Zara and Zhang, Zhongwei. 2019. "Software Defined Networking Managed Hybrid IoT as a Service." Makhijani, Kiran (ed.) Fifteenth International Conference on Networking and Services (ICNS 2019). Athens, Greece 02 - 06 Jun 2019 Wilmington, United States.
Mathematical Modelling for Optimally Allocating the Medical and Health Supplies Reserve in Hainan Province
Hu, Xiao-hua, Bayanmunkh, Bolormaa and Zhang, Zhong-wei. 2020. "Mathematical Modelling for Optimally Allocating the Medical and Health Supplies Reserve in Hainan Province." Chinese Journal of Engineering Mathematics. 37 (3), pp. 335-346. https://doi.org/10.3969/j.issn.1005-3085.2020.03.008
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490
Application of generalized intervention analysis model
Hu, Xiaohua and Zhang, Zhongwei. 2019. "Application of generalized intervention analysis model." Scholars Journal of Economics, Business and Management. 6 (1), pp. 17-23. https://doi.org/10.21276/sjebm.2019.6.1.4
Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902
Low power wide area networks: a survey of enabling technologies, applications and interoperability needs
Qadir, Qahhar Muhammad, Rashid, Tarik A., Al-Salihi, Nawzad K., Ismael, Birzo, Kist, Alexander A. and Zhang, Zhongwei. 2018. "Low power wide area networks: a survey of enabling technologies, applications and interoperability needs." IEEE Access. 6, pp. 77454-77473. https://doi.org/10.1109/ACCESS.2018.2883151
Comparing decision tree and optimal risk pattern mining for analysing Emergency Ultra Short Stay Unit data
Petrus, Khaleel, Li, Jiuyong and Fahey, Paul. 2008. "Comparing decision tree and optimal risk pattern mining for analysing Emergency Ultra Short Stay Unit data." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 https://doi.org/10.1109/ICMLC.2008.4620410
A quality of experience-aware cross-layer architecture for optimizing video streaming services
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2016. "A quality of experience-aware cross-layer architecture for optimizing video streaming services." Computer Networks. 102, pp. 38-49. https://doi.org/10.1016/j.comnet.2016.02.030
IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems
Zhang, Zhongwei. 2014. "IEEE 802.14.5/ZigBee based WSNs-WPANs and innovative application in medical health care systems." Grana, Manuel, Toro, Carlos, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 2nd KES International Conference on Innovation in Medicine and Healthcare (InMed 2014): Smart Medical and Healthcare Systems. San Sebastian, Spain 09 - 11 Jul 2014 Amsterdam, Netherlands. https://doi.org/10.3233/978-1-61499-474-9-125
QoE-aware cross-layer architecture for video traffic over internet
Qadir, Safeen, Kist, Alexander A. and Zhang, Zhongwei. 2014. "QoE-aware cross-layer architecture for video traffic over internet." 2014 IEEE Region 10 International Conference (TENCON 2014). Kuala Lumpur, Malaysia 14 - 16 Apr 2014 United States. https://doi.org/10.1109/TENCONSpring.2014.6863089
An integrated WSN and mobile robot system for agriculture and environment applications
Zhou, Hong, Qi, Haixia, Banhazi, Thomas and Low, Tobias. 2014. "An integrated WSN and mobile robot system for agriculture and environment applications." Stojmenovic, Ivan, Cheng, Zixue and Guo, Song (ed.) 10th International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services (MOBIQUITOUS 2013). Tokyo, Japan 02 - 04 Dec 2013 Switzerland. https://doi.org/10.1007/978-3-319-11569-6_3
Introducing feedback congestion control to a network with IEEE 802.11 wireless LAN
Zhou, Hong, Hoang, Doan, Nhan, Phuong and Mirchandani, Vinod. 2004. "Introducing feedback congestion control to a network with IEEE 802.11 wireless LAN ." 3rd IEEE Wireless Telecommunications Symposium (WTS 2004). Pomona, California 14 - 15 May 2004 United States. https://doi.org/10.1109/WTS.2004.1319558
A domestic adaptable infant monitoring system using wireless sensor networks
Zhou, Hong and Goold, Brad. 2015. "A domestic adaptable infant monitoring system using wireless sensor networks." 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015). Nanjing, China 14 - 16 Dec 2015 https://doi.org/10.1109/PCCC.2015.7410345
Optimization of quality of experience for video traffic
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "Optimization of quality of experience for video traffic." 22nd International Conference on Telecommunications (ICT2015). Sydney, Australia 27 - 29 Apr 2015 United States. https://doi.org/10.1109/ICT.2015.7124720
Big data based intelligent decision support system for sustainable regional development
Zhou, Hong, Noble, Christopher and Cotter, Julie. 2015. "Big data based intelligent decision support system for sustainable regional development ." 2015 International Conference on Big Data Intelligence and Computing (DataCom 2015). Chengdu, China 19 - 21 Dec 2015
The probability relationship between video’s instantaneous and average aggregate rates
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2016. "The probability relationship between video’s instantaneous and average aggregate rates." Multimedia Tools and Applications. 75 (12), pp. 6909-6924. https://doi.org/10.1007/s11042-015-2617-2
A novel traffic rate measurement algorithm for quality of experience-aware video admission control
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "A novel traffic rate measurement algorithm for quality of experience-aware video admission control." IEEE Transactions on Multimedia. 17 (5), pp. 711-722. https://doi.org/10.1109/TMM.2015.2416637
Mechanisms for QoE optimisation of video traffic: a review paper
Qadir, Qahhar Muhammad, Kist, Alexander A. and Zhang, Zhongwei. 2015. "Mechanisms for QoE optimisation of video traffic: a review paper." Australasian Journal of Information, Communication Technology and Applications. 1 (1), pp. 1-18.
Numerical terrain modelling for wireless underground sensor networks: a protoype for nut tree plantations
Parameswaran, Vinod, Zhang, Zhongwei and Zhou, Hong. 2014. "Numerical terrain modelling for wireless underground sensor networks: a protoype for nut tree plantations." Postalache, Octavian, Jayasundera, Krishanthi P., Korostynska, Olga, Mason, Alex and Mukhopadhyay, Subhas (ed.) 8th International Conference on Sensing Technology (ICST 2014). Liverpool, United Kingdom 02 - 04 Sep 2014 New Zealand.
An extended bilevel programming model and its Kth-best algorithm for dynamic decision making in emergency situations
Zhou, Hong, Lu, Jie and Zhang, GuangQuan. 2014. "An extended bilevel programming model and its Kth-best algorithm for dynamic decision making in emergency situations." IEEE Symposium on Computational Intelligence in Multi-Criteria Decision-Making (MCDM) (2014). Orlando, United States 09 - 12 Dec 2014 Piscataway, NJ. USA. https://doi.org/10.1109/MCDM.2014.7007194
A hybrid WSN system for environment monitoring at poultry buildings
Qi, Haixia, Zhou, Hong, Low, Tobias, Mehdizadeh, S., Tscharke, M. and Banhazi, T.. 2013. "A hybrid WSN system for environment monitoring at poultry buildings." SEAg 2013: Innovative Agricultural Technologies for a Sustainable Future. Barton, Australia 22 - 25 Sep 2013 Barton, ACT, Australia.
Wireless underground sensor network design for irrigation control: simulation of RFID deployment
Parameswaran, Vinod, Zhou, Hong and Zhang, Zhongwei. 2013. "Wireless underground sensor network design for irrigation control: simulation of RFID deployment." Mason, A., Jayasundera, K. P. and Mukhopadhyay, S. C. (ed.) 7th International Conference on Sensing Technology (ICST 2013). Wellington, New Zealand 03 - 05 Dec 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICSensT.2013.6727770
ZigBee based wireless sensor networks and their use in medical and health care domain
Zhang, Zhongwei and Hu, Xiaohua. 2013. "ZigBee based wireless sensor networks and their use in medical and health care domain." Mason, A., Jayasundera, K. P. and Mukhopadhyay, S. C. (ed.) 7th International Conference on Sensing Technology (ICST 2013). Wellington, New Zealand 03 - 05 Dec 2013 Wellington, New Zealand. https://doi.org/10.1109/ICSensT.2013.6727754
Enriching career experience of international academics through language training and practicing programs
Zhou, Hong, Basnet, Badri and Pigozzo, Robyn. 2013. "Enriching career experience of international academics through language training and practicing programs." Lemckert, Charles, Jenkins, Graham and Lang-Lemckert, Susan (ed.) 24th Annual Conference of the Australasian Association for Engineering Education (AAEE 2013). Gold Coast, Australia 08 - 11 Dec 2013 Gold Coast, Australia.
Modeling performance of CSMA/CA with retransmissions in wireless personal area networks
Zhang, Zhongwei. 2013. "Modeling performance of CSMA/CA with retransmissions in wireless personal area networks." International Journal of Networked and Distributed Computing. 1 (2), pp. 97-107. https://doi.org/10.2991/ijndc.2013.1.2.4
An assessment of stress factors on engineering academics in a regional context
Goh, Steven, Zhou, Hong, Bullen, Frank and Davey, Kenneth. 2012. "An assessment of stress factors on engineering academics in a regional context." Leblanc, Richard and Sobel, Ann (ed.) 42nd ASEE/IEEE Frontiers in Education Conference (FIE 2012): Soaring to New Heights in Engineering Education . Seattle, United States 03 - 06 Oct 2012 United States. https://doi.org/10.1109/FIE.2012.6462228
Growing pains in the revitalisation of a 2nd level engineering and spatial science PBL course
Goh, Steven, Worden, John, Zhou, Hong and Clewett, John. 2012. "Growing pains in the revitalisation of a 2nd level engineering and spatial science PBL course." Rasul, Mohammad (ed.) Developments in engineering education standards: advanced curriculum innovations. United States. IGI Global. pp. 105-126
Irrigation control using wireless underground sensor networks
Parameswaran, Vinod, Zhou, Hong and Zhang, Zhongwei. 2012. "Irrigation control using wireless underground sensor networks." 6th International Conference on Sensing Technology (ICST 2012). Kolkata, India 18 - 21 Dec 2012 Piscataway, NJ. United States. https://doi.org/10.1109/ICSensT.2012.6461760
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
Modeling the flexural properties of SLG reinforced phenol formaldehyde composites using Langrage’s Method
Ku, H., Zhou, Hong, Wong, Peter, Su, Gang and Vadher, Jayent. 2012. "Modeling the flexural properties of SLG reinforced phenol formaldehyde composites using Langrage’s Method ." Advanced Materials Research. 410, pp. 305-308. https://doi.org/10.4028/www.scientific.net/AMR.410.305
Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment
Zhang, Zhongwei and Zhou, Hong. 2012. "Theoretical modelling IEEE 802.15.4 MAC protocol with retransmission for wireless personal area networks in medical and healthcare deployment." Hochin, Teruhisa and Lee, Rodger (ed.) 13th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2012). Kyoto, Japan 08 - 10 Aug 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2012.103
Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Intelligent building fire warning system with WSN
Su, Gang, Zhou, Hong and Gao, Rui. 2011. "Intelligent building fire warning system with WSN." 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011). Chengdu, China 10 - 12 Jun 2011
Forecasting daily gas load with OIHF-Elman neural network
Zhou, Hong, Su, Gang and Li, Guofang. 2011. "Forecasting daily gas load with OIHF-Elman neural network." Procedia Computer Science. 5, pp. 754-758. https://doi.org/10.1016/j.procs.2011.07.100
Structure of wireless sensors network based on TinyOS
Gao, Rui, Zhou, Hong and Su, Gang. 2011. "Structure of wireless sensors network based on TinyOS." Ma, Ming (ed.) 2011 International Conference on Control, Automation and Systems Engineering (CASE 2011). Singapore 30 - 31 Jul 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICCASE.2011.5997793
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Examining QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2011. "Examining QoS guarantees for real-time CBR services in broadband wireless access networks." Lee, Roger (ed.) Software engineering, artificial intelligence, networking and parallel/distributed computing 2011. Berlin, Germany. Springer. pp. 25-40
A novel secure routing protocol for MANETs
Zhang, Zhongwei. 2011. "A novel secure routing protocol for MANETs." Wang, Xin (ed.) Mobile ad-hoc networks: protocol design. Rijeka, Croatia. In-Tech. pp. 455-466
A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains
Zhang, Zhongwei and Zhou, Hong. 2011. "A MAC layer protocol supporting the application of WSNs in medicine and healthcare domains." Chowdhury, Morshed, Ray, Sid and Lee, Roger (ed.) 12th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing (SNPD 2011). Sydney, Australia 06 - 08 Jul 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/SNPD.2011.32
A case study on the revitalisation of a 2nd level engineering and spatial science PBL course
Goh, Steven, Worden, John, Zhou, Hong and Cubero, Samuel. 2009. "A case study on the revitalisation of a 2nd level engineering and spatial science PBL course." Kestell, Colin, Grainger, Steven and Cheung, John (ed.) 20th Annual Conference for the Australasian Association of Engineering Education (AAEE 2009). Adelaide, Australia 06 - 09 Dec 2009 Adelaide, South Australia.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Accurate and robust algorithms for microarray data classification
Hu, Hong. 2008. Accurate and robust algorithms for microarray data classification. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68
Classification using multiple and negative target rules
Li, Jiuyong and Jones, Jason. 2006. "Classification using multiple and negative target rules." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. https://doi.org/10.1007/11892960_26
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Achieving k-Anonymity by clustering in attribute hierarchical structures
Li, Jiuyong, Wong, Raymond Chi-Wing, Fu, Ada Wai-Chee and Pei, Jian. 2006. "Achieving k-Anonymity by clustering in attribute hierarchical structures." Tjoa, A. Min and Trujillo, Juan (ed.) 8th International Conference on Data Warehousing and Knowledge Discovery. Krakow, Poland 04 - 08 Sep 2006 Germany. Springer. https://doi.org/10.1007/11823728
Robust rule-based prediction
Li, Jiuyong. 2006. "Robust rule-based prediction." IEEE Transactions on Knowledge and Data Engineering. 18 (8), pp. 1043-1054. https://doi.org/10.1109/TKDE.2006.129
On optimal rule discovery
Li, Jiuyong. 2006. "On optimal rule discovery." IEEE Transactions on Knowledge and Data Engineering. 18 (4), pp. 460-471. https://doi.org/10.1109/TKDE.2006.1599385
Finding similar patterns in microarray data
Chen, Xiangsheng, Li, Jiuyong, Daggard, Grant and Huang, Xiaodi. 2005. "Finding similar patterns in microarray data." Zhang, Shichao and Jarvis, Ray (ed.) AI 2005: Advances in artificial intelligence. Berlin, Germany. Springer. pp. 1272-1276
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Efficient discovery of risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-chee and Fahey, Paul. 2009. "Efficient discovery of risk patterns in medical data." Artificial Intelligence in Medicine. 45 (1), pp. 77-89. https://doi.org/10.1016/j.artmed.2008.07.008
A wireless sensor network environment monitoring system based on TinyOS
Gao, Rui, Zhou, Hong and Su, Gang. 2011. "A wireless sensor network environment monitoring system based on TinyOS." Zhixi, Yin (ed.) ICEOE 2011: International Conference on Electronics and Optoelectronics. Dalian, China 29 - 31 Jul 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICEOE.2011.6013153
A coupled fuzzy logic control for routers' queue management over TCP/AQM networks
Li, Zhi and Zhang, Zhongwei. 2005. "A coupled fuzzy logic control for routers' queue management over TCP/AQM networks." Khosla, Rajiv, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 9th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2005). Melbourne, Australia 14 - 16 Sep 2005 Berlin, Germany.
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Revitalisation of a 2nd level engineering and spatial science PBL course: almost there but...
Goh, Steven C., Worden, John, Zhou, Hong and Clewett, John. 2010. "Revitalisation of a 2nd level engineering and spatial science PBL course: almost there but..." Gardner, Anne and Jolly, Lesley (ed.) 21st Annual Conference for the Australasian Association of Engineering Education (AAEE 2010). Sydney, Australia 05 - 08 Dec 2010 Sydney, Australia.
Development of a customised software module within the Moodle LMS for team-based PBL courses
Zhou, Hong, Goh, Steven C., Worden, John, Tschirpig, Barry, Yong, Andrew and Brodie, Lyn. 2010. "Development of a customised software module within the Moodle LMS for team-based PBL courses." Gardner, Anne and Jolly, Lesley (ed.) 21st Annual Conference for the Australasian Association of Engineering Education (AAEE 2010). Sydney, Australia 05 - 08 Dec 2010 Sydney, Australia.
A hybrid wired and wireless network infrastructure to improve the productivity and quality care of critical medical applications
Zhou, Hong, Ali, Hesham, Youn, Jon and Zhang, Zhongwei. 2010. "A hybrid wired and wireless network infrastructure to improve the productivity and quality care of critical medical applications." Li, Yan, Yang, Jiajia, Wen, Peng and Wu, Jinglong (ed.) 2010 IEEE/ICME International Conference on Complex Medical Engineering (ICME 2010). Gold Coast, Australia 13 - 15 Jul 2010 Brisbane, Australia. https://doi.org/10.1109/ICCME.2010.5558842
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks
Zhou, Hong and Zhang, Zhongwei. 2010. "Differentiated statistical QoS guarantees for real-time CBR services in broadband wireless access networks." Raoof, Kosai (ed.) 6th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM 2010). Chengdu, China 23 - 25 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/WICOM.2010.5601439
On the effectiveness of gene selection for microarray classification methods
Zhang, Zhongwei, Li, Jiuyong, Hu, Hong and Zhou, Hong. 2010. "On the effectiveness of gene selection for microarray classification methods." Nguyen, Ngoc Thanh, Le, Manh Thanh and Swiatek, Jerzy (ed.) 2nd Asian Conference on Intelligent Information and Database Systems (ACIIDS 2010). Hue City, Vietnam 24 - 26 Mar 2010 Heidelberg, Germany. https://doi.org/10.1007/978-3-642-12101-2_31
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Throughput and fairness of multiple TCP connections in wireless networks
Zhou, Hong, Leis, John W., Hoang, Doan and Nhan, Phuong. 2004. "Throughput and fairness of multiple TCP connections in wireless networks." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) 3rd Workshop on the Internet, Telecommunications and Signal Processing (WITSP2004). Adelaide, South Australia 20 - 22 Dec 2004 Tarrawanna, N.S.W., Australia .
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Throughput and proportional fairness in cognitive radio networks
Ahmed, Waqas, Gao, Jason, Zhou, Hong and Faulkner, Michael. 2009. "Throughput and proportional fairness in cognitive radio networks." Nguyen, Ngoc-Mai, Nguyen, Van-Mien, Tran, Van-Huan and Tran, Xuan-Tu (ed.) 2nd International Conference on Advanced Technologies for Communications (ATC 2009). Hai Phong, Vietnam 12 - 14 Oct 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ATC.2009.5349453
Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks
Zhou, Hong and Zhang, Zhongwei. 2009. "Adaptive end-to-end QoS provision for real-time multimedia applications in heterogeneous multi-hop wireless networks." Martini, Maria and Politis, Christos (ed.) 5th International ICST Mobile Multimedia Communications Conference (MobiMedia'09). London, United Kingdom 07 - 09 Sep 2009 Brussels, Belgium. https://doi.org/10.4108/ICST.MOBIMEDIA2009.7438
The integration of wireless sensor networks, remote sensing and geographic information systems for autonomous environmental and animal monitoring
Zhou, Hong and Wu, Huayi. 2009. "The integration of wireless sensor networks, remote sensing and geographic information systems for autonomous environmental and animal monitoring." Weghorn, Hans and Isaias, Pedro (ed.) IADIS International Conference on Applied Computing 2009 (IADIS 2009). Rome, Italy 19 - 21 Nov 2009 Italy.
Goodput and channel allocation in opportunistic spectrum access networks
Ahmed, Waqas, Gao, Jason, Zhou, Hong and Faulkner, Michael. 2009. "Goodput and channel allocation in opportunistic spectrum access networks." PIMRC 2009: 20th IEEE International Symposium on Personal, Indoor and Mobile Radio Communications. Tokyo, Japan Piscataway, NJ. United States . https://doi.org/10.1109/PIMRC.2009.5450283
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Empirical examination of mobile ad hoc routing protocols on wireless sensor networks
Zhang, Zhongwei and Zhou, Hong. 2009. "Empirical examination of mobile ad hoc routing protocols on wireless sensor networks." International Journal of Computer Networks and Communications. 1 (1), pp. 75-87.
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Prediction of student actions using weighted Markov models
Huang, Xiaodi, Yong, Jianming, Li, Jiuyong and Gao, Junbin. 2008. "Prediction of student actions using weighted Markov models." Li, Shaozi, Pan, Wei and Yong, Jianming (ed.) IEEE International Symposium on IT in Medicine and Education (ITME 2008) . Xiamen, China 12 - 14 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ITME.2008.4743842
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Understanding and enlivening AQM workings using computer simualtion
Shen, Chong, Zhang, Zhongwei and Lai, David. 2006. "Understanding and enlivening AQM workings using computer simualtion." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.
Achieving secure service sharing over IP networks
Lai, David, Zhang, Zhongwei and Shen, Chong. 2006. "Achieving secure service sharing over IP networks." Li, Hong (ed.) ASEE Mid-Atlantic Section Spring 2006 Conference (ASEE 2006). New York, United States 28 - 29 Apr 2006 New York, USA.
Efficient information propagation in service routing for next generation network
Lai, David and Zhang, Zhongwei. 2009. "Efficient information propagation in service routing for next generation network." Wen, Peng, Li, Yuefeng, Polkowski, Lech, Yao, Yiyu, Tsumoto, Shusaku and Wang, Guoyin (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Berlin, Germany. https://doi.org/10.1007/978-3-642-02962-2_43
Integrated key exchange protocol capable of revealing spoofing and resisting dictionary attacks
Lai, David and Zhang, Zhongwei. 2004. "Integrated key exchange protocol capable of revealing spoofing and resisting dictionary attacks." Xue, Li, Zhou, JiangYing, Yung, Moti and Jakobsson, Markus (ed.) 2nd International Conference, Applied Cryptography and Network Security ACNS 2004. Yellow Mountain, China 08 - 11 Jun 2004 China.
Service re-routing for service network graph: efficiency, scalability and implementation
Lai, David and Zhang, Zhongwei. 2009. "Service re-routing for service network graph: efficiency, scalability and implementation." International Journal of Computer Networks and Communications. 1 (1), pp. 46-59.
An active approach to multimedia network management
Zhang, Zhongwei and Lai, David. 2005. "An active approach to multimedia network management." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.
Decentralized management of multimedia network using active network technology
Zhang, Zhongwei and Lai, David. 2005. "Decentralized management of multimedia network using active network technology." WSEAS Transactions on Communications. 4 (7), pp. 325-333.
Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network
Jin, Lu, Zhang, Zhongwei and Lai, David. 2006. "Implementing and evaluating an adaptive secure routing protocol for mobile ad hoc network." Powell, Steven (ed.) 5th Annual Wireless Telecommunication Symposium (WTS2006). Pomona, United States 27 - 29 Apr 2006 Pomona, California, USA.
Secure service sharing over networks for mobile users using service network graphs
Lai, David and Zhang, Zhongwei. 2006. "Secure service sharing over networks for mobile users using service network graphs." Powell, Steven (ed.) 5th Annual Wireless Telecommunication Symposium (WTS2006). Pomona, United States 27 - 29 Apr 2006 Pomona, California, USA.
Network service sharing infrastructure: service authentication and authorization revocation
Lai, David and Zhang, Zhongwei. 2005. "Network service sharing infrastructure: service authentication and authorization revocation." Mastorakis, Nikos and Passadis, Kostas (ed.) 9th WSEAS International Conference on Communications. Athens, Greece 11 - 16 Jul 2005 Athens, Greece.
An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks
Lai, David and Zhang, Zhongwei. 2005. "An infrastructure for service authentication and authorization revocation in a dynamic aggregation of networks." WSEAS Transactions on Communications. 4 (8), pp. 537-547.
A unified approach to ameliorate active queue management of network routers
Zhang, Zhongwei, Lai, David and Suthaharan, Shan. 2005. "A unified approach to ameliorate active queue management of network routers." Ohta, Naohisa (ed.) 2005 International Symposium on Intelligent Signal Processing and Communication Systems (ISPACS 2005). Hong Kong, China 13 - 16 Dec 2005 New York, United States.
Using association rules to make rule-based classifiers robust
Hu, Hong and Li, Jiuyong. 2005. "Using association rules to make rule-based classifiers robust." Williams, Hugh E. and Dobbie, Gillian (ed.) ADC 2005: 16th Australasian Database Conference. Newcastle, Australia 31 Jan - 03 Feb 2005 Sydney, Australia.
Self-authentication of encrypted channels in service network graph
Lai, David and Zhang, Zhongwei. 2008. "Self-authentication of encrypted channels in service network graph." Cao, Jiang, Li, Minglu, Weng, Chuliang, Xiang, Yang, Wang, Xin, Tang, Hong, Hong, Feng, Liu, Hong and Wang, Yinglin (ed.) IFIP International Conference on Network and Parallel Computing (NPC 2008). Shanghai, China 18 - 21 Oct 2008 Los Alamitos, CA. United States. https://doi.org/10.1109/NPC.2008.20
Improving efficiency and scalability of service network graph by re-routing service routes
Lai, David and Zhang, Zhongwei. 2009. "Improving efficiency and scalability of service network graph by re-routing service routes." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ACIIDS.2009.31
An intelligent scheme of secure routing for mobile ad hoc networks
Zhang, Zhongwei. 2009. "An intelligent scheme of secure routing for mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 2nd International Conference on Signal Processing and Communication Systems (ICSPCS 2008). Gold Coast, Australia 15 - 17 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ICSPCS.2008.4813739
Scrutinizing performance of ad hoc routing protocols on wireless sensor networks
Zhang, Zhongwei, Zhou, Hong and Gao, Jason. 2009. "Scrutinizing performance of ad hoc routing protocols on wireless sensor networks." Nguyen, Ngoc Thanh, Nguyen, Huynh Phan and Grzech, Adam (ed.) ACIIDS 2009: 1st Asian Conference on Intelligent Information and Database Systems. Dong Hoi, Vietnam 01 - 03 Apr 2009 United States. https://doi.org/10.1109/ACIIDS.2009.30
Wireless networks: cross-layer Mac design
Gyasi-Agyei, Amoakoh and Zhou, Hong. 2008. "Wireless networks: cross-layer Mac design." Furht, Borko (ed.) Encyclopedia of wireless and mobile communications. United States. Taylor & Francis. pp. 1424-1433
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Steps in developing an advanced software engineering course using problem based learning
Brodie, Lyn, Zhou, Hong and Gibbons, Anthony. 2008. "Steps in developing an advanced software engineering course using problem based learning." Engineering Education. 3 (1), pp. 2-12. https://doi.org/10.11120/ened.2008.03010002
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Applications and performances of extended TTDDs in large-scale wireless sensor networks
Zhou, Hong, Jin, Lu, Zhang, Zhongwei, Ali, Hesham and Wang, Chulho. 2007. "Applications and performances of extended TTDDs in large-scale wireless sensor networks." Zhang, H., Olariu, S., Cao, Jiannong and Johnson, D. B. (ed.) 3rd International Conference of Mobile Ad-hoc and Sensor Networks. Beijing, China 12 - 14 Dec 2007 Berlin. https://doi.org/10.1007/978-3-540-77024-4
The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Zhou, Hong, Lu, Jie, Zhang, Guangquan and Zhang, Zhongwei. 2007. "The Kth-best approach for linear bilevel multifollower programming with partial shared variables among followers." Applied Mathematics and Computation. 188 (2), pp. 1686-1698. https://doi.org/10.1016/j.amc.2006.11.176
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
A comparative study on the performance of wireless sensor networks
Zou, Lin and Zhang, Zhongwei. 2007. "A comparative study on the performance of wireless sensor networks." ICIS 2007: 6th IEEE/ACIS International Conference on Computer and Information Science (ICIS 2007). Melbourne, Australia 11 - 13 Jul 2007 Piscataway, NJ, USA.
An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2005. "An extended Kuhn-Tucker approach for linear bilevel multifollower programming with partial shared variables among followers." Johnson, M. and Chen, P. (ed.) IEEE International Conference on Systems, Man and Cybernetics (SMC) (2005). Hawaii, United States 12 Oct 2005 Hawaii, USA. https://doi.org/10.1109/ICSMC.2005.1571663
Towards enhancing trust on Chinese e-commerce
Wang, Zhen, Zhang, Zhongwei and Zhang, Yanchun. 2006. "Towards enhancing trust on Chinese e-commerce." Zhou, X., Li, J., Shen, H., Kitsuregawa, M. and Zhang, Y. (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Berlin, Germany. Springer. https://doi.org/10.1007/11610113_30
Throughput and fairness performance of multiple STT-Vegas connections
Zhang, Zhongwei, Zhou, Hong and Leis, John. 2005. "Throughput and fairness performance of multiple STT-Vegas connections." Sanadidi, M. Y. (ed.) 3rd IASTED International Conference on Communications and Computer Networks. Marina del Rey, United States 24 - 26 Oct 2005 Marina del Rey, USA.
Mining risk patterns in medical data
Li, Jiuyong, Fu, Ada Wai-Chee, He, Hongxing, Chen, Jie, Jin, Huidong, McAullay, Damien, Williams, Graham, Sparks, Ross and Kelman, Chris. 2005. "Mining risk patterns in medical data." Grossman, R., Bayardo, R., Bennett, K. and Vaidya, J. (ed.) 11th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2005). Chicago, United States 21 - 24 Aug 2005 United States. https://doi.org/10.1145/1081870.1081971
Quantitative analysis of queue management schemes in TCP/IP network routers
Li, Zhenquan, Zhang, Zhongwei and Zhou, Hong. 2004. "Quantitative analysis of queue management schemes in TCP/IP network routers." Safaei, F. (ed.) Australian Telecommunications Networks and Applications Conference (ATNAC 2004). Sydney, Australia 08 - 10 Dec 2004 Canberra, Australia.
Association rule discovery with unbalanced class distributions
Gu, Lifang, Li, Jiuyong, He, Hongxing, Williams, Graham, Hawkins, Simon and Kelman, Chris. 2003. "Association rule discovery with unbalanced class distributions." Gedeon, Tamas D. and Fung, Lance Chun Che (ed.) 16th Australian Conference on Artificial Intelligence (AI 2003). Perth, Australia 03 - 05 Dec 2003 Berlin, Germany. https://doi.org/10.1007/978-3-540-24581-0_19
Mining the optimal class association rule set
Li, Jiuyong, Shen, Hong and Topor, Rodney. 2002. "Mining the optimal class association rule set." Knowledge-Based Systems. 15 (7), pp. 399-405. https://doi.org/10.1016/S0950-7051(02)00024-2
Mining informative rule set for prediction
Li, Jiuyong, Shen, Hong and Topor, Rodney. 2004. "Mining informative rule set for prediction." Journal of Intelligent Information Systems. 22 (2), pp. 155-174. https://doi.org/10.1023/B:JIIS.0000012468.25883.a5
Analysis of breast feeding data using data mining methods
He, Hongxing, Jin, Huidong, Chen, Jie, McAullay, Damien, Li, Jiuyong and Fallon, Tony. 2006. "Analysis of breast feeding data using data mining methods." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Sydney, Australia.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing
Wong, Raymond Chi-Wing, Li, Jiuyong, Fu, Ada Wai-Chee and Wang, Ke. 2006. "(alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing." Eliassi-Rad, Tina, Ungar, Lyle H., Craven, Mark and Gunopulos, Dimitrios (ed.) 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD'06). Philadelphia, USA 20 - 23 Aug 2006 New York, USA.
Using multiple and negative target rules to make classifiers more understandable
Li, Jiuyong and Jones, Jason. 2006. "Using multiple and negative target rules to make classifiers more understandable." Knowledge-Based Systems. 19 (6), pp. 438-444. https://doi.org/10.1016/j.knosys.2006.03.003
Deliberation and implementation of adaptive fuzzy logic based security level routing protocol for mobile ad hoc network
Jin, Lu, Zhang, Zhongwei and Zhou, Hong. 2007. "Deliberation and implementation of adaptive fuzzy logic based security level routing protocol for mobile ad hoc network." Jiang, Yingtao (ed.) 4th Annual IEEE Consumer Communications and Networking Conference (CCNC 2007). Las Vegas, United States 11 - 13 Jan 2007 Las Vegas, USA.
Improving the performance of SCTP Transport Protocol over wireless networks
Zhang, Zhongwei and Jin, Lu. 2006. "Improving the performance of SCTP Transport Protocol over wireless networks." Wysocki, Beata J. and Wysocki, Tadeusz A. (ed.) 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP2006). Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Performance comparison of the AODV, SAODV and FLSL routing protocols in mobile ad hoc networks
Jin, Lu, Zhang, Zhongwei and Zhou, Hong. 2006. "Performance comparison of the AODV, SAODV and FLSL routing protocols in mobile ad hoc networks." Wysocki, Tadeusz A. and Wysocki, Beata J. (ed.) 5th Workshop on the Internet, Telecommunications and Signal Processing (WITSP2006). Hobart, Australia 11 - 13 Dec 2006 Tarrawanna, N.S.W., Australia.
Assessing and assuring trust in e-Commerce systems
Zhang, Zhongwei and Wang, Zhen. 2006. "Assessing and assuring trust in e-Commerce systems." Mohammadian, Masoud (ed.) 2006 International Conference on Intelligent Agents, Web Technologies & Internet Commerce (IAWTIC'06). Sydney, Australia 29 Nov - 01 Dec 2006 Piscataway, NJ, USA.
Performance of STT-Vegas in heterogeneous wired and wireless networks
Zhou, Hong, Gyasi-Agyei, Amoakoh and Zhang, Zhongwei. 2006. "Performance of STT-Vegas in heterogeneous wired and wireless networks." 3rd International Conference on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine). Waterloo, Canada 07 - 09 Aug 2006 New York, NY, USA.
An extended branch and bound algorithm for linear bilevel programming
Shi, Chenggen, Lu, Jie, Zhang, Guangquan and Zhou, Hong. 2006. "An extended branch and bound algorithm for linear bilevel programming." Applied Mathematics and Computation. 180 (2), pp. 529-537.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Combining gene expression data and gene ontology with the use of a data mining tool
Petrus, Khaleel, Li, Jiuyong and Lopez, J.. 2005. "Combining gene expression data and gene ontology with the use of a data mining tool." Summer Symposium in Bioinformatics: Open Problems in Bioinformatics (BioInfoSummer 2005). Canberra, Australia 28 Nov - 02 Dec 2005 Australian National University (ANU).
Fuzzy logic strategy of prognosticating TCP's timeout and retransmission
Zhang, Zhongwei, Li, Zhi and Suthaharan, Shan. 2005. "Fuzzy logic strategy of prognosticating TCP's timeout and retransmission." Halgamuge, Saman K. and Wang, Lipo (ed.) Computational intelligence for modelling and prediction. Berlin. Springer.