DISTRO: a system for detecting global outliers from distributed data streams with privacy protection

Paper


Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
Paper/Presentation Title

DISTRO: a system for detecting global outliers from distributed data streams with privacy protection

Presentation TypePaper
AuthorsZhang, Ji (Author), Dekeyser, Stijn (Author), Wang, Hua (Author) and Shu, Yanfeng (Author)
EditorsKitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi
Journal or Proceedings TitleLecture Notes in Computer Science (Book series)
Journal Citation5982 (2), pp. 477-481
Number of Pages5
Year2010
PublisherSpringer
Place of PublicationGermany
ISSN1611-3349
0302-9743
ISBN9783642120978
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-642-12098-5_54
Web Address (URL) of Paperhttps://link.springer.com/chapter/10.1007/978-3-642-12098-5_54
Web Address (URL) of Conference Proceedingshttps://link.springer.com/book/10.1007/978-3-642-12098-5
Conference/EventDASFAA 2010: 15th International Conference on Database Systems for Advanced Applications
Event Details
DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications
Event Date
01 to end of 04 Apr 2010
Event Location
Tsukuba, Japan
Abstract

In this demo proposal, we present a new system, called DISTRO (a.k.a. DIstributed STReam Outlier Detector), for detecting outliers from distributed data streams. DISTRO is able to effectively identify outliers from distributed data streams that are consistent with those generated by the centralized detection paradigm. DISTRO is also able to ensure high-level data privacy throughout the detection process. A number of optimization strategies are devised to further enhance its speed and communication performance. This proposal provides details on the motivation and technical challenges of detecting outliers from distributed data streams, presents an overview of DISTRO, and gives the plans for its system demonstration.

KeywordsDIstributed STReam Outlier Detector; DISTRO; communication performance; detection process; distributed data streams; new system; optimization strategy; privacy protection; technical challenges
Contains Sensitive ContentDoes not contain sensitive content
ANZSRC Field of Research 2020469999. Other information and computing sciences not elsewhere classified
400604. Network engineering
460499. Cybersecurity and privacy not elsewhere classified
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsDepartment of Mathematics and Computing
Commonwealth Scientific and Industrial Research Organisation (CSIRO), Australia
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q0733/distro-a-system-for-detecting-global-outliers-from-distributed-data-streams-with-privacy-protection

Download files


Other Documentation
Binder1.pdf
File access level: Anyone

  • 1881
    total views
  • 1076
    total downloads
  • 3
    views this month
  • 1
    downloads this month

Export as

Related outputs

Tree shade within urban parks and nature strips: standards and perspectives from measurement campaigns conducted in Queensland
Downs, Nathan, Antrobus, Jodie, Dekeyser, Stijn, Butler, Harry, Downs, Melanie, Hickmott, Darren, Madigan, Chris, Brown, Alexandra, Amar, Abdurazaq, Dearnaley, John, Parisi, Alfio V, Vanos, Jennifer, Raj, Nawin, Harrison, Simone and Igoe, Damien. 2024. "Tree shade within urban parks and nature strips: standards and perspectives from measurement campaigns conducted in Queensland ." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch
Mohammed, Chand Pasha, Chopra, Shakti Raj, Albadri, Nehad, Dekeyser, Stijn, Jha, Sudan, Roy, Ajay and Pradhan, Nihar Ranjan. 2024. "Blockchain Enabled Secure Data Transmission With NB-IoT Deployment in Smart Agriculture Crop Watch." Internet Technology Letters. https://doi.org/10.1002/itl2.596
Ultraviolet radiation thin film dosimetry: A review of properties and applications
Parisi, Alfio V., Downs, Nathan J., Schouten, Peter, Igoe, Damien P., Turner, Joanna, Amar, Abdurazaq, Wainwright, Lisa, Dawes, Adrian, Butler, Harry and Dekeyser, Stijn. 2024. "Ultraviolet radiation thin film dosimetry: A review of properties and applications." Photochemistry and Photobiology. https://doi.org/10.1111/php.14022
Privacy-preserving pathological data sharing among multiple remote parties
Wu, Wei, Chen, Fulong, Yuan, Pinghai, Wang, Taochun, Xie, Dong, Zhao, Chuanxin, Wang, Chao, Tang, Detao, Li, Jingtao Li and Zhang, Ji. 2024. "Privacy-preserving pathological data sharing among multiple remote parties." Blockchain: Research and Applications. 5 (3). https://doi.org/10.1016/j.bcra.2024.100204
Partial policy hidden medical data access control method based on CP-ABE
Huang, Jing, Tang, Detao, Jiang, Chenyu, Chen, Fulong, Zhang, Ji, Xie, Dong, Wang, Taochun, Zhao, Chuanxin, Wang, Chao and Li, Jintao. 2024. "Partial policy hidden medical data access control method based on CP-ABE." Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-024-04843-6
Variate Associated Domain Adaptation for Unsupervised Multivariate Time Series Anomaly Detection
He, Yifan, Bian, Yatao, Ding, Xi, Wu, Bingzhe, Guan, Jihong, Zhang, Ji and Zhou, Shuigeng. 2024. "Variate Associated Domain Adaptation for Unsupervised Multivariate Time Series Anomaly Detection." ACM Transactions on Knowledge Discovery from Data. 18 (8). https://doi.org/10.1145/3663573
Generous teacher: Good at distilling knowledge for student learning
Ding, Yifeng, Yang, Gaoming, Yin, Shuting, Zhang, Ji, Fang, Xianjin and Yang, Wencheng. 2024. "Generous teacher: Good at distilling knowledge for student learning." Image and Vision Computing. 150. https://doi.org/10.1016/j.imavis.2024.105199
P-Chain: Towards privacy-aware smart contract using SMPC
Diao, Yiqing, Ye, Ayong, Zhang, Yuexin, Zhang, Ji and Xu, Li. 2024. "P-Chain: Towards privacy-aware smart contract using SMPC." Journal of Information Security and Applications. 86. https://doi.org/10.1016/j.jisa.2024.103872
A Novel Multi-scale Spatiotemporal Graph Neural Network for Epidemic Prediction
Xu, Zenghui, Li, Mingzhang, Yu, Ting, Hou, Linlin, Zhang, P., Kiran, Rage Uday, Li, Zhao and Zhang, Ji. 2024. "A Novel Multi-scale Spatiotemporal Graph Neural Network for Epidemic Prediction." A.M., Strauss C.Amagasa T.Manco G.Kotsis G.Khalil I.Tjoa (ed.) 35th International Conference on Database and Expert Systems Applications (DEXA 2024). Naples, Italy 26 - 28 Aug 2024 Switzerland . Springer. https://doi.org/10.1007/978-3-031-68312-1_21
Accelerating Maximal Bicliques Enumeration with GPU on large scale network
Wu, Chunqi, Li, Jingdong, Li, Zhao, Zhang, Ji and Tang, Pan. 2024. "Accelerating Maximal Bicliques Enumeration with GPU on large scale network." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 161, pp. 601-613. https://doi.org/10.1016/j.future.2024.07.021
Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection
Liang, Lifang, Qiu, Xuyi, Zhang, Yan, Guan, Donghai, Zhang, Ji and Yuan, Weiwei. 2024. "Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection." 5th International Conference on Big Data and Security (ICBDS 2023). Nanjing, China 22 - 24 Dec 2023 Singapore . Springer. https://doi.org/10.1007/978-981-97-4390-2_5
Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection
Ge, Fei, Zhang, Ji, Wang, Zhen, Zhou, Yuqian and Li, Zhao. 2024. "Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection." H., Zhang W.Yang Z.Wang X.Tung A.Zheng Z.Guo (ed.) 8th APWeb-WAIM joint International Conference on Web and Big Data (APWeb-WAIM 2024). Jinhua, China 30 Aug - 01 Sep 2024 Singapore . Springer. https://doi.org/10.1007/978-981-97-7241-4_30
Epidemic Source Identification Based on Infection Graph Learning
Hong, Xingyun, Yu, Ting, Li, Zhao and Zhang, Ji. 2024. "Epidemic Source Identification Based on Infection Graph Learning." 7th International Joint Conference on Asia-Pacific Web and Web-Age Information Management (APWeb-WAIM 2023). Wuhan, China 06 - 08 Oct 2023 Singapore . Springer. https://doi.org/10.1007/978-981-97-2303-4_16
ConIS: controllable text-driven image stylization with semantic intensity
Yang, Gaoming, Li, Changgeng and Zhang, Ji. 2024. "ConIS: controllable text-driven image stylization with semantic intensity." Multimedia Systems. 30 (4). https://doi.org/10.1007/s00530-024-01381-1
Fast face swapping with high-fidelity lightweight generator assisted by online knowledge distillation
Yang, Gaoming, Ding, Yifeng, Fang, Xianjin, Zhang, Ji and Chu, Yan. 2024. "Fast face swapping with high-fidelity lightweight generator assisted by online knowledge distillation." The Visual Computer. https://doi.org/10.1007/s00371-024-03414-2
An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network
Siuly, Siuly, Khare, Smith K., Kabir, Enamul, Sadiq, Muhammad Tariq and Wang, Hua. 2024. "An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network." Computers in Biology and Medicine. 174. https://doi.org/10.1016/j.compbiomed.2024.108462
Robust equivalent circuit model parameters identification scheme for State of Charge (SOC) estimation based on maximum correntropy criterion
Zhang, Kexin, Zhao, Xuezhuan, Chen, Yu, Wu, Di, Cai, Taotao, Wang, Yi, Li, Lingling and Zhang, Ji. 2024. "Robust equivalent circuit model parameters identification scheme for State of Charge (SOC) estimation based on maximum correntropy criterion." International Journal of Electrochemical Science. 19 (5). https://doi.org/10.1016/j.ijoes.2024.100558
A playground shade index for standardising ultraviolet protection assessments of open, mixed and protected outdoor recreational spaces
Downs, Nathan, Butler, Harry, Dexter, Benjamin, Raj, Nawin, Downs, Melanie, Turner, Joanna, Dekeyser, Stijn, Deo, Ravinesh, Vanos, Jennifer, Igoe, Damien and Parisi, Alfio V. 2024. "A playground shade index for standardising ultraviolet protection assessments of open, mixed and protected outdoor recreational spaces." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
The mitigating effect of street trees, urban flora, and the suburban environment on seasonal peak UV indices: A case study from Brisbane, Australia
Downs, Nathan James, Amar, Abdurazaq, Dearnaley, John, Butler, Harry, Dekeyser, Stijn, Igoe, Damien, Parisi, Alfio V., Raj, Nawin, Deo, Ravinesh and Turner, Joanna. 2024. "The mitigating effect of street trees, urban flora, and the suburban environment on seasonal peak UV indices: A case study from Brisbane, Australia." Photochemistry and Photobiology. https://doi.org/10.1111/php.13988
A legacy of more than two decades of UV radiation measurement studies at the University of Southern Queensland
Amar, Abdurazaq, Parisi, Alfio, Downs, Nathan, Turner, Joanna, Igoe, Damien, Butler, Harry and Dekeyser, Stijn. 2024. "A legacy of more than two decades of UV radiation measurement studies at the University of Southern Queensland." 6th International conference UV and Skin Cancer Prevention. Brisbane, Australia 11 - 15 Sep 2024 Australia.
RCNet: Related Context-Driven Network with Hierarchical Attention for Salient Object Detection
Xia, Chenxing, Sun, Yanguang, Li, Kuan-Ching, Ge, Bin, Zhang, Hanling, Jiang, Bo and Zhang, Ji. 2024. "RCNet: Related Context-Driven Network with Hierarchical Attention for Salient Object Detection." Expert Systems with Applications. 237 (Part A). https://doi.org/10.1016/j.eswa.2023.121441
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Wang, Canling, Wu, Wei, Chen, Fulong, Shu, Hong, Zhang, Ji, Zhang, Yuxuan, Wang, Taochun, Xie, Dong and Zhao, Chuanxin. 2024. "A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing." IET Information Security. 2024. https://doi.org/10.1049/2024/5559522
Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Incremental Maximal Clique Enumeration for Hybrid Edge Changes in Large Dynamic Graphs
Yu, Ting, Jiang, Ting, Bah, Mohamed Jaward, Zhao, Chen, Huang, Hao, Liu, Mengchi, Zhou, Shuigeng, Li, Zhao and Zhang, Ji. 2024. "Incremental Maximal Clique Enumeration for Hybrid Edge Changes in Large Dynamic Graphs." IEEE Transactions on Knowledge and Data Engineering. 36 (4), pp. 1650-1666. https://doi.org/10.1109/TKDE.2023.3311398
Pyramid style-attentional network for arbitrary style transfer
Yang, Gaoming, Zhang, Shicheng, Fang, Xianjin and Zhang, Ji. 2024. "Pyramid style-attentional network for arbitrary style transfer." Multimedia Tools and Applications. 83 (5), pp. 3483-13502. https://doi.org/10.1007/s11042-023-15650-0
A graph-powered large-scale fraud detection system
Li, Zhao, Wang, Biao, Huang, Jiaming, Jin, Yilun, Xu, Zenghui, Zhang, Ji and Gao, Jianliang. 2024. "A graph-powered large-scale fraud detection system." International Journal of Machine Learning and Cybernetics. 15 (1), p. 115–128. https://doi.org/10.1007/s13042-023-01786-w
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection
Gao, Jianliang, Chen, Jiamin, Oloulade, Babatounde Moctard, Al-Sabri, Raeed, Lyu, Tengfei, Zhang, Ji and Li, Zhao. 2024. "CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection." IEEE Transactions on Emerging Topics in Computing. 12 (2), pp. 444-454. https://doi.org/10.1109/TETC.2023.3270181
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva Raj. 2023. "Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Singapore. https://doi.org/10.1007/978-981-99-7108-4_10
The Impact on Employability by COVID-19 Pandemic - AI Case Studies
Bandi, Venkata Bharath, Tao, Xiaohui, Shaik, Thanveer, Yong, Jianming and Zhang, Ji. 2023. "The Impact on Employability by COVID-19 Pandemic - AI Case Studies ." 24th International Conference on Web Information Systems Engineering (WISE 2023). Melbourne, Australia 25 - 27 Oct 2023 Singapore . Springer. https://doi.org/10.1007/978-981-99-7254-8_66
Interrelated feature selection from health surveys using domain knowledge graph
Jaworsky, Markian, Tao, Xiaohui, Pan, Lei, Pokhrel, Shiva Raj, Yong, Jianming and Zhang, Ji. 2023. "Interrelated feature selection from health surveys using domain knowledge graph." Health Information Science and Systems. 11. https://doi.org/10.1007/s13755-023-00254-7
Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks
Zhang, Yang, Wang, Zhen, Yu, Ting, Lu, Mingming, Ren, Zujie and Zhang, Ji. 2023. "Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020547
IDGMS: a One-Stop Graph Mining System for Infectious Diseases
Xu, Zenghui, Yu, Ting, Hong, Xingyun, Li, Mingzhang, Zhang, Yang, Ren, Zujie and Zhang, Ji. 2023. "IDGMS: a One-Stop Graph Mining System for Infectious Diseases." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020537
Debiased Learning of Self-Labeled Twitter Data for User Demographic Prediction
Wang, Zhen, Cooley, Madison, Zhang, Yang, Lan, Chao and Zhang, Ji. 2023. "Debiased Learning of Self-Labeled Twitter Data for User Demographic Prediction." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020166
Fast Fourier Transform and Ensemble Model to Classify Epileptic EEG Signals
Lafta, Raid, Alshaheen, Hisham, Wang, Biao, Tao, Xiaohui, Li, Lingling, Zhang, Kexin and Zhang, Ji. 2023. "Fast Fourier Transform and Ensemble Model to Classify Epileptic EEG Signals." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020818
A Parallel Framework for Streaming Graphs Computing
Jiang, Ting, Yu, Ting, Hong, Zexian, Ren, Zujie and Zhang, Ji. 2023. "A Parallel Framework for Streaming Graphs Computing." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020995
Hyperspectral Anomaly Detection based on Autoencoder using Superpixel Manifold Constraint
Gan, Yuquan, Liu, Wenqiang, Liu, Ying, He, Jinglu and Zhang, Ji. 2023. "Hyperspectral Anomaly Detection based on Autoencoder using Superpixel Manifold Constraint." 2022 5th International Conference on Artificial Intelligence and Pattern Recognition (AIPR 2022). Xiamen China 23 - 25 Sep 2022 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3573942.3574108
A Generative Adversarial Active Learning Method for Effective Outlier Detection
Bah, Mohamed Jaward, Zhang, Ji, Yu, Ting, Xia, Feng, Li, Zhao, Zhou, Shuigeng and Wang, Hongzhi. 2023. "A Generative Adversarial Active Learning Method for Effective Outlier Detection." 34th International Conference on Tools with Artificial Intelligence (ICTAI 2022). Macao, China 31 Oct - 02 Nov 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICTAI56018.2022.00027
Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2023. "Decentralized Blockchain Network." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00049
Hierarchical Aggregation Based Knowledge Graph Embedding for Multi-task Recommendation
Wang, Yani, Zhang, Ji, Zhou, Xiangmin and Zhang, Yang. 2023. "Hierarchical Aggregation Based Knowledge Graph Embedding for Multi-task Recommendation." 6th International Joint Conference on Asia-Pacific Web and Web-Age Information Management (APWeb-WAIM 2022). Nanjing, China 25 - 27 Nov 2022 Switzerland . https://doi.org/10.1007/978-3-031-25201-3_13
An Efficient Embedding Framework for Uncertain Attribute Graph
Jiang, Ting, Yu, Ting, Qiao, Xueting and Zhang, Ji. 2023. "An Efficient Embedding Framework for Uncertain Attribute Graph." 34th International Conference on Database and Expert Systems Applications (DEXA 2023). Penang, Malaysia 28 - 30 Aug 2023 Switzerland . https://doi.org/10.1007/978-3-031-39821-6_18
GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing
Zhao, Jin, Zhang, Yu, He, Ligang, Li, Qikun, Zhang, Xiang, Jiang, Xinyu, Yu, Hui, Liao, Xiaofei, Jin, Hai, Gu, Lin, Liu, Haikun, He, Bingsheng, Zhang, Ji, Song, Xianzheng, Wang, Lin and Zhou, Jun. 2023. "GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing." ACM Transactions on Architecture and Code Optimization. 20 (3), pp. 1-24. https://doi.org/10.1145/3600091
EGraph: Efficient Concurrent GPU-Based Dynamic Graph Processing
Zhang, Yu, Liang, Yuxuan, Zhao, Jin, Mao, Fubing, Gu, Lin, Liao, Xiaofei, Jin, Hai, Liu, Haikun, Guo, Song, Zeng, Yangqing, Hu, Hang, Li, Chen, Zhang, Ji and Wang, Biao. 2023. "EGraph: Efficient Concurrent GPU-Based Dynamic Graph Processing." IEEE Transactions on Knowledge and Data Engineering. 35 (6), pp. 5823-5836. https://doi.org/10.1109/TKDE.2022.3171588
DeepSafety: a deep neural network-based edge computing framework for detecting unsafe behaviors of construction workers
Zhang, Ji, Liu, Chia-Chun and Ying, Josh Jia-Ching. 2023. "DeepSafety: a deep neural network-based edge computing framework for detecting unsafe behaviors of construction workers." Journal of Ambient Intelligence and Humanized Computing. 14 (12), pp. 15997-16009. https://doi.org/10.1007/s12652-023-04554-4
An efficient hardware accelerator for monotonic graph algorithms on dynamic directed graphs
Yang, Yun, Yu, Hui, Zhao, Jin, Zhang, Yu, Liao, Xiaofei, Jiang, Xinyu, Jin, Hai, Liu, Haikun, Mao, Fubing, Zhang, Ji and Wang, Biao. 2023. "An efficient hardware accelerator for monotonic graph algorithms on dynamic directed graphs." Scientia Sinica Informationis. 53 (8), pp. 1575-1592. https://doi.org/10.1360/SSI-2022-0191
FDS_2D: rethinking magnitude-phase features for DeepFake detection
Yang, Gaoming, Wei, Anxing, Fang, Xianjin and Zhang, Ji. 2023. "FDS_2D: rethinking magnitude-phase features for DeepFake detection." Multimedia Systems. 29 (4), pp. 2399-2413. https://doi.org/10.1007/s00530-023-01118-6
Facial depth forgery detection based on image gradient
Xu, Kun, Yang, Gaoming, Fang, Xianjin and Zhang, Ji. 2023. "Facial depth forgery detection based on image gradient." Multimedia Tools and Applications. 82 (19), pp. 29501-29525. https://doi.org/10.1007/s11042-023-14626-4
Toward Learning Joint Inference Tasks for IASS-MTS Using Dual Attention Memory With Stochastic Generative Imputation
Wang, Zhen, Zhang, Yang, Pang, Yan, Wang, Nannan, Bah, Mohamed Jaward, Li, Ke and Zhang, Ji. 2023. "Toward Learning Joint Inference Tasks for IASS-MTS Using Dual Attention Memory With Stochastic Generative Imputation." IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2023.3305542
Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach
Wang, Zhen, Jiang, Ting, Xu, Zenghui, Zhang, Ji and Gao, Jianliang. 2023. "Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach." IEEE Intelligent Systems. 38 (3), pp. 3-11. https://doi.org/10.1109/MIS.2023.3239797
SAGES: Scalable Attributed Graph Embedding With Sampling for Unsupervised Learning
Wang, Jialin, Qu, Xiaoru, Bai, Jinze, Li, Zhao, Zhang, Ji and Gao, Jun. 2023. "SAGES: Scalable Attributed Graph Embedding With Sampling for Unsupervised Learning." IEEE Transactions on Knowledge and Data Engineering. 35 (5), pp. 5216-5229. https://doi.org/10.1109/TKDE.2022.3148272
Mining Periodic-Frequent Patterns in Irregular Dense Temporal Databases Using Set compliments
Veena, Pamalla, Sreepada, Tarun, Kiran, Rage Uday, Dao, Minh-Son, Zettsu, Koli, Watanobe, Yutaka and Zhang, Ji. 2023. "Mining Periodic-Frequent Patterns in Irregular Dense Temporal Databases Using Set compliments." IEEE Access. 11, pp. 118676-118688. https://doi.org/10.1109/ACCESS.2023.3326419
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
High-Order Correlation-Guided Slide-Level Histology Retrieval with Self-Supervised Hashing
Li, Shengrui, Zhao, Yining, Zhang, Jun, Yu, Ting, Zhang, Ji and Gao, Yue. 2023. "High-Order Correlation-Guided Slide-Level Histology Retrieval with Self-Supervised Hashing." IEEE Transactions on Pattern Analysis and Machine Intelligence. 45 (9), pp. 11008-11023. https://doi.org/10.1109/TPAMI.2023.3269810
Class-Level Logit Perturbation
Li, Mengyang, Su, Fengguang, Wu, Ou and Zhang, Ji. 2023. "Class-Level Logit Perturbation." IEEE Transactions on Neural Networks and Learning Systems. https://doi.org/10.1109/TNNLS.2023.3273355
Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management
He, Yifan, Li, Zhao, Li, Zhenpeng, Zhou, Shuigeng, Yu, Ting and Zhang, Ji. 2023. "Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management." IEEE Transactions on Network and Service Management. 20 (2), pp. 1040-1050. https://doi.org/10.1109/TNSM.2023.3234114
Video face forgery detection via facial motion-assisted capturing dense optical flow truncation
Yang, Gaoming, Xu, Kun, Fang, Xianjin and Zhang, Ji. 2023. "Video face forgery detection via facial motion-assisted capturing dense optical flow truncation." The Visual Computer. 39 (11), pp. 5589-5608. https://doi.org/10.1007/s00371-022-02683-z
RSFace: subject agnostic face swapping with expression high fidelity
Yang, Gaoming, Wang, Tao, Fang, Xianjin and Zhang, Ji. 2023. "RSFace: subject agnostic face swapping with expression high fidelity." The Visual Computer. 39 (11), pp. 5497-5511. https://doi.org/10.1007/s00371-022-02675-z
The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds
Downs, Nathan, Raj, Nawin, Vanos, Jennifer, Parisi, Alfio, Butler, Harry, Deo, Ravinesh, Igoe, Damien, Dexter, Benjamin, Beckman-Downs, Melanie, Turner, Joanna and Dekeyser, Stijn. 2023. "The Playground Shade Index: A New Design Metric for Measuring Shade and Seasonal Ultraviolet Protection Characteristics of Parks and Playgrounds." Photochemistry and Photobiology. 99 (4), pp. 1193-1207. https://doi.org/10.1111/php.13745
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
A novel file system supporting rich file classification
Albadri, Nehad and Dekeyser, Stijn. 2022. "A novel file system supporting rich file classification." Computers and Electrical Engineering. 103, pp. 1-9. https://doi.org/10.1016/j.compeleceng.2022.108081
Context-aware Adaptive Outlier Detection in Trajectory Data
Danda, Srinivas, Zhang, Ji, Tao, Xiaohui, Chun-Wei, Jerry and Zhang, Wenbin. 2020. "Context-aware Adaptive Outlier Detection in Trajectory Data." Wu, Xintao, Jermaine, Chris, Xiong, Li, Hu, Xiaohua, Kotevska, Olivera, Lu, Siyuan, Xu, Weija, Aluru, Srinivas, Zhai, Chengxiang, Al-Masri, Eyhab, Chen, Zhiyuan and Saltz, Jeff (ed.) 8th IEEE International Conference on Big Data (2020). Atlanta, United States 10 - 13 Dec 2020 United States. https://doi.org/10.1109/BigData50022.2020.9378046
Distant Supervision for E-commerce Query Segmentation via Attention Network
Li, Zhao, Ding, Donghui, Zou, Pengcheng, Gong, Yu, Chen, Xi, Zhang, Ji, Gao, Jianliang, Wu, Youxi and Duan, Yucong. 2022. "Distant Supervision for E-commerce Query Segmentation via Attention Network." Gao, Honghao, Kim, Jung Yoon, Hussain, Walayat, Iqbal, Muddesar and Duan, Yucong (ed.) Intelligent Processing Practices and Tools for E-Commerce Data, Information, and Knowledge. Switzerland . Springer. pp. 3-19
A Deep Learning Framework for Removing Bias from Single-Photon Emission Computerized Tomography
Ying, Josh Jia-Ching, Yang, Wan-Ju, Zhang, Ji, Ni, Yu-Ching, Lin, Chia-Yu, Tseng, Fan-Pin and Tao, Xiaohui. 2022. "A Deep Learning Framework for Removing Bias from Single-Photon Emission Computerized Tomography." 18th International Conference on Advanced Data Mining and Applications (ADMA 2022). Brisbane, Australia 28 - 30 Nov 2022 Switzerland. https://doi.org/10.1007/978-3-031-22064-7_21
Enhanced Simple Question Answering with Contrastive Learning
Wang, Xin, Yang, Lan, He, Honglian, Fang, Yu, Zhan, Huayi and Zhang, Ji. 2022. "Enhanced Simple Question Answering with Contrastive Learning." 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022). Singapore 06 - 08 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-10983-6_39
Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements
Veena, P., Sreepada, Tarun, Kiran, R. Uday, Dao, Minh-Son, Zettsu, Koji, Watanobe, Yutaka and Zhang, Ji. 2022. "Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-12426-6_16
Effective and Robust Boundary-Based Outlier Detection Using Generative Adversarial Networks
Liang, Qiliang, Zhang, Ji, Bah, Mohamed Jaward, Li, Hongzhou, Chang, Liang and Kiran, Rage Uday. 2022. "Effective and Robust Boundary-Based Outlier Detection Using Generative Adversarial Networks." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland. Springer. https://doi.org/10.1007/978-3-031-12426-6_14
Logit Perturbation
Li, Mengyang, Su, Fengguang, Wu, Ou and Zhang, Ji. 2022. "Logit Perturbation." 36th AAAI Conference on Artificial Intelligence (AAAI 2022). 22 Feb - 01 Mar 2022 United Sates. https://doi.org/10.1609/aaai.v36i2.20024
Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention
Jia, Xiangze, Zhang, Ji, Wang, Zhen, Luo, Yonglong, Chen, Fulong and Yang, Gaoming. 2022. "Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-12426-6_9
JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning
Jia, Xiangze, Zhang, Ji, Wang, Zhen, Luo, Yonglong, Chen, Fulong and Xiao, Jing. 2022. "JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning." 19th Pacific Rim International Conference on Artificial Intelligence (PRICAI 2022). Shanghai, China 10 - 13 Nov 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-20868-3_35
Automated Knowledge Graph Construction for Healthcare Domain
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva. 2022. "Automated Knowledge Graph Construction for Healthcare Domain." 11th International Conference on Health Information Science (HIS 2022). Biarritz, France 28 - 30 Oct 2022 Switzerland . https://doi.org/10.1007/978-3-031-20627-6_24
TAGCN: Typed Attention Graph Convolutional Networks for Entity Alignment in Cross-lingual Knowledge Graphs
Gao, Jianliang, Li, Zhao, Xiong, Fan, Liu, Xiangyue, Xiao, Jie, Wang, Biao and Zhang, Ji. 2022. "TAGCN: Typed Attention Graph Convolutional Networks for Entity Alignment in Cross-lingual Knowledge Graphs." 2021 IEEE 23rd International Conference on High Performance Computing and Communications (HPCC). Hainan, China 20 - 22 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00306
A Secured Movie Recommendation System using Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2022. "A Secured Movie Recommendation System using Decentralized Blockchain Network." 9th International Conference on Behavior, Economic and Social Computing (BESC 2022). Matsuyama, Japan 29 202 - 31 Oct 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BESC57393.2022.9995357
An efficient storage system towards high throughput of concurrent graph processing jobs
Zhao, Jin, Jiang, Xinyu, Zhang, Yu, Zhu, Xiaofei, Jin, Hai, Liu, Haikun, Yang, Yun, Zhang, Ji, Wang, Biao and Yu, Ting. 2022. "An efficient storage system towards high throughput of concurrent graph processing jobs." Scientia Sinica Informationis. 52 (1), pp. 111-128.
Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation
Zhang, Kexin, Li, Lingling, Di, Jinhong, Wang, Yi, Zhao, Xuezhuan and Zhang, Ji. 2022. "Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation." Processes. 10 (12). https://doi.org/10.3390/pr10122623
Learning discriminative representation with global and fine-grained features for cross-view gait recognition
Xiao, Jing, Yang, Huan, Xie, Kun, Zhu, Jia and Zhang, Ji. 2022. "Learning discriminative representation with global and fine-grained features for cross-view gait recognition." CAAI Transactions on Intelligence Technology. 7 (2), pp. 187-199. https://doi.org/10.1049/cit2.12051
OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining
Wu, Youxi, Wang, Xiaohui, Li, Yan, Guo, Lei, Li, Zhao, Zhang, Ji and Wu, Xindong. 2022. "OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining." ACM Transactions on Management Information Systems. 13 (3), pp. 1-23. https://doi.org/10.1145/3476247
Deep Multi-Branch Aggregation Network for Real-Time Semantic Segmentation in Street Scenes
Weng, Xi, Yan, Yan, Dong, Genshun, Shu, Chang, Wang, Biao, Wang, Hanzi and Zhang, Ji. 2022. "Deep Multi-Branch Aggregation Network for Real-Time Semantic Segmentation in Street Scenes." IEEE Transactions on Intelligent Transportation Systems. 23 (10), pp. 17224-17240. https://doi.org/10.1109/TITS.2022.3150350
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest
Shao, Ming-Min, Jiang, Wen-Jun, Wu, Jie, Shi, Yu-Qing, Yum, TakShing and Zhang, Ji. 2022. "Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest." Journal of Computer Science and Technology. 37 (6), pp. 1444-1463. https://doi.org/10.1007/s11390-021-2124-z
Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network
Pang, Yan, Shan, Ai, Wang, Zhen, Wang, Mengyu, Lin, Jianwei, Zhang, Ji, Huang, Teng and Liu, Chao. 2022. "Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network." International Journal of Intelligent Systems. 37 (11), pp. 8770-8789. https://doi.org/10.1002/int.22967
Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification
Pang, Yan, Huang, Teng, Wang, Zhen, Lin, Jianwei, Hosseini, Poorya, Zhang, Ji, Liu, Chao and Ai, Shan. 2022. "Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification ." International Journal of Intelligent Systems. 37 (11), pp. 8747-8769. https://doi.org/10.1002/int.22966
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection
Li, Jiamu, Zhang, Ji, Bah, Mohamed Jaward, Wang, Jian, Zhu, Youwen, Yang, Gaoming, Li, Lingling and Zhang, Kexin. 2022. "An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection." Algorithms. 15 (11). https://doi.org/10.3390/a15110429
Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks
Kong, Lingjun, Chen, Bing, Hu, Feng and Zhang, Ji. 2022. "Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks." Security and Communication Networks. 2022. https://doi.org/10.1155/2022/2330052
A Survey on Contact Tracing: The Latest Advancements and Challenges
Jiang, Ting, Zhang, Yang Zhang, Zhang, Minhao, Yu, Ting, Chen, Yizheng, Lu, Chenhao, Zhang, Ji, Li, Zhao, Gao, Jun and Zhou, Shuigeng. 2022. "A Survey on Contact Tracing: The Latest Advancements and Challenges." ACM Transactions on Spatial Algorithms and Systems. 8 (2), pp. 1-35. https://doi.org/10.1145/3494529
Message from the Program Chair
Zhang, Ji. 2022. "Message from the Program Chair." 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE). Brisbane, Australia 23 - 25 Sep 2022 Brisbane, Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICCSIE56462.2022.00006
Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention
Hou, Linlin, Zhang, Ji, Wu, Ou, Yu, Ting, Wang, Zhen, Li, Zhao, Gao, Jianliang, Ye, Yingchun and Yao, Rujing. 2022. "Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention." Knowledge-Based Systems. 235. https://doi.org/10.1016/j.knosys.2021.107621
Event Detection from Web Data in Chinese Based on Bi-LSTM with Attention
Wu, Yuxin, Xu, Zenghui, Li, Hongzhou, Gan, Yuquan, Ying, Josh Jia-Ching, Yu, Ting and Zhang, Ji. 2022. "Event Detection from Web Data in Chinese Based on Bi-LSTM with Attention." 18th International Conference on Advanced Data Mining and Applications (ADMA 2022). Brisbane, Australia 28 - 30 Nov 2022 Switzerland. https://doi.org/10.1007/978-3-031-22064-7_8
Detecting relational states in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan, Zhu, Xiaodong, Li, Hongzhou and Chang, Liang. 2018. "Detecting relational states in online social networks." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697237
On link stability detection for online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Lin, Jerry Chun-Wei, Li, Hongzhou and Chang, Liang. 2018. "On link stability detection for online social networks." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-319-98809-2_20
Learning relational fractals for deep knowledge graph embedding in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Wang, Dianwei, Ying, Josh Jia-Ching and Wang, Xin. 2019. "Learning relational fractals for deep knowledge graph embedding in online social networks." Cheng, Reynold, mamoulis, Nikos, Sun, Yizhou and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. Springer. https://doi.org/10.1007/978-3-030-34223-4_42
Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions
Munawar, Hafiz Suliman, Zhang, Ji, Li, Hongzhou, Mo, Deqing and Chang, Liang. 2019. "Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions." Leong, Hou U. and Lauw, Hady W. (ed.) 8th Workshop on Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM 2019), held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2019). Macau, China 14 - 17 Apr 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-26142-9_17
A metaheuristic algorithm for hiding sensitive itemsets
Lin, Jerry Chun-Wei, Zhang, Yuyu, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "A metaheuristic algorithm for hiding sensitive itemsets." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_45
Twitter analysis for depression on social networks based on sentiment and stress
Tao, Xiaohui, Dharmalingam, Ravi, Zhang, Ji, Zhou, Xujuan, Li, Lin and Gururajan, Raj. 2019. "Twitter analysis for depression on social networks based on sentiment and stress." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963550
Personalised drug prescription for dental clinics using word embedding
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Oh, Xue Ling and Goh, Elizabeth Zhixin. 2020. "Personalised drug prescription for dental clinics using word embedding." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_5
MeKG: building a medical knowledge graph by data mining from MEDLINE
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhou, Xujuan and Gururajan, Raj. 2019. "MeKG: building a medical knowledge graph by data mining from MEDLINE." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_16
An efficient and secure itinerary-based data aggregation algorithm for WSNs
Wang, Taochun, Zhang, Ji, Luo, Yonglong, Zuo, Kaizhong and Ding, Xintao. 2017. "An efficient and secure itinerary-based data aggregation algorithm for WSNs." 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). Sydney, Australia 01 - 04 Aug 2017 United States. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268
A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Lin, Jerry Chun-Wei, Chen, Fulong, Luo, Yonglong and Zheng, Xiaoyao. 2018. "A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_15
A genetic algorithm based technique for outlier detection with fast convergence
Zhu, Xiaodong, Zhang, Ji, Hu, Zewen, Li, Hongzhou, Chang, Liang, Zhu, Youwen, Lin, Jerry Chun-Wei and Qin, Yongrui. 2018. "A genetic algorithm based technique for outlier detection with fast convergence." Gan, Guojun, Li, Bohan, Li, Xue and Wang, Shuliang (ed.) 14th International Conference on Advanced Data Mining and Applications (ADMA 2018). Nanjing, China 16 - 18 Nov 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-030-05090-0_8
Mining heterogeneous information graph for health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Cai, Yi. 2018. "Mining heterogeneous information graph for health status classification." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697292
Exploring the use of a network model in drug prescription support for dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Qin, Yongrui, Goh, Elizabeth Zhixin and Hu, Aimin. 2018. "Exploring the use of a network model in drug prescription support for dental clinics." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Piscataway, NJ, United States. https://doi.org/10.1109/BESC.2018.00042
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Graph-based multi-label disease prediction model learning from medical data and domain knowledge
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Li, Yuefeng and Xie, Haoran. 2022. "Graph-based multi-label disease prediction model learning from medical data and domain knowledge." Knowledge-Based Systems. 235, pp. 1-15. https://doi.org/10.1016/j.knosys.2021.107662
Mobile-based learning of drug prescription for medical education using artificial intelligence techniques
Tao, Xiaohui, Goh, Wee Pheng, Zhang, Ji, Yong, Jianming, Goh, Elizabeth Zhixin and Oh, Xueling. 2021. "Mobile-based learning of drug prescription for medical education using artificial intelligence techniques." International Journal of Mobile Learning and Organisation. 15 (4), pp. 392-408. https://doi.org/10.1504/IJMLO.2021.118436
Using Machine Learning to Automate Mammogram Images Analysis
Tang, Xuejiao, Zhang, Liuhua, Zhang, Wenbin, Huang, Xin, Iosifidis, Vasileios, Liu, Zhen, Zhang, Mingli, Messina, Enza and Zhang, Ji. 2021. "Using Machine Learning to Automate Mammogram Images Analysis." Park, Taesung, Cho, Young-Rae, Hu, Xiaohua, Yoo, Illhoi, Woo, Hyun Goo, Wang, Jianxin, Facelli, Julio and Nam, Seungyoon (ed.) 2020 International Conference on Bioinformatics and Biomedicine (BIBM'20). Seoul, South Korea 16 - 19 Dec 2020 Piscataway, United States. https://doi.org/10.1109/BIBM49941.2020.9313247
Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks
Ghimire, Sujan, Yaseen, Zaher Mundher, Farooque, Aitazaz A., Deo, Ravinesh C., Zhang, Ji and Tao, Xiaohui. 2021. "Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks." Scientific Reports. 11, pp. 1-26. https://doi.org/10.1038/s41598-021-96751-4
A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065
Extending Graph Pattern Matching with Regular Expressions
Wang, Xin, Wang, Yang, Xu, Yang, Zhang, Ji and Zhong, Xueyan. 2020. "Extending Graph Pattern Matching with Regular Expressions." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59051-2_8
Bounded Pattern Matching Using Views
Wang, Xin, Wang, Yang, Zhang, Ji and Zhu, Yan. 2020. "Bounded Pattern Matching Using Views." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59003-1_19
Predicting Workplace Injuries Using Machine Learning Algorithms
Sukumar, Divya, Zhang, Ji, Tao, Xiaohui, Wang, Xin and Zhang, Wenbin. 2020. "Predicting Workplace Injuries Using Machine Learning Algorithms." Webb, Geoff, Zhang, Zhongfei, Tseng, Vincent S., Williams, Graham, Vlachos, Michalis and Cao, Longbing (ed.) 7th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2020). Sydney, Australia 06 - 09 Oct 2020 Piscataway, United States. https://doi.org/10.1109/DSAA49011.2020.00104
Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams
Zhang, Wenbin, Zhang, Mingli, Zhang, Ji, Liu, Zhen, Chen, Zhiyuan, Wang, Jianwu, Raff, Edward and Messina, Enza. 2020. "Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams." Alamaniotis, Miltos and Pan, Shimei (ed.) 32nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2020). Baltimore, United States 09 - 11 Nov 2020 Piscataway, United States. https://doi.org/10.1109/ICTAI50040.2020.00069
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738
Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8
Proof Learning in PVS with Utility Pattern Mining
Nawaz, M. Saqib, Fournier-Viger, Philippe and Zhang, Ji. 2020. "Proof Learning in PVS with Utility Pattern Mining." IEEE Access. 8, pp. 119806-119818. https://doi.org/10.1109/ACCESS.2020.3004199
Deep interest shifting network with meta embeddings for fresh item recommendation
Li, Zhao, Wang, Haobo, Ding, Donghui, Hu, Shichang, Zhang, Zhen, Liu, Weiwei, Gao, Jianliang, Zhang, Zhiqiang and Zhang, Ji. 2020. "Deep interest shifting network with meta embeddings for fresh item recommendation." Complexity. https://doi.org/10.1155/2020/8828087
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2020. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
An efficient chain structure to mine high-utility sequential patterns
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2019. "An efficient chain structure to mine high-utility sequential patterns." 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019). Beijing, China 08 - 11 Nov 2019 https://doi.org/10.1109/ICDMW.2019.00146
Identification of stress impact on personality density distributions
Lys, Brendan, Tao, Xiaohui, Machin, Tony, Zhang, Ji and Zhong, Ning. 2019. "Identification of stress impact on personality density distributions." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_26
SLIND: identifying stable links in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Zheng, Xiaoyao, Luo, Yonglong and Lin, Jerry Chun-Wei. 2018. "SLIND: identifying stable links in online social networks." Pei, Jian, Sadiq, Shazia, Manolopoulos, Yannis and Li, Jianxin (ed.) 23rd International Conference on Database Systems for Advanced Applications (DASFAA 2018). Gold Coast, Australia 21 - 24 May 2018 Switzerland. https://doi.org/10.1007/978-3-319-91458-9_54
Anonymization of multiple and personalized sensitive attributes
Lin, Jerry Chun-Wei, Liu, Qiankun, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "Anonymization of multiple and personalized sensitive attributes." Ordonez, Carlos and Bellatreche, Ladjel (ed.) 20th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. https://doi.org/10.1007/978-3-319-98539-8_16
The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)
Zhou, Xiangmin, Zhang, Ji and Zhang, Yanchun. 2019. "The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)." 12th ACM International Conference on Web Search and Data Mining (WSDM 2019). Melbourne, Australia 11 - 15 Feb 2019 New York, United States. https://doi.org/10.1145/3289600.3291372
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
PPSF: an open-source privacy-preserving and security mining framework
Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Wu, Lintai, Gan, Wensheng, Djenouri, Youcef and Zhang, Ji. 2018. "PPSF: an open-source privacy-preserving and security mining framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 18th IEEE International Conference on Data Mining Workshops (ICDMW 2018). Singapore 17 - 20 Nov 2018 New York, United States. https://doi.org/10.1109/ICDMW.2018.00208
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
Feature-Based Learning in Drug Prescription System for Medical Clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Feature-Based Learning in Drug Prescription System for Medical Clinics." Neural Processing Letters. 52, pp. 1703-1721. https://doi.org/10.1007/s11063-020-10296-7
A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Diykh, Mohammed and Lin, Jerry Chun-Wei. 2018. "A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment." Roy, Sanjiban Sekhar, Samui, Pijushi, Deo, Ravinesh and Ntalampiras, Stalampiras (ed.) Big data in engineering applications. Singapore. Springer. pp. 363-384
Enhanced sequence labeling based on latent variable conditional random fields
Lin, Jerry Chun-Wei, Shao, Yinan, Zhang, Ji and Yun, Unil. 2020. "Enhanced sequence labeling based on latent variable conditional random fields." Neurocomputing. 403, pp. 431-440. https://doi.org/10.1016/j.neucom.2020.04.102
SLIND+: stable LINk detection
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Li, Hongzhou, Chen, Fulong and Luo, Yonglong. 2020. "SLIND+: stable LINk detection." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_8
A novel differential privacy recommendation method based on distributed framework
Zheng, Xiaoyao, Luo, Yonglong, Zhang, Ji, Sun, Liping and Chen, Fulong. 2018. "A novel differential privacy recommendation method based on distributed framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 2018 Workshop on Scalable and Applicable Recommendation Systems (SAREC 2018), in conjunction with the 18th IEEE International Conference on Data Mining (ICDM 2018). Singapore 17 - 20 Nov 2018 Los Alamitos, California. https://doi.org/10.1109/ICDMW.2018.00189
Mining health knowledge graph for health risk prediction
Tao, Xiaohui, Pham, Thuan, Zhang, Ji, Yong, Jianming, Goh, Wee Pheng, Zhang, Wenping and Cai, Yi. 2020. "Mining health knowledge graph for health risk prediction." World Wide Web. 23 (4), pp. 2341-2362. https://doi.org/10.1007/s11280-020-00810-1
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007
Constructing a knowledge-based heterogeneous information graph for medical health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Constructing a knowledge-based heterogeneous information graph for medical health status classification." Health Information Science and Systems. 8 (1). https://doi.org/10.1007/s13755-020-0100-6
Relational intelligence recognition in online social networks - a survey
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan and Chen, Bing. 2020. "Relational intelligence recognition in online social networks - a survey." Computer Science Review. 35. https://doi.org/10.1016/j.cosrev.2019.100221
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
A general extensible learning approach for multi-disease recommendations in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Zhu, Xiaodong, Li, Hongzhou, Chang, Liang and Deo, Ravinesh. 2020. "A general extensible learning approach for multi-disease recommendations in a telehealth environment ." Pattern Recognition Letters. 132, pp. 106-114. https://doi.org/10.1016/j.patrec.2018.11.006
Efficient chain structure for high-utility sequential pattern mining
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2020. "Efficient chain structure for high-utility sequential pattern mining." IEEE Access. 8, pp. 40714-40722. https://doi.org/10.1109/ACCESS.2020.2976662
FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection
Zhu, Xiaodong, Zhang, Ji, Li, Hongzhou, Fournier-Viger, Philippe, Lin, Jerry Chun-Wei and Chang, Liang. 2017. "FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection." IEEE Access. 5, pp. 25682-25695. https://doi.org/10.1109/ACCESS.2017.2771237
Mining of high average-utility patterns with item-level thresholds
Lin, Jerry Chun-Wei, Li, Ting, Fournier-Viger, Philippe, Zhang, Ji and Guo, Xiangmin. 2019. "Mining of high average-utility patterns with item-level thresholds." Journal of Internet Technology. 20 (1), pp. 187-194. https://doi.org/10.3966/160792642019012001017
High average-utility sequential pattern mining based on uncertain databases
Lin, Jerry Chun-Wei, Li, Ting, Pirouz, Matin, Zhang, Ji and Fournier-Viger, Philippe. 2020. "High average-utility sequential pattern mining based on uncertain databases." Knowledge and Information Systems. 62 (3), pp. 1199-1228. https://doi.org/10.1007/s10115-019-01385-8
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
Li, Xingxin, Zhu, Youwen, Wang, Jian and Zhang, Ji. 2019. "Efficient and secure multi-dimensional geometric range query over encrypted data in cloud." Journal of Parallel and Distributed Computing. 131, pp. 44-54. https://doi.org/10.1016/j.jpdc.2019.04.015
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
VennTags: A file management system based on overlapping sets of tags
Albadri, Nehad, Dekeyser, Stijn and Watson, Richard. 2017. "VennTags: A file management system based on overlapping sets of tags." Sterzer, Wjatscheslaw and van de Sandt, Stephanie (ed.) iConference 2017 Effect, Expand, Evolve: Global Collaboration Across the Information Community. Wuhan, China 22 - 25 Mar 2017 United States. https://doi.org/10.9776/17002
Knowledge graph embedding by dynamic translation
Chang, Liang, Zhu, Manli, Gu, Tianlong, Bin, Chenzhong, Qian, Junyan and Zhang, Ji. 2017. "Knowledge graph embedding by dynamic translation." IEEE Access. 5 (3), pp. 20898-20907. https://doi.org/10.1109/ACCESS.2017.2759139
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490
Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.
A two-phase approach to mine short-periodic high utility itemsets in transactional databases
Lin, Jerry Chun-Wei, Zhang, Jiexiong, Fournier-Viger, Philippe, Hong, Tzung-Pei and Zhang, Ji. 2017. "A two-phase approach to mine short-periodic high utility itemsets in transactional databases." Advanced Engineering Informatics: the science of supporting knowledge-intensive activities. 33, pp. 29-43. https://doi.org/10.1016/j.aei.2017.04.007
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902
A novel social network hybrid recommender system based on hypergraph topologic structure
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Ding, Xintao and Zhang, Ji. 2018. "A novel social network hybrid recommender system based on hypergraph topologic structure." World Wide Web. 21 (4), pp. 985-1013. https://doi.org/10.1007/s11280-017-0494-5
Exploiting highly qualified pattern with frequency and weight occupancy
Gan, Wensheng, Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Chao, Han-Chieh, Zhan, Justin and Zhang, Ji. 2018. "Exploiting highly qualified pattern with frequency and weight occupancy." Knowledge and Information Systems. 56 (1), pp. 165-196. https://doi.org/10.1007/s10115-017-1103-8
An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control
Chen, Fulong, Luo, Yonglong, Zhang, Ji, Zhu, Junru, Zhang, Ziyang, Zhao, Chuanxin and Wang, Taochun. 2018. "An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control." World Wide Web. 21 (1), pp. 33-57. https://doi.org/10.1007/s11280-017-0455-z
A tourism destination recommender system using users' sentiment and temporal dynamics
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Zhang, Ji and Chen, Fulong. 2018. "A tourism destination recommender system using users' sentiment and temporal dynamics." Journal of Intelligent Information Systems. 51 (3), pp. 557-578. https://doi.org/10.1007/s10844-018-0496-5
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
Cloud service description model: an extension of USDL for cloud services
Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
On relational learning and discovery in social networks: a survey
Zhang, Ji, Tan, Leonard and Tao, Xiaohui. 2018. "On relational learning and discovery in social networks: a survey." International Journal of Machine Learning and Cybernetics. 10 (8), pp. 2085-2102. https://doi.org/10.1007/s13042-018-0823-8
Drug prescription support in dental clinics through drug corpus mining
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Xie, Haoran. 2018. "Drug prescription support in dental clinics through drug corpus mining." International Journal of Data Science and Analytics. 6 (4), pp. 341-349. https://doi.org/10.1007/s41060-018-0149-3
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
Exploring the design space of metadata-focused file management systems
Watson, Richard, Dekeyser, Stijn and Albadri, Nehad. 2017. "Exploring the design space of metadata-focused file management systems." Australasian Computer Science Week 2017 (ACSW 2017). Geelong, Australia 31 Jan - 03 Feb 2017 New York, United States. https://doi.org/10.1145/3014812.3014833
Mining drug properties for decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2017. "Mining drug properties for decision support in dental clinics." Kim, J., Shim, K., Cao, L., Lee, J., Lin, X. and Moon, Y. (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Germany. Springer. https://doi.org/10.1007/978-3-319-57529-2_30
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
Coupling topic modelling in opinion mining for social media analysis
Zhou, Xujuan, Tao, Xiaohui, Rahman, Md Mostafijur and Zhang, Ji. 2017. "Coupling topic modelling in opinion mining for social media analysis." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3106459
A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Abbas, Wessam, Luo, Yonglong, Chen, Fulong and Tseng, Vincent S.. 2017. "A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset." Kim, Jinho, Shim, Kyuseok, Cao, Longbing, Lee, Jae-Gil, Lin, Xuemin and Moon, Yang-Sae (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Switzerland. Springer. https://doi.org/10.1007/978-3-319-57454-7_51
A survey of itemset mining
Fournier-Viger, Philippe, Lin, Jerry Chun-Wei, Vo, Bay, Chi, Tin Truong, Zhang, Ji and Le, Hoai Bac. 2017. "A survey of itemset mining." WIREs Data Mining and Knowledge Discovery. 7 (4). https://doi.org/10.1002/widm.1207
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
Zhang, Ji, Lafta, Raid, Tao, Xiaohui, Li, Yan, Chen, Fulong, Luo, Yonglong and Zhu, Xiaodong. 2017. "Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment." IEEE Access. 5 (1), pp. 10674-10685. https://doi.org/10.1109/ACCESS.2017.2706318
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
Detecting global outliers from large distributed databases
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "Detecting global outliers from large distributed databases." Liu, Yanbing, Yue, Shigang, Leung, Frank H. F., Zhao, Guofeng and Wang, Lipo (ed.) 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012). Chongqing, China 29 - 31 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2012.6233948
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization
Qi, Xuemei, Wang, Hongtao, Zhu, Haihong, Zhang, Ji, Chen, Fulong and Yang, Jie. 2016. "Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization." International Journal of Production Research. 54 (16), pp. 4957-4972. https://doi.org/10.1080/00207543.2016.1150615
Instance independent concurrency control for semistructured databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2003. "Instance independent concurrency control for semistructured databases." Flesca, Sergio and Sacca, Domenico (ed.) 11th Italian Symposium on Advanced Database Systems. Cetraro, Italy 24 - 27 Jun 2003
GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques
Li, Hongzhou, Zhang, Ji, Luo, Yonglong, Chen, Fulong and Chang, Liang. 2016. "GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques." Ray, T., Sarker, R. and Li, X. (ed.) 2nd Australasian Conference on Artificial Life and Computational Intelligence (ACALCI 2016). Canberra, Australia 02 - 05 Feb 2016 Switzerland. Springer. https://doi.org/10.1007/978-3-319-28270-1_11
Guaranteeing correctness for collaboration on documents using an optimal locking protocol
Dekeyser, Stijn and Hidders, Jan. 2011. "Guaranteeing correctness for collaboration on documents using an optimal locking protocol." International Journal of Distributed Systems and Technologies. 2 (4), pp. 17-29. https://doi.org/10.4018/jdst.2011100102
TreeTags: bringing tags to the hierarchical file system
Albadri, Nehad, Watson, Richard and Dekeyser, Stijn. 2016. "TreeTags: bringing tags to the hierarchical file system." 2016 Australasian Computer Science Week Multiconference (ACSW '16). Canberra, Australia 02 - 05 Feb 2016 United States. https://doi.org/10.1145/2843043.2843868
Settlement analyses of underground circular tunneling in soft clay
Shiau, J. S., Sams, M. S., Zhang, J. and Kemp, R. J.. 2014. "Settlement analyses of underground circular tunneling in soft clay." Yoo, Chungsik, Park, Seong-Wan, Kim, Bumjoo and Ban, Hoki (ed.) 8th International Symposium on Geotechnical Aspects of Underground Construction in Soft Ground (TC204 ISSMGE IS-SEOUL 2014). Seoul, Korea 25 - 27 Aug 2014 Netherlands. https://doi.org/10.1201/b17240-63
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2016. "IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_58
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection
Ying, Josh Jia-Ching, Zhang, Ji, Huang, Che-Wei, Chen, Kuan-Ta and Tseng, Vincent S.. 2016. "PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection." 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016). Wuhan, China 13 - 16 Dec 2016 United States. https://doi.org/10.1109/ICPADS.2016.0140
NSSSD: a new semantic hierarchical storage for sensor data
Gheisari, Mehdi, Movassagh, Ali Akbar, Qin, Yongrui, Yong, Jianming, Tao, Xiaohui, Zhang, Ji and Shen, Haifeng. 2016. "NSSSD: a new semantic hierarchical storage for sensor data." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7565984
Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification
Al-kharaz, Ali A., Tao, Xiaohui, Zhang, Ji and Lafta, Raid. 2016. "Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_15
Sentiment analysis for depression detection on social networks
Tao, Xiaohui, Zhou, Xujuan, Zhang, Ji and Yong, Jianming. 2016. "Sentiment analysis for depression detection on social networks." Li, Jinyan, Li, Xue, Wang, Xue, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_59
Comparing academic workload models: how Australian universities resource teaching activities
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2016. "Comparing academic workload models: how Australian universities resource teaching activities." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2016: From Rhetoric to Reality (TEMC 2016). Auckland, New Zealand 11 - 14 Sep 2016 Australia.
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Anonymity-based privacy preserving network data publication
Liu, Peng, Li, Yidong, Sang, Yingpeng and Zhang, Ji. 2016. "Anonymity-based privacy preserving network data publication." 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016). Tianjin, China 23 - 26 Aug 2016 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2016.0144
An intelligent recommender system based on predictive analysis in telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Tseng, Vincent S., Luo, Yonglong and Chen, Fulong. 2016. "An intelligent recommender system based on predictive analysis in telehealthcare environment." Web Intelligence. 14 (4), pp. 325-336. https://doi.org/10.3233/WEB-160348
Current practice in academic workload allocation processes in Australia
Watson, Richard, King, Rachel, Dekeyser, Stijn, Bare, Liz and Baldock, Clive. 2015. "Current practice in academic workload allocation processes in Australia." Dobson, Ian R. and Sharma, Raj (ed.) Tertiary Education and Management Conference 2015: Leading Locally Competing Globally (TEMC 2015). Wollongong, Australia 30 Aug - 02 Sep 2015 Australia.
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2015. "An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients." 4th International Workshop on Web Personalization, Recommender Systems and Social Media (WPRSM2015), Joint with WI-IAT 2015. Singapore 06 - 09 Dec 2015 Singapore. https://doi.org/10.1109/WI-IAT.2015.47
A study of drug interaction for personalised decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2015. "A study of drug interaction for personalised decision support in dental clinics." 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2015). Singapore 06 - 09 Dec 2015 https://doi.org/10.1109/WI-IAT.2015.28
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
How do students use their mobile devices to support learning? A case study from an Australian regional university
Farley, Helen, Murphy, Angela, Johnson, Chris, Carter, Brad, Lane, Michael, Midgley, Warren, Hafeez-Baig, Abdul, Dekeyser, Stijn and Koronios, Andy. 2015. "How do students use their mobile devices to support learning? A case study from an Australian regional university." Journal of Interactive Media in Education. 15 (1), pp. 1-13. https://doi.org/10.5334/jime.ar
Decision support systems for adoption in dental clinics: a survey
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2016. "Decision support systems for adoption in dental clinics: a survey." Knowledge-Based Systems. 104, pp. 195-206. https://doi.org/10.1016/j.knosys.2016.04.022
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
A standardized design methodology for complex digital logic components of cyber-physical systems
Chen, F., Ye, H., Yang, J., Huang, Y., Zhang, J., Qi, X., Zhao, C., Zhu, J. and Zhou, W.. 2015. "A standardized design methodology for complex digital logic components of cyber-physical systems." Microprocessors and Microsystems. 39 (8), pp. 1245-1254. https://doi.org/10.1016/j.micpro.2015.08.012
Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications
Sun, Liping, Luo, Yonglong, Ding, Xintao and Zhang, Ji. 2014. "A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications." Computational Intelligence and Neuroscience. 2014. https://doi.org/10.1155/2014/160730
A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425
Detecting anomalies from big network traffic data using an adaptive detection approach
Zhang, Ji, Li, Hongzhou, Gao, Qigang, Wang, Hai and Luo, Yonglong. 2015. "Detecting anomalies from big network traffic data using an adaptive detection approach." Information Sciences. 318, pp. 91-110. https://doi.org/10.1016/j.ins.2014.07.044
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Designing an academic workload model in the age of blended learning
Dekeyser, Stijn, Watson, Richard and Bare, Elizabeth. 2014. "Designing an academic workload model in the age of blended learning." Dobson, Ian R., Conway, Maree and Sharma, Raj (ed.) Tertiary Education and Management Conference 2014: Rainforest to Reef (TEMC 2014). Cairns, Australia 31 Aug - 03 Sep 2014 Australia.
Energy effective congestion control for multicast with network coding in wireless ad hoc network
Zhao, Chuanxin, Luo, Yonglong, Chen, Fulong, Zhang, Ji and Wang, Ruchuan. 2014. "Energy effective congestion control for multicast with network coding in wireless ad hoc network." Mathematical Problems in Engineering. https://doi.org/10.1155/2014/135945
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816
Listening to the student voice: how are students really using mobile technologies for learning?
Murphy, Angela, Farley, Helen, Johnson, Chris, Lane, Michael, Carter, Brad, Hafeez-Baig, Abdul, Midgley, Warren, Dekeyser, Stijn, Rees, Sharon, Mitchell, Maxine, Doyle, Joanne and Koronios, Andy. 2013. "Listening to the student voice: how are students really using mobile technologies for learning?" Carter, Helen, Gosper, Maree and Hedberg, John (ed.) 30th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2013). Sydney, Australia 01 - 04 Dec 2013
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Mapping semantic knowledge for unsupervised text categorisation
Tao, Xiaohui, Li, Yuefeng, Zhang, Ji and Yong, Jianming. 2013. "Mapping semantic knowledge for unsupervised text categorisation." Wang, Hua and Rui, Zhang (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Metadata manipulation interface design
Dekeyser, Stijn and Watson, Richard. 2013. "Metadata manipulation interface design." Smith, Ross T. and Wunsche, Burkhard C. (ed.) 14th Australasian User Interface Conference (AUIC 2013): User Interfaces 2013. Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
Advancements of outlier detection: a survey
Zhang, Ji. 2013. "Advancements of outlier detection: a survey." ICST Transactions on Scalable Information Systems. 13 (1), pp. 1-26. https://doi.org/10.4108/trans.sis.2013.01-03.e2
An innovative outlier detection method using localized thresholds
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "An innovative outlier detection method using localized thresholds." Data and Knowledge Engineering. https://doi.org/10.1007/978-3-642-34679-8-7
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Efficient and effective filtering of duplication detection in large database applications
Zhang, Ji. 2012. "Efficient and effective filtering of duplication detection in large database applications." Journal of Software. 7 (11), pp. 2424-2436. https://doi.org/10.4304/jsw.7.11.2424-2436
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Optimal timepoint sampling in high-throughput gene expression experiments
Rosa, Bruce A., Zhang, Ji, Major, Ian T., Qin, Wensheng and Chen, Jin. 2012. "Optimal timepoint sampling in high-throughput gene expression experiments." Bioinformatics. 28 (21), pp. 2773-2781. https://doi.org/10.1093/bioinformatics/bts511
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Five examples of web-services for illustrating requirements for security architecture
Addie, Ronald G., Moffatt, Sam, Dekeyser, Stijn and Colman, Alan. 2011. "Five examples of web-services for illustrating requirements for security architecture." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053929
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
A process provenance service system for scientific data analysis and sharing
Liu, Qing, Zhang, Ji, Forbes, James, Xu, Kai and Nair, Dinesh. 2011. "A process provenance service system for scientific data analysis and sharing." Zhang, Ji and Livraga, Gionvanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053921
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
A transaction model for XML databases
Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2004. "A transaction model for XML databases." World Wide Web. 7 (1), pp. 29-57. https://doi.org/10.1023/B:WWWJ.0000015864.75561.98
A commit scheduler for XML databases
Dekeyser, Stijn and Hidders, Jan. 2003. "A commit scheduler for XML databases." Xiaofang, Zhou, Zhang, Yanchun and Orlowska, Maria E. (ed.) 5th Asia-Pacific Web Conference (APWeb 2003): Web Technologies and Applications. Xian, China 23 - 25 Apr 2003 China. Springer. https://doi.org/10.1007/3-540-36901-5_8
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
A simple time-management tool for students' online learning activities
de Raadt, Michael and Dekeyser, Stijn. 2009. "A simple time-management tool for students' online learning activities." Atkinson, Roger J. and McBeath, Clare (ed.) 26th Annual Conference of the Australasian Society for Computers in Learning in Tertiary Education (ASCILITE 2009). Auckland, New Zealand 06 - 09 Dec 2009 Auckland, New Zealand.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24
Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11
On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48
PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47
Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers: a journal of research and innovation. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
A system employing peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Y.. 2007. "A system employing peer review and enhanced computer assisted assessment of querying skills." Informatics in Education. 6 (1), pp. 163-178.
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills
de Raadt, Michael, Dekeyser, Stijn and Lee, Tien Yu. 2006. "Do students SQLify?: improving learning outcomes with peer review and enhanced computer assisted assessment of querying skills." Berglund, Anders and Wiggberg, Mattias (ed.) 6th Baltic Sea Conference on Computing Education Research (Koli Calling 2006). Koli, Finland 09 - 12 Nov 2006 Sweden. https://doi.org/10.1145/1315803.1315821
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
Analyzing workflows implied by instance-dependent access rules
Calders, Toon, Dekeyser, Stijn, Hidders, Jan and Paredaens, Jan. 2006. "Analyzing workflows implied by instance-dependent access rules." 2006 ACM SIGMOD/PODS Conference. Chicago, United States of America 26 - 29 Jun 2006 United States. https://doi.org/10.1145/1142351.1142365
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Peer-to-peer form based web information systems
Dekeyser, Stijn, Hidders, Jan, Watson, Richard and Addie, Ron. 2006. "Peer-to-peer form based web information systems." Dobbie, Gillian and Bailey, James (ed.) ADC 2006: 17th Australasian Database Conference. Hobart, Australia 16 - 19 Jan 2006 Australia.
Instance-independent view serializability for semistructured databases
Dekeyser, Stijn, Hidders, Jan, Paredaens, Jan and Vercammen, Roel. 2005. "Instance-independent view serializability for semistructured databases." The Computing Research Repository (CoRR).
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Piecemeal: a formal collaborative editing technique guaranteeing correctness
Dekeyser, Stijn and Hidders, Jan. 2010. "Piecemeal: a formal collaborative editing technique guaranteeing correctness." Bessis, Nik, Kommers, Piet and Isaias, Pedro (ed.) IADIS International Conference on Collaborative Technologies 2010 (IADIS 2010). Freiburg, Germany 26 - 31 Jul 2010 Germany.
Web service management system for bioinformatics research: a case study
Xu, Kai, Yu, Qi, Liu, Qing, Zhang, Ji and Bouguettaya, Athman. 2011. "Web service management system for bioinformatics research: a case study." Service Oriented Computing and Applications. 5 (1), pp. 1-15. https://doi.org/10.1007/s11761-011-0076-9
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24
An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78
A web-based interactive data visualization system for outlier subspace analysis
Liu, Dong, Gao, Qigang, Wang, Hai and Zhang, Ji. 2010. "A web-based interactive data visualization system for outlier subspace analysis." Debnath, Narayan (ed.) SEDE 2010: 19th International Conference on Software Engineering and Data Engineering. San Francisco, United States 16 - 18 Jun 2010 Cary, NC. United States.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Semi-bipartite graph visualization for gene ontology networks
Xu, Kai, Williams, Rohan, Hong, Seok-Hee, Liu, Qing and Zhang, Ji. 2010. "Semi-bipartite graph visualization for gene ontology networks." Eppstein, D. and Gansner, E. R. (ed.) GD 2009: 17th International Symposium on Graph Drawing. Chicago, United States 22 - 25 Sep 2009 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-11805-0_24
FlowRecommender: a workflow recommendation technique for process provenance
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "FlowRecommender: a workflow recommendation technique for process provenance." Kennedy, Paul J., Ong, Kok-Leong and Christen, Peter (ed.) 8th Australasian Data Mining Conference (AusDM 2009): Data Mining and Analytics. Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Image mining: issues, frameworks and techniques
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "Image mining: issues, frameworks and techniques." Zaïane, Osmar R. and Simoff, Simeon J. (ed.) 2nd ACM SIGKDD International Workshop on Multimedia Data Mining (MDM/KDD'01). San Francisco, USA 26 Aug 2001 Canada.
HOS-Miner: a system for detecting outlying subspaces of high-dimensional data
Zhang, Ji, Lou, Meng, Ling, Tok Wang and Wang, Hai. 2004. "HOS-Miner: a system for detecting outlying subspaces of high-dimensional data." Nascimento, Mario A., Özsu, M. Tamer, Kossmann, Donald, Miller, Renee J., Blakeley, Jose A. and Schiefer, K. Bernhard (ed.) 30th International Conference on Very Large Data Bases (VLDB'04). Toronto, Canada 31 Aug - 03 Sep 2004 San Francisco, California, United States.
Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance
Zhang, Ji and Wang, Hai. 2006. "Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance." Knowledge and Information Systems. 10 (3), pp. 333-355.
Outlier detection for high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2007. "Outlier detection for high-dimensional data streams." 5th Dalhousie Computer Science In-house Conference (DCSI'07). Halifax, Canada 05 Apr 2007 Halifax, Nova Scotia, Canada.
D-GridMST: clustering large distributed spatial databases
Zhang, Ji and Liu, Han. 2005. "D-GridMST: clustering large distributed spatial databases." Halgamuge, Saman K. and Wang, Lipo (ed.) Classification and clustering for knowledge discovery. Berlin, Germany. Springer. pp. 61-72
A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data
Liu, Han, Kustra, Rafal and Zhang, Ji. 2004. "A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data." Arabnia, Hamid R. (ed.) 2004 International Conference on Artificial Intelligence (ICAI'04). Las Vegas, United States 21 - 24 Jun 2004 Las Vegas, Nevada, USA.
A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval
Zhang, Ji, Wang, Wei and Zhang, Sheng. 2005. "A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval." Arabnia, Hamid R. and Scime, A. (ed.) 2005 International Conference on Data Mining (DMIN'05). Las Vegas, United States of America Jun 2005 Las Vegas, Nevada, USA.
Image mining: trends and developments
Hsu, Wynne, Lee, Mong Li and Zhang, Ji. 2002. "Image mining: trends and developments." Journal of Intelligent Information Systems. 19 (1), pp. 7-23. https://doi.org/10.1023/A:1015508302797
A framework for efficent association rule mining in XML data
Zhang, Ji, Liu, Han, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2006. "A framework for efficent association rule mining in XML data." Journal of Database Management. 17 (3), pp. 19-40.
Gene specific co-regulation discovery from gene microarray data
Zhang, Ji, Liu, Qing, Xu, Kai and de Souza, Paulo. 2008. "Gene specific co-regulation discovery from gene microarray data." Arthur, Jonathan and Ng, See-Kiong (ed.) 19th International Conference on Genome Informatics (GIW 2008). Gold Coast, Australia 01 - 03 Dec 2008
Discover gene specific local co-regulations from time-course gene expression data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Discover gene specific local co-regulations from time-course gene expression data." Journal of Scientific Programming. 16 (1), pp. 31-47. https://doi.org/10.3233/SPR-2008-0243
A review of ontology and web service composition
Zhang, Ji. 2008. A review of ontology and web service composition. Australia. CSIRO Publishing.
Bio-SENSE: semantic web services for bioinformatics provenance
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-SENSE: semantic web services for bioinformatics provenance." Bird, Trevor (ed.) 2008 CSIRO ICT Centre Conference. Sydney, Australia 20 - 21 Nov 2008 Sydney, Australia.
Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy
Zhang, Ji. 2008. Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy. PhD Thesis Doctor of Philosophy. Dalhousie University, Canada.
X-warehouse: building query pattern-driven data warehouse for XML data
Zhang, Ji, Wang, Wei, Liu, Han and Zhang, Sheng. 2005. "X-warehouse: building query pattern-driven data warehouse for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
XAR-Miner: efficient association rules mining for XML data
Zhang, Sheng, Zhang, Ji, Liu, Han and Wang, Wei. 2005. "XAR-Miner: efficient association rules mining for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
Detecting outlying subspaces for high-dimensional data: a heuristic search approach
Zhang, Ji. 2005. "Detecting outlying subspaces for high-dimensional data: a heuristic search approach." 2005 SIAM International Workshop on Feature Selection for Data Mining: Interfacing Machine Learning and Statistics. Newport Beach, United States of America 23 Apr 2005
Outlying subspace detection for high-dimensional data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2009. "Outlying subspace detection for high-dimensional data." Rivero, Laura C., Doorn, Jorge Horacio and Ferraggine, Viviana E. (ed.) Encyclopedia of database technologies and applications, 2nd ed.. Hershey, PA, United States. IGI Global. pp. 1-6
Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases
Wang, Wei, Zhang, Ji and Wang, Hai. 2005. "Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases." Hao, Y., Liu, J., Wang, Y., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.-C. (ed.) 2005 IEEE International Conference on Computational Intelligence and Security (CIS'05). Xi'an, China 15 - 19 Dec 2005 Heidelberg, Germany.
Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services." 4th IEEE International Conference on eScience (eScience'08). Indianapolis, United States 10 - 12 Dec 2009 New York, United States.
Discover gene specific local co-regulations using progressive genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "Discover gene specific local co-regulations using progressive genetic algorithm." 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06). Washington D.C., United States 13 - 15 Nov 2006 New York, United States.
A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm." 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, China 18 - 20 Dec 2006 New York, United States.
Anomaly detection in high-dimensional network data streams: a case study
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Anomaly detection in high-dimensional network data streams: a case study." 2008 IEEE International Conference on Intelligence and Security Informatics (ISI '08). Taipei, Taiwan 17 - 20 Jun 2008 New York, United States.
SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638
Clustering in dynamic spatial databases
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2005. "Clustering in dynamic spatial databases." Journal of Intelligent Information Systems. 24 (1), pp. 5-27. https://doi.org/10.1007/s10844-005-0265-0
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
A model, schema, and interface for metadata file systems
Dekeyser, Stijn, Watson, Richard and Motroen, Lasse. 2008. "A model, schema, and interface for metadata file systems." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Wollongong, Australia.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Computer assisted assessment of SQL query skills
Dekeyser, Stijn, de Raadt, Michael and Lee, Tien Yu. 2007. "Computer assisted assessment of SQL query skills." Bailey, James and Fekete, Alan (ed.) 18th Australasian Database Conference (ADC 2007). Ballarat, Australia 29 Jan - 02 Feb 2007 Bedford Park, South Australia.
A metadata collection technique for documents in WinFS
Dekeyser, Stijn. 2005. "A metadata collection technique for documents in WinFS." Kay, Judy, Turpin, Andrew and Wilkinson, Ross (ed.) 10th Australasian Document Computing Symposium (ADCS 2005). Sydney, Australia 12 Dec 2005 Sydney, Australia.