SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback

Paper


Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Paper/Presentation Title

SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback

Presentation TypePaper
AuthorsZhang, Ji (Author), Wang, Hua (Author), Tao, Xiaohui (Author) and Sun, Lili (Author)
Journal or Proceedings TitleProceedings of the 29th IEEE International Conference on Data Engineering (ICDE 2013)
ERA Conference ID43307
Number of Pages4
Year2013
Place of PublicationPiscataway, NJ. United States
ISBN9781467349093
9781467349086
Digital Object Identifier (DOI)https://doi.org/10.1109/ICDE.2013.6544945
Web Address (URL) of Paperhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=6544945
Conference/Event29th IEEE International Conference on Data Engineering (ICDE 2013)
International Conference on Data Engineering
Event Details
International Conference on Data Engineering
ICDE
Rank
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
A
Event Details
29th IEEE International Conference on Data Engineering (ICDE 2013)
Event Date
08 to end of 11 Apr 2013
Event Location
Brisbane, Australia
Abstract

Outlier detection is an important long-standing research problem in data mining and has enjoyed applications in a wide range of applications in business, engineering, biology and security, etc. However, the traditional outlier detection methods inevitably need to use different parameters for detection such as those used to specify the distance or density cutoff for distinguish outliers from normal data points. Using the trial and error approach, the traditional outlier detection methods are rather tedious in parameter tuning. In this demo proposal, we introduce an innovative outlier detection system, called SODIT, that uses localized thresholding to assist the value specification of the thresholds that reflect closely the local data distribution. In addition, easy-to-use user feedback are employed to further facilitate the determination of optimal parameter values. SODIT is able to make outlier detection much easier to operate and produce more accurate, intuitive and informative results than before.

Keywordsdata mining; innovative system; interactive feedback; local data distribution; localized thresholding; outlier detection; parameter tuning; value specification
ANZSRC Field of Research 2020469999. Other information and computing sciences not elsewhere classified
460605. Distributed systems and algorithms
490103. Calculus of variations, mathematical aspects of systems theory and control theory
Public Notes

© 2013 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Byline AffiliationsDepartment of Mathematics and Computing
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q24x7/sodit-an-innovative-system-for-outlier-detection-using-multiple-localized-thresholding-and-interactive-feedback

  • 2038
    total views
  • 38
    total downloads
  • 4
    views this month
  • 0
    downloads this month

Export as

Related outputs

Topic Integrated Opinion-Based Drug Recommendation With Transformers
Job, Simi, Tao, Xiaohui, Li, Y., Li, Lin and Yong, Jianming. 2023. "Topic Integrated Opinion-Based Drug Recommendation With Transformers ." IEEE Transactions on Emerging Topics in Computational Intelligence. https://doi.org/10.1109/TETCI.2023.3246559
Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Li, Yuefeng and Acharya, U. Rajendra. 2023. "Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability." Computer Methods and Programs in Biomedicine. 242. https://doi.org/10.1016/j.cmpb.2023.107771
Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Acharya, U. Rajendra and Li, Yuefeng. 2023. "Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment." Brain Informatics. 10 (1). https://doi.org/10.1186/s40708-023-00188-6
Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)
Sheehy, Joshua, Rutledge, Hamish, Acharya, U. Rajendra, Loh, Hui Wen, Gururajan, Raj, Tao, Xiaohui, Zhou, Xujuan, Li, Yuefeng, Gurney, Tiana and Kondalsamy-Chennakesavan, S.. 2023. "Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)." Artificial Intelligence in Medicine. 139. https://doi.org/10.1016/j.artmed.2023.102536
Remote patient monitoring using artificial intelligence: Current state, applications, and challenges
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Li, Li, Gururajan, Raj, Zhou, Xujuan and Acharya, U. Rajendra. 2023. "Remote patient monitoring using artificial intelligence: Current state, applications, and challenges." Wiley Interdisciplinary Reviews: Data Mining and Knowledge Discovery. 13 (2). https://doi.org/10.1002/widm.1485
Trio-based collaborative multi-view graph clustering with multiple constraints
Wang, Ru, Li, Lin, Tao, Xiaohui, Dong, Xiao, Wang, Peipei and Liu, Peiyu. 2021. "Trio-based collaborative multi-view graph clustering with multiple constraints." Information Processing and Management. 58 (3), pp. 1-13. https://doi.org/10.1016/j.ipm.2020.102466
Multimodality Information Fusion for Automated Machine Translation
Li, Lin, Tayir, Turghun, Han, Yifeng, Tao, Xiaohui and Velasquez, Juan D.. 2023. "Multimodality Information Fusion for Automated Machine Translation." Information Fusion. 91, pp. 352-363. https://doi.org/10.1016/j.inffus.2022.10.018
Towards the Quantitative Interpretability Analysis of Citizens Happiness Prediction
Li, Lin, Wu, Xiaohua, Kong, Miao, Zhou, Dong and Tao, Xiaohui. 2022. "Towards the Quantitative Interpretability Analysis of Citizens Happiness Prediction." Raedt, Luc De (ed.) 31st International Joint Conference on Artificial Intelligence (IJCAI-ECAI 2022): Special Track on AI for Good. Vienna, Austria 23 - 29 Jul 2022 Austria.
AI enabled RPM for Mental Health Facility
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Xie, Haoran, Gururajan, Raj and Zhou, Xujuan. 2022. "AI enabled RPM for Mental Health Facility." 1st ACM Workshop on Mobile and Wireless Sensing for Smart Healthcare (WMSSH 2022). Sydney, Australia 21 Oct 2022 New York, United States. https://doi.org/10.1145/3556551.3561191
Identifying informative tweets during a pandemic via a topic‑aware neural language model
Gao, Wang, Li, Lin, Tao, Xiaohui, Zhou, Jing and Tao, Jun. 2023. "Identifying informative tweets during a pandemic via a topic‑aware neural language model." World Wide Web. 26 (1), pp. 55-70. https://doi.org/10.1007/s11280-022-01034-1
Multi-source information fusion for smart health with artificial intelligence
Tao, Xiaohui and Velasquez, Juan D.. 2022. "Multi-source information fusion for smart health with artificial intelligence." Information Fusion. 83-84, pp. 93-95. https://doi.org/10.1016/j.inffus.2022.03.010
A Review of the Trends and Challenges in Adopting Natural Language Processing Methods for Education Feedback Analysis
Shaik, Thanveer, Tao, Xiaohui, Li, Yan, Dann, Christopher, McDonald, Jacquie, Redmond, Petrea and Galligan, Linda. 2022. "A Review of the Trends and Challenges in Adopting Natural Language Processing Methods for Education Feedback Analysis." IEEE Access. 10, pp. 56720-56739. https://doi.org/10.1109/ACCESS.2022.3177752
FedStack: Personalized Activity Monitoring using Stacked Federated Learning
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Gururajan, Raj, Li, Yuefeng, Zhou, Xujuan and Acharya, U Rajendra. 2022. "FedStack: Personalized Activity Monitoring using Stacked Federated Learning." Knowledge-Based Systems. 257, pp. 1-14. https://doi.org/10.1016/j.knosys.2022.109929
Adaptive Fault Resolution for Database Replication Systems
Wee, Chee Keong, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui and Wee, Nathan. 2022. "Adaptive Fault Resolution for Database Replication Systems." Li, Bohan, Yue, Lin, Jiang, Jing, Chen, Weitong, Li, Xue, Long, Guodong, Fang, Fei and Yu, Han (ed.) 17th International Conference on Advanced Data Mining and Applications (ADMA 2021). Sydney, Australia 02 - 04 Feb 2022 Berlin. Springer. https://doi.org/10.1007/978-3-030-95405-5_26
Data Analytics on Online Student Engagement Data for Academic Performance Modeling
Tao, Xiaohui, Shannon-Honson, Aaron, Delaney, Patrick, Li, Lin, Dann, Christopher, Li, Yan and Xie, Haoran. 2022. "Data Analytics on Online Student Engagement Data for Academic Performance Modeling." IEEE Access. 10, pp. 103176-103186. https://doi.org/10.1109/ACCESS.2022.3208953
Deep boundary‑aware clustering by jointly optimizing unsupervised representation learning
Wang, Ru, Li, Lin, Wang, Peipei, Tao, Xiaohui and Liu, Peiyu. 2022. "Deep boundary‑aware clustering by jointly optimizing unsupervised representation learning." Multimedia Tools and Applications. 81 (24), p. 34309–34324. https://doi.org/10.1007/s11042-021-11597-2
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559
Detecting depression using an ensemble classifier based on Quality of Life scales
Tao, Xiaohui, Chi, Oliver, Delaney, Patrick J., Li, Lin and Huang, Jiajin. 2021. "Detecting depression using an ensemble classifier based on Quality of Life scales." Brain Informatics. 8, pp. 1-15. https://doi.org/10.1186/s40708-021-00125-5
EmoChannelAttn: Exploring Emotional Construction Towards Multi-Class Emotion Classification
Li, Zongxi, Chen, Xinhong, Xie, Haoran, Li, Qing and Tao, Xiaohui. 2021. "EmoChannelAttn: Exploring Emotional Construction Towards Multi-Class Emotion Classification." He, Jing, Purohit, Hemant, Huang, Guangyan, Gao, Xiaoying and Deng, Ke (ed.) 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2020). Melbourne, Australia 14 - 17 Dec 2020 Massachusetts, United States. https://doi.org/10.1109/WIIAT50758.2020.00036
Feature-aware unsupervised learning with joint variational attention and automatic clustering
Wang, Ru, Li, Lin, Wang, Peipei, Tao, Xiaohui and Liu, Peiyu. 2021. "Feature-aware unsupervised learning with joint variational attention and automatic clustering." 25th International Conference on Pattern Recognition (ICPR 2020). Milan, Italy 10 - 15 Jan 2021 United States. https://doi.org/10.1109/ICPR48806.2021.9412522
Learning Cooperative Max-Pressure Control by Leveraging Downstream Intersections Information for Traffic Signal Control
Peng, Yuquan, Li, Lin, Xie, Qing and Tao, Xiaohui. 2021. "Learning Cooperative Max-Pressure Control by Leveraging Downstream Intersections Information for Traffic Signal Control." U, Leong Hou, Spaniol, Marc, Sakurai, Yasushi and Chen, Junying (ed.) 5th International Joint Conference on Asia-Pacific Web and Web-Age Information Management, Part II (APWeb-WAIM 2021). Guangzhou, China 23 - 25 Aug 2021 Switzerland. Springer. https://doi.org/10.1007/978-3-030-85899-5_29
Context-aware Adaptive Outlier Detection in Trajectory Data
Danda, Srinivas, Zhang, Ji, Tao, Xiaohui, Chun-Wei, Jerry and Zhang, Wenbin. 2020. "Context-aware Adaptive Outlier Detection in Trajectory Data." Wu, Xintao, Jermaine, Chris, Xiong, Li, Hu, Xiaohua, Kotevska, Olivera, Lu, Siyuan, Xu, Weija, Aluru, Srinivas, Zhai, Chengxiang, Al-Masri, Eyhab, Chen, Zhiyuan and Saltz, Jeff (ed.) 8th IEEE International Conference on Big Data (2020). Atlanta, United States 10 - 13 Dec 2020 United States. https://doi.org/10.1109/BigData50022.2020.9378046
Exploring the Brain Information Processing Mechanisms from Functional Connectivity to Translational Applications
Kuai, Hongzhi, Chen, Jianhui, Tao, Xiaohui, Imamura, Kazuyuki, Liang, Peipeng and Zhong, Ning. 2021. "Exploring the Brain Information Processing Mechanisms from Functional Connectivity to Translational Applications." Mahmud, Mufti, Kaiser, M. Shamim, Vassanelli, Stefano, Dai, Qionghai and Zhong, Ning (ed.) 14th International Conference on Brain Informatics (BI 2021). Online Cham, Switzerland. https://doi.org/10.1007/978-3-030-86993-9_10
What is Next when Sequential Prediction Meets Implicitly Hard Interaction?
Hu, Kaixi, Li, Lin, Xie, Qing, Liu, Jianquan and Tao, Xiaohui. 2021. "What is Next when Sequential Prediction Meets Implicitly Hard Interaction?" 30th ACM International Conference on Information and Knowledge Management (CIKM 2021). Queensland, Australia 01 - 05 Nov 2021 New York, United States. https://doi.org/10.1145/3459637.3482492
Event Detection in Social Media via Graph Neural Network
Gao, Wang, Fang, Yuan, Li, Lin and Tao, Xiaohui. 2021. "Event Detection in Social Media via Graph Neural Network." Zhang, Wenjie, Zou, Lei, Maamar, Zakaria and Chen, Lu (ed.) 22nd International Conference on Web Information Systems Engineering, Part I (WISE 2021). Melbourne, Australia 26 - 29 Oct 2021 Switzerland. Springer. https://doi.org/10.1007/978-3-030-90888-1_28
Contrastive and attentive graph learning for multi-view clustering
Wang, Ru, Li, Lin, Tao, Xiaohui, Wang, Peipei and Liu, Peiyu. 2022. "Contrastive and attentive graph learning for multi-view clustering." Information Processing and Management. 59 (4), pp. 1-14. https://doi.org/10.1016/j.ipm.2022.102967
Web Intelligence meets Brain Informatics: Towards the future of artificial intelligence in the connected world
Kuai, Hongzhi, Tao, Xiaohui and Zhong, Ning. 2022. "Web Intelligence meets Brain Informatics: Towards the future of artificial intelligence in the connected world." World Wide Web. 25, pp. 1223-1241. https://doi.org/10.1007/s11280-022-01030-5
Sentiment Analysis of Chinese E-commerce Reviews Based on BERT
Xie, Song, Cao, Jingjing, Wu, Zhou, Liu, Kai, Tao, Xiaohui and Xie, Haoran. 2021. "Sentiment Analysis of Chinese E-commerce Reviews Based on BERT." 18th IEEE International Conference on Industrial Informatics (INDIN 2020). Warwick, United Kingdom 21 - 23 Jul 2020 Piscataway, United States. https://doi.org/10.1109/INDIN45582.2020.9442190
A Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting
Li, Zhaoyang, Li, Lin, Peng, Yuquan and Tao, Xiaohui. 2020. "A Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting." Alamaniotis, Miltos and Pan, Shimei (ed.) 32nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2020). Baltimore, United States 09 - 11 Nov 2020 Piscataway, United States. https://doi.org/10.1109/ICTAI50040.2020.00063
Machine and cognitive intelligence for human health: systematic review
Chen, Xieling, Cheng, Gary, Wang, Fu Lee, Tao, Xiaohui, Xie, Haoran and Xu, Lingling. 2022. "Machine and cognitive intelligence for human health: systematic review." Brain Informatics. 9 (1), pp. 1-20. https://doi.org/10.1186/s40708-022-00153-9
A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
Li, Lin, Long, Sijie, Bi, Jiaxiu, Wang, Guowei, Zhang, Jiawei and Tao, Xiaohui. 2021. "A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean." Web Intelligence. 19 (4), pp. 329-342. https://doi.org/10.3233/WEB-210476
A novel genetic algorithm based system for the scheduling of medical treatments
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan and Acharya, Udyavara Rajendra. 2022. "A novel genetic algorithm based system for the scheduling of medical treatments." Expert Systems with Applications. 195, pp. 1-12. https://doi.org/10.1016/j.eswa.2021.116464
EmoChannel-SA: exploring emotional dependency towards classification task with self-attention mechanism
Li, Zongxi, Chen, Xinhong, Xie, Haoran, Li, Qing, Tao, Xiaohui and Cheng, Gary. 2021. "EmoChannel-SA: exploring emotional dependency towards classification task with self-attention mechanism." World Wide Web. 24 (6), pp. 2049-2070. https://doi.org/10.1007/s11280-021-00957-5
An Empirical Study of Learning Based Happiness Prediction Approaches
Kong, Miao, Li, Lin, Wu, Renwei and Tao, Xiaohui. 2021. "An Empirical Study of Learning Based Happiness Prediction Approaches." Human-centric Computing and Information Sciences. 1 (1-2), pp. 18-24. https://doi.org/10.2991/hcis.k.210622.001
Semantic Knowledge Discovery for User Profiling for Location-Based Recommender Systems
Tao, Xiaohui, Sharma, Nischal, Delaney, Patrick and Hu, Aimin. 2021. "Semantic Knowledge Discovery for User Profiling for Location-Based Recommender Systems." Human-centric Computing and Information Sciences. 1 (1-2), pp. 32-42. https://doi.org/10.2991/hcis.k.210704.001
An efficient storage system towards high throughput of concurrent graph processing jobs
Zhao, Jin, Jiang, Xinyu, Zhang, Yu, Zhu, Xiaofei, Jin, Hai, Liu, Haikun, Yang, Yun, Zhang, Ji, Wang, Biao and Yu, Ting. 2022. "An efficient storage system towards high throughput of concurrent graph processing jobs." Scientia Sinica Informationis. 52 (1), pp. 111-128.
Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network
Pang, Yan, Shan, Ai, Wang, Zhen, Wang, Mengyu, Lin, Jianwei, Zhang, Ji, Huang, Teng and Liu, Chao. 2022. "Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network." International Journal of Intelligent Systems. 37 (11), pp. 8770-8789. https://doi.org/10.1002/int.22967
Message from the Program Chair
Zhang, Ji. 2022. "Message from the Program Chair." 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE). Brisbane, Australia 23 - 25 Sep 2022 Brisbane, Australia. IEEE. https://doi.org/10.1109/ICCSIE56462.2022.00006
Detecting relational states in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan, Zhu, Xiaodong, Li, Hongzhou and Chang, Liang. 2018. "Detecting relational states in online social networks." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697237
On link stability detection for online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Lin, Jerry Chun-Wei, Li, Hongzhou and Chang, Liang. 2018. "On link stability detection for online social networks." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-319-98809-2_20
Learning relational fractals for deep knowledge graph embedding in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Wang, Dianwei, Ying, Josh Jia-Ching and Wang, Xin. 2019. "Learning relational fractals for deep knowledge graph embedding in online social networks." Cheng, Reynold, mamoulis, Nikos, Sun, Yizhou and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. Springer. https://doi.org/10.1007/978-3-030-34223-4_42
Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions
Munawar, Hafiz Suliman, Zhang, Ji, Li, Hongzhou, Mo, Deqing and Chang, Liang. 2019. "Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions." Leong, Hou U. and Lauw, Hady W. (ed.) 8th Workshop on Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM 2019), held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2019). Macau, China 14 - 17 Apr 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-26142-9_17
A metaheuristic algorithm for hiding sensitive itemsets
Lin, Jerry Chun-Wei, Zhang, Yuyu, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "A metaheuristic algorithm for hiding sensitive itemsets." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_45
Twitter analysis for depression on social networks based on sentiment and stress
Tao, Xiaohui, Dharmalingam, Ravi, Zhang, Ji, Zhou, Xujuan, Li, Lin and Gururajan, Raj. 2019. "Twitter analysis for depression on social networks based on sentiment and stress." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963550
Personalised drug prescription for dental clinics using word embedding
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Oh, Xue Ling and Goh, Elizabeth Zhixin. 2020. "Personalised drug prescription for dental clinics using word embedding." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_5
MeKG: building a medical knowledge graph by data mining from MEDLINE
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhou, Xujuan and Gururajan, Raj. 2019. "MeKG: building a medical knowledge graph by data mining from MEDLINE." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_16
A Case Study of Predicting Banking Customers Behaviour by Using Data Mining
Zhou, Xujuan, Bargshady, Ghazal, Abdar, Moloud, Tao, Xiaohui, Gururajan, Raj and Chan, K. C.. 2019. "A Case Study of Predicting Banking Customers Behaviour by Using Data Mining." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963436
An efficient and secure itinerary-based data aggregation algorithm for WSNs
Wang, Taochun, Zhang, Ji, Luo, Yonglong, Zuo, Kaizhong and Ding, Xintao. 2017. "An efficient and secure itinerary-based data aggregation algorithm for WSNs." 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). Sydney, Australia 01 - 04 Aug 2017 United States. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268
A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Lin, Jerry Chun-Wei, Chen, Fulong, Luo, Yonglong and Zheng, Xiaoyao. 2018. "A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_15
A genetic algorithm based technique for outlier detection with fast convergence
Zhu, Xiaodong, Zhang, Ji, Hu, Zewen, Li, Hongzhou, Chang, Liang, Zhu, Youwen, Lin, Jerry Chun-Wei and Qin, Yongrui. 2018. "A genetic algorithm based technique for outlier detection with fast convergence." Gan, Guojun, Li, Bohan, Li, Xue and Wang, Shuliang (ed.) 14th International Conference on Advanced Data Mining and Applications (ADMA 2018). Nanjing, China 16 - 18 Nov 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-030-05090-0_8
Mining heterogeneous information graph for health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Cai, Yi. 2018. "Mining heterogeneous information graph for health status classification." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697292
Exploring the use of a network model in drug prescription support for dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Qin, Yongrui, Goh, Elizabeth Zhixin and Hu, Aimin. 2018. "Exploring the use of a network model in drug prescription support for dental clinics." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Piscataway, NJ, United States. https://doi.org/10.1109/BESC.2018.00042
Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure
Mahalle, Abhishek, Yong, Jianming, Tao, Xiaohui and Shen, Jun. 2018. "Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465318
Hierarchical neural topic modeling with manifold regularization
Chen, Ziye, Ding, Cheng, Rao, Yanghui, Xie, Haoran, Tao, Xiaohui, Cheng, Gary and Wang, Fu Lee. 2021. "Hierarchical neural topic modeling with manifold regularization." World Wide Web. 24 (6), pp. 2139-2160. https://doi.org/10.1007/s11280-021-00963-7
Graph-based multi-label disease prediction model learning from medical data and domain knowledge
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Li, Yuefeng and Xie, Haoran. 2022. "Graph-based multi-label disease prediction model learning from medical data and domain knowledge." Knowledge-Based Systems. 235, pp. 1-15. https://doi.org/10.1016/j.knosys.2021.107662
Mobile-based learning of drug prescription for medical education using artificial intelligence techniques
Tao, Xiaohui, Goh, Wee Pheng, Zhang, Ji, Yong, Jianming, Goh, Elizabeth Zhixin and Oh, Xueling. 2021. "Mobile-based learning of drug prescription for medical education using artificial intelligence techniques." International Journal of Mobile Learning and Organisation. 15 (4), pp. 392-408. https://doi.org/10.1504/IJMLO.2021.118436
IT investment governance and corporate governance: perspective and approach
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "IT investment governance and corporate governance: perspective and approach." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 Piscataway, NJ, United States. https://doi.org/10.1109/BESC51023.2020.9348312
Using Machine Learning to Automate Mammogram Images Analysis
Tang, Xuejiao, Zhang, Liuhua, Zhang, Wenbin, Huang, Xin, Iosifidis, Vasileios, Liu, Zhen, Zhang, Mingli, Messina, Enza and Zhang, Ji. 2021. "Using Machine Learning to Automate Mammogram Images Analysis." Park, Taesung, Cho, Young-Rae, Hu, Xiaohua, Yoo, Illhoi, Woo, Hyun Goo, Wang, Jianxin, Facelli, Julio and Nam, Seungyoon (ed.) 2020 International Conference on Bioinformatics and Biomedicine (BIBM'20). Seoul, South Korea 16 - 19 Dec 2020 Piscataway, United States. https://doi.org/10.1109/BIBM49941.2020.9313247
Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437798
Regulatory challenges and mitigation for account services offered by FinTech
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Regulatory challenges and mitigation for account services offered by FinTech." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437631
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010
Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9
Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks
Ghimire, Sujan, Yaseen, Zaher Mundher, Farooque, Aitazaz A., Deo, Ravinesh C., Zhang, Ji and Tao, Xiaohui. 2021. "Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks." Scientific Reports. 11, pp. 1-26. https://doi.org/10.1038/s41598-021-96751-4
Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities
Tao, Xiaohui, Shaik, Thanveer Basha, Higgins, Niall, Gururajan, Raj and Zhou, Xujuan. 2021. "Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities." Sensors. 21 (3), pp. 1-20. https://doi.org/10.3390/s21030776
Charge prediction modeling with interpretation enhancement driven by double-layer criminal system
Li, Lin, Zhao, Lingyun, Nai, Peiran and Tao, Xiaohui. 2022. "Charge prediction modeling with interpretation enhancement driven by double-layer criminal system." World Wide Web. 25 (1), pp. 381-400. https://doi.org/10.1007/s11280-021-00873-8
BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9
A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065
Using back-and-forth translation to create artificial augmented textual data for sentiment analysis models
Body, Thomas, Tao, Xiaohui, Li, Yuefeng, Li, Lin and Zhong, Ning. 2021. "Using back-and-forth translation to create artificial augmented textual data for sentiment analysis models." Expert Systems with Applications. 178, pp. 1-12. https://doi.org/10.1016/j.eswa.2021.115033
Extending Graph Pattern Matching with Regular Expressions
Wang, Xin, Wang, Yang, Xu, Yang, Zhang, Ji and Zhong, Xueyan. 2020. "Extending Graph Pattern Matching with Regular Expressions." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59051-2_8
Bounded Pattern Matching Using Views
Wang, Xin, Wang, Yang, Zhang, Ji and Zhu, Yan. 2020. "Bounded Pattern Matching Using Views." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59003-1_19
Predicting Workplace Injuries Using Machine Learning Algorithms
Sukumar, Divya, Zhang, Ji, Tao, Xiaohui, Wang, Xin and Zhang, Wenbin. 2020. "Predicting Workplace Injuries Using Machine Learning Algorithms." Webb, Geoff, Zhang, Zhongfei, Tseng, Vincent S., Williams, Graham, Vlachos, Michalis and Cao, Longbing (ed.) 7th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2020). Sydney, Australia 06 - 09 Oct 2020 Piscataway, United States. https://doi.org/10.1109/DSAA49011.2020.00104
Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams
Zhang, Wenbin, Zhang, Mingli, Zhang, Ji, Liu, Zhen, Chen, Zhiyuan, Wang, Jianwu, Raff, Edward and Messina, Enza. 2020. "Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams." Alamaniotis, Miltos and Pan, Shimei (ed.) 32nd International Conference on Tools with Artificial Intelligence (ICTAI'20). Baltimore, United States 09 - 11 Nov 2020 Piscataway, United States. https://doi.org/10.1109/ICTAI50040.2020.00069
Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science
Jahmunah, Vicnesh, Sudarshan, Vidya K., Oh, Shu Lih, Gururajan, Raj, Gururajan, Rashmi, Zhou, Xujuan, Tao, Xiaohui, Faust, Oliver, Ciaccio, Edward J., Ng, Kwan Hoong and Acharya, U. Rajendra. 2021. "Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science." International Journal of Imaging Systems and Technology. 31 (2), pp. 455-471. https://doi.org/10.1002/ima.22552
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738
Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8
Proof Learning in PVS with Utility Pattern Mining
Nawaz, M. Saqib, Fournier-Viger, Philippe and Zhang, Ji. 2020. "Proof Learning in PVS with Utility Pattern Mining." IEEE Access. 8, pp. 119806-119818. https://doi.org/10.1109/ACCESS.2020.3004199
Deep interest shifting network with meta embeddings for fresh item recommendation
Li, Zhao, Wang, Haobo, Ding, Donghui, Hu, Shichang, Zhang, Zhen, Liu, Weiwei, Gao, Jianliang, Zhang, Zhiqiang and Zhang, Ji. 2020. "Deep interest shifting network with meta embeddings for fresh item recommendation." Complexity. https://doi.org/10.1155/2020/8828087
Global research on artificial intelligence-enhanced human electroencephalogram analysis
Chen, Xieling, Tao, Xiaohui, Wang, Fu Lee and Xie, Haoran. 2022. "Global research on artificial intelligence-enhanced human electroencephalogram analysis." Neural Computing and Applications. 34 (14), pp. 11295-11333. https://doi.org/10.1007/s00521-020-05588-x
A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection
Zhou, Xujuan, Li, Yuefeng, Gururajan, Raj, Bargshady, Ghazal, Tao, Xiaohui, Venkataraman, Revathi, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 United Kingdom. https://doi.org/10.1109/BESC51023.2020.9348322
A Densely Connected Encoder Stack Approach for Multi-type Legal Machine Reading Comprehension
Nai, Peiran, Li, Lin and Tao, Xiaohui. 2020. "A Densely Connected Encoder Stack Approach for Multi-type Legal Machine Reading Comprehension." Huang, Zhisheng, Beek, Wouter, Wang, Hua, Zhou, Rui and Zhang, Yanchun (ed.) 21st International Conference on Web Information Systems Engineering (WISE 2020). Amsterdam, The Netherlands 20 - 24 Oct 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-62008-0_12
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018
Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004
Information Retrieval Technology: 15th Asia Information Retrieval Societies Conference, AIRS 2019, Hong Kong, November 7-9, 2019, Proceedings
Wang, Fu Lee, Xie, Haoran, Lam, Wai, Sun, Aixin, Ku, Lun-Wei, Hao, Tianyong, Chen, Wei, Wong, Tak-Lam and Tao, Xiaohui. 2020. Information Retrieval Technology: 15th Asia Information Retrieval Societies Conference, AIRS 2019, Hong Kong, November 7-9, 2019, Proceedings. Switzerland. Springer.
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
A preliminary study for the risk of probabilistic blockchain protocols
Sello, Buti, Tao, Xiaohui and Yong, Jianming. 2019. "A preliminary study for the risk of probabilistic blockchain protocols." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963205
An efficient chain structure to mine high-utility sequential patterns
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2019. "An efficient chain structure to mine high-utility sequential patterns." 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019). Beijing, China 08 - 11 Nov 2019 https://doi.org/10.1109/ICDMW.2019.00146
Anesthesia assessment based on ICA permutation entropy analysis of two-channel EEG signals
Li, Tianning, Sivakumar, Prashanth and Tao, Xiaohui. 2019. "Anesthesia assessment based on ICA permutation entropy analysis of two-channel EEG signals." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_24
Identification of stress impact on personality density distributions
Lys, Brendan, Tao, Xiaohui, Machin, Tony, Zhang, Ji and Zhong, Ning. 2019. "Identification of stress impact on personality density distributions." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_26
Protecting privacy in digital era on cloud architecture for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Protecting privacy in digital era on cloud architecture for banking and financial services industry." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963459
Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791928
Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791906
SLIND: identifying stable links in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Zheng, Xiaoyao, Luo, Yonglong and Lin, Jerry Chun-Wei. 2018. "SLIND: identifying stable links in online social networks." Pei, Jian, Sadiq, Shazia, Manolopoulos, Yannis and Li, Jianxin (ed.) 23rd International Conference on Database Systems for Advanced Applications (DASFAA 2018). Gold Coast, Australia 21 - 24 May 2018 Switzerland. https://doi.org/10.1007/978-3-319-91458-9_54
Anonymization of multiple and personalized sensitive attributes
Lin, Jerry Chun-Wei, Liu, Qiankun, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "Anonymization of multiple and personalized sensitive attributes." Ordonez, Carlos and Bellatreche, Ladjel (ed.) 20th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. https://doi.org/10.1007/978-3-319-98539-8_16
ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2018. "ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.8697294
Welcome message BESC 2018
Wang, Leon S. L., Hong, Tzung-Pei, Xu, Guandong, Ting, I-Hsien and Tao, Xiaohui. 2018. "Welcome message BESC 2018." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.8697887
The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)
Zhou, Xiangmin, Zhang, Ji and Zhang, Yanchun. 2019. "The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)." 12th ACM International Conference on Web Search and Data Mining (WSDM 2019). Melbourne, Australia 11 - 15 Feb 2019 New York, United States. https://doi.org/10.1145/3289600.3291372
PPSF: an open-source privacy-preserving and security mining framework
Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Wu, Lintai, Gan, Wensheng, Djenouri, Youcef and Zhang, Ji. 2018. "PPSF: an open-source privacy-preserving and security mining framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 18th IEEE International Conference on Data Mining Workshops (ICDMW 2018). Singapore 17 - 20 Nov 2018 New York, United States. https://doi.org/10.1109/ICDMW.2018.00208
Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication
Vimalachandran, Pasupathy, Zhang, Yanchun, Cao, Jinli, Sun, Lili and Yong, Jianming. 2018. "Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication." 19th International Conference on Web Information Systems Engineering (WISE 2018). Dubai, United Arab Emirates 12 - 15 Nov 2018 Germany. Springer. https://doi.org/10.1007/978-3-030-02925-8_8
A survey on text classification and its applications
Zhou, Xujuan, Gururajan, Raj, Li, Yuefeng, Venkataraman, Revathi, Tao, Xiaohui, Bargshady, Ghazala, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A survey on text classification and its applications." Web Intelligence. 18 (2), pp. 205-216. https://doi.org/10.3233/WEB-200442
Automated prediction of sepsis using temporal convolutional network
Kok, Christopher, Jahmunah, V., Oh, Shu Lih, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Cheong, Kang Hao, Gururajan, Rashmi, Molinari, Filippo and Acharya, U. Rajendra. 2020. "Automated prediction of sepsis using temporal convolutional network." Computers in Biology and Medicine. 127, pp. 1-10. https://doi.org/10.1016/j.compbiomed.2020.103957
A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104
A bibliometric and visual analysis of artificial intelligence technologies-enhanced brain MRI research
Chen, Xieling, Zhang, Xinxin, Xie, Haoran, Tao, Xiaohui, Wang, Fu Lee, Xie, Nengfu and Hao, Tianyong. 2021. "A bibliometric and visual analysis of artificial intelligence technologies-enhanced brain MRI research." Multimedia Tools and Applications. 80, pp. 17335-17363. https://doi.org/10.1007/s11042-020-09062-7
Feature-Based Learning in Drug Prescription System for Medical Clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Feature-Based Learning in Drug Prescription System for Medical Clinics." Neural Processing Letters. 52, pp. 1703-1721. https://doi.org/10.1007/s11063-020-10296-7
Multisource multimedia data understanding: special theme issue of Multimedia Tools and Applications, Vol. 78, No. 33221
Zhang, Shichao, Wang, Ruili, Tao, Xiaohui and Zhu, Yingying. 2019. Multisource multimedia data understanding: special theme issue of Multimedia Tools and Applications, Vol. 78, No. 33221. New York, United States. Springer.
A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Diykh, Mohammed and Lin, Jerry Chun-Wei. 2018. "A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment." Roy, Sanjiban Sekhar, Samui, Pijushi, Deo, Ravinesh and Ntalampiras, Stalampiras (ed.) Big data in engineering applications. Singapore. Springer. pp. 363-384
Enhanced sequence labeling based on latent variable conditional random fields
Lin, Jerry Chun-Wei, Shao, Yinan, Zhang, Ji and Yun, Unil. 2020. "Enhanced sequence labeling based on latent variable conditional random fields." Neurocomputing. 403, pp. 431-440. https://doi.org/10.1016/j.neucom.2020.04.102
SLIND+: stable LINk detection
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Li, Hongzhou, Chen, Fulong and Luo, Yonglong. 2020. "SLIND+: stable LINk detection." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_8
Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109
A novel differential privacy recommendation method based on distributed framework
Zheng, Xiaoyao, Luo, Yonglong, Zhang, Ji, Sun, Liping and Chen, Fulong. 2018. "A novel differential privacy recommendation method based on distributed framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 2018 Workshop on Scalable and Applicable Recommendation Systems (SAREC 2018), in conjunction with the 18th IEEE International Conference on Data Mining (ICDM 2018). Singapore 17 - 20 Nov 2018 Los Alamitos, California. https://doi.org/10.1109/ICDMW.2018.00189
Mining health knowledge graph for health risk prediction
Tao, Xiaohui, Pham, Thuan, Zhang, Ji, Yong, Jianming, Goh, Wee Pheng, Zhang, Wenping and Cai, Yi. 2020. "Mining health knowledge graph for health risk prediction." World Wide Web. 23 (4), pp. 2341-2362. https://doi.org/10.1007/s11280-020-00810-1
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007
Computational Social Science as the ultimate Web Intelligence
Tao, Xiaohui, Velasquez-Silva, Juan Domingo, Liu, Jiming and Zhong, Ning. 2020. "Computational Social Science as the ultimate Web Intelligence." World Wide Web. 23 (3), pp. 1743-1745. https://doi.org/10.1007/s11280-020-00801-2
Constructing a knowledge-based heterogeneous information graph for medical health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Constructing a knowledge-based heterogeneous information graph for medical health status classification." Health Information Science and Systems. 8 (1). https://doi.org/10.1007/s13755-020-0100-6
Relational intelligence recognition in online social networks - a survey
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan and Chen, Bing. 2020. "Relational intelligence recognition in online social networks - a survey." Computer Science Review. 35. https://doi.org/10.1016/j.cosrev.2019.100221
A general extensible learning approach for multi-disease recommendations in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Zhu, Xiaodong, Li, Hongzhou, Chang, Liang and Deo, Ravinesh. 2020. "A general extensible learning approach for multi-disease recommendations in a telehealth environment ." Pattern Recognition Letters. 132, pp. 106-114. https://doi.org/10.1016/j.patrec.2018.11.006
A hybrid representation based simile component extraction
Ren, Da, Zhang, Pengfei, Li, Qing, Tao, Xiaohui, Chen, Junying and Cai, Yi. 2020. "A hybrid representation based simile component extraction." Neural Computing and Applications. 32 (18), pp. 14655-14665. https://doi.org/10.1007/s00521-020-04818-6
Efficient chain structure for high-utility sequential pattern mining
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2020. "Efficient chain structure for high-utility sequential pattern mining." IEEE Access. 8, pp. 40714-40722. https://doi.org/10.1109/ACCESS.2020.2976662
FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection
Zhu, Xiaodong, Zhang, Ji, Li, Hongzhou, Fournier-Viger, Philippe, Lin, Jerry Chun-Wei and Chang, Liang. 2017. "FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection." IEEE Access. 5, pp. 25682-25695. https://doi.org/10.1109/ACCESS.2017.2771237
Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04
Affective and sentimental computing
Xie, Haoran, Wong, Tak‑Lam, Wang, Fu Lee, Wong, Raymond, Tao, Xiaohui and Wang, Ran. 2019. "Affective and sentimental computing." International Journal of Machine Learning and Cybernetics. 10 (8), pp. 2043-2044. https://doi.org/10.1007/s13042-019-00977-8
Mining of high average-utility patterns with item-level thresholds
Lin, Jerry Chun-Wei, Li, Ting, Fournier-Viger, Philippe, Zhang, Ji and Guo, Xiangmin. 2019. "Mining of high average-utility patterns with item-level thresholds." Journal of Internet Technology. 20 (1), pp. 187-194. https://doi.org/10.3966/160792642019012001017
High average-utility sequential pattern mining based on uncertain databases
Lin, Jerry Chun-Wei, Li, Ting, Pirouz, Matin, Zhang, Ji and Fournier-Viger, Philippe. 2020. "High average-utility sequential pattern mining based on uncertain databases." Knowledge and Information Systems. 62 (3), pp. 1199-1228. https://doi.org/10.1007/s10115-019-01385-8
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
Li, Xingxin, Zhu, Youwen, Wang, Jian and Zhang, Ji. 2019. "Efficient and secure multi-dimensional geometric range query over encrypted data in cloud." Journal of Parallel and Distributed Computing. 131, pp. 44-54. https://doi.org/10.1016/j.jpdc.2019.04.015
A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.
Knowledge graph embedding by dynamic translation
Chang, Liang, Zhu, Manli, Gu, Tianlong, Bin, Chenzhong, Qian, Junyan and Zhang, Ji. 2017. "Knowledge graph embedding by dynamic translation." IEEE Access. 5 (3), pp. 20898-20907. https://doi.org/10.1109/ACCESS.2017.2759139
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490
Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.
A two-phase approach to mine short-periodic high utility itemsets in transactional databases
Lin, Jerry Chun-Wei, Zhang, Jiexiong, Fournier-Viger, Philippe, Hong, Tzung-Pei and Zhang, Ji. 2017. "A two-phase approach to mine short-periodic high utility itemsets in transactional databases." Advanced Engineering Informatics: the science of supporting knowledge-intensive activities. 33, pp. 29-43. https://doi.org/10.1016/j.aei.2017.04.007
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902
A novel social network hybrid recommender system based on hypergraph topologic structure
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Ding, Xintao and Zhang, Ji. 2018. "A novel social network hybrid recommender system based on hypergraph topologic structure." World Wide Web. 21 (4), pp. 985-1013. https://doi.org/10.1007/s11280-017-0494-5
Exploiting highly qualified pattern with frequency and weight occupancy
Gan, Wensheng, Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Chao, Han-Chieh, Zhan, Justin and Zhang, Ji. 2018. "Exploiting highly qualified pattern with frequency and weight occupancy." Knowledge and Information Systems. 56 (1), pp. 165-196. https://doi.org/10.1007/s10115-017-1103-8
An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control
Chen, Fulong, Luo, Yonglong, Zhang, Ji, Zhu, Junru, Zhang, Ziyang, Zhao, Chuanxin and Wang, Taochun. 2018. "An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control." World Wide Web. 21 (1), pp. 33-57. https://doi.org/10.1007/s11280-017-0455-z
A tourism destination recommender system using users' sentiment and temporal dynamics
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Zhang, Ji and Chen, Fulong. 2018. "A tourism destination recommender system using users' sentiment and temporal dynamics." Journal of Intelligent Information Systems. 51 (3), pp. 557-578. https://doi.org/10.1007/s10844-018-0496-5
A new nested ensemble technique for automated diagnosis of breast cancer
Abdar, Moloud, Zomorodi-Moghadam, Mariam, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Barua, Prabal D. and Gururajan, Rashmi. 2020. "A new nested ensemble technique for automated diagnosis of breast cancer." Pattern Recognition Letters. https://doi.org/10.1016/j.patrec.2018.11.004
On relational learning and discovery in social networks: a survey
Zhang, Ji, Tan, Leonard and Tao, Xiaohui. 2018. "On relational learning and discovery in social networks: a survey." International Journal of Machine Learning and Cybernetics. 10 (8), pp. 2085-2102. https://doi.org/10.1007/s13042-018-0823-8
Drug prescription support in dental clinics through drug corpus mining
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Xie, Haoran. 2018. "Drug prescription support in dental clinics through drug corpus mining." International Journal of Data Science and Analytics. 6 (4), pp. 341-349. https://doi.org/10.1007/s41060-018-0149-3
Mining drug properties for decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2017. "Mining drug properties for decision support in dental clinics." Kim, J., Shim, K., Cao, L., Lee, J., Lin, X. and Moon, Y. (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Germany. Springer. https://doi.org/10.1007/978-3-319-57529-2_30
Preface - Proceedings of the 2017 IEEE/WIC/ACM international conference on web intelligence
Alt, Rainer, Tao, Xiaohui and Unland, Rainer. 2017. "Preface - Proceedings of the 2017 IEEE/WIC/ACM international conference on web intelligence." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States.
Coupling topic modelling in opinion mining for social media analysis
Zhou, Xujuan, Tao, Xiaohui, Rahman, Md Mostafijur and Zhang, Ji. 2017. "Coupling topic modelling in opinion mining for social media analysis." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3106459
A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Abbas, Wessam, Luo, Yonglong, Chen, Fulong and Tseng, Vincent S.. 2017. "A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset." Kim, Jinho, Shim, Kyuseok, Cao, Longbing, Lee, Jae-Gil, Lin, Xuemin and Moon, Yang-Sae (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Switzerland. Springer. https://doi.org/10.1007/978-3-319-57454-7_51
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
Zhang, Ji, Lafta, Raid, Tao, Xiaohui, Li, Yan, Chen, Fulong, Luo, Yonglong and Zhu, Xiaodong. 2017. "Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment." IEEE Access. 5 (1), pp. 10674-10685. https://doi.org/10.1109/ACCESS.2017.2706318
Detecting global outliers from large distributed databases
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "Detecting global outliers from large distributed databases." Liu, Yanbing, Yue, Shigang, Leung, Frank H. F., Zhao, Guofeng and Wang, Lipo (ed.) 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012). Chongqing, China 29 - 31 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2012.6233948
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
Special issue on knowledge management of web social media
Tao, Xiaohui, Huang, Wei, Mu, Xiangming and Xie, Haoran. 2016. "Special issue on knowledge management of web social media ." Web Intelligence. 14 (4), pp. 273-274. https://doi.org/10.3233/WEB-160343
Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization
Qi, Xuemei, Wang, Hongtao, Zhu, Haihong, Zhang, Ji, Chen, Fulong and Yang, Jie. 2016. "Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization." International Journal of Production Research. 54 (16), pp. 4957-4972. https://doi.org/10.1080/00207543.2016.1150615
GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques
Li, Hongzhou, Zhang, Ji, Luo, Yonglong, Chen, Fulong and Chang, Liang. 2016. "GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques." Ray, T., Sarker, R. and Li, X. (ed.) 2nd Australasian Conference on Artificial Life and Computational Intelligence (ACALCI 2016). Canberra, Australia 02 - 05 Feb 2016 Switzerland. Springer. https://doi.org/10.1007/978-3-319-28270-1_11
A survey of itemset mining
Fournier-Viger, Philippe, Lin, Jerry Chun-Wei, Vo, Bay, Chi, Tin Truong, Zhang, Ji and Le, Hoai Bac. 2017. "A survey of itemset mining." WIREs Data Mining and Knowledge Discovery. 7 (4). https://doi.org/10.1002/widm.1207
Settlement analyses of underground circular tunneling in soft clay
Shiau, J. S., Sams, M. S., Zhang, J. and Kemp, R. J.. 2014. "Settlement analyses of underground circular tunneling in soft clay." Yoo, Chungsik, Park, Seong-Wan, Kim, Bumjoo and Ban, Hoki (ed.) 8th International Symposium on Geotechnical Aspects of Underground Construction in Soft Ground (TC204 ISSMGE IS-SEOUL 2014). Seoul, Korea 25 - 27 Aug 2014 Netherlands. https://doi.org/10.1201/b17240-63
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Automatic Text Summarization Using Fuzzy Inference
Jafari, Mehdi, Shahabi, Amir Shahab, Wang, Jing, Qin, Yongrui, Tao, Xiaohui and Gheisari, Mehdi. 2016. "Automatic Text Summarization Using Fuzzy Inference." 22nd IEEE International Conference on Automation and Computing (ICAC 2016). Colchester, United Kingdom 07 - 08 Sep 2016 United States. https://doi.org/10.1109/IConAC.2016.7604928
IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2016. "IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_58
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection
Ying, Josh Jia-Ching, Zhang, Ji, Huang, Che-Wei, Chen, Kuan-Ta and Tseng, Vincent S.. 2016. "PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection." 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016). Wuhan, China 13 - 16 Dec 2016 United States. https://doi.org/10.1109/ICPADS.2016.0140
NSSSD: a new semantic hierarchical storage for sensor data
Gheisari, Mehdi, Movassagh, Ali Akbar, Qin, Yongrui, Yong, Jianming, Tao, Xiaohui, Zhang, Ji and Shen, Haifeng. 2016. "NSSSD: a new semantic hierarchical storage for sensor data." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7565984
Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification
Al-kharaz, Ali A., Tao, Xiaohui, Zhang, Ji and Lafta, Raid. 2016. "Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_15
Sentiment analysis for depression detection on social networks
Tao, Xiaohui, Zhou, Xujuan, Zhang, Ji and Yong, Jianming. 2016. "Sentiment analysis for depression detection on social networks." Li, Jinyan, Li, Xue, Wang, Xue, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_59
Anonymity-based privacy preserving network data publication
Liu, Peng, Li, Yidong, Sang, Yingpeng and Zhang, Ji. 2016. "Anonymity-based privacy preserving network data publication." 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016). Tianjin, China 23 - 26 Aug 2016 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2016.0144
Multi-level big data content services for mental health care
Chen, Jianhui, Han, Jian, Deng, Yue, Zhong, Han, Wang, Ningning, Li, Youjun, Wan, Zhijiang, Kotake, Taihei, Wang, Dongsheng, Tao, Xiaohui and Zhong, Ning. 2016. "Multi-level big data content services for mental health care." Zhong, Ning, Ma, Jianhua, Liu, Jiming, Huang, Runhe and Tao, Xiaohui (ed.) Wisdom web of things, Part II. Switzerland. Springer. pp. 155-180
Wisdom web of things
Zhong, Ning, Ma, Jianhua, Liu, Jiming, Huang, Runhe and Tao, Xiaohui. 2016. Wisdom web of things. Switzerland. Springer.
Factors to be considered in Cloud computing adoption
Ali, Omar, Soar, Jeffrey, Yong, Jianming and Tao, Xiaohui. 2016. "Factors to be considered in Cloud computing adoption." Web Intelligence. 14 (4), pp. 309-323. https://doi.org/10.3233/WEB-160347
An intelligent recommender system based on predictive analysis in telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Tseng, Vincent S., Luo, Yonglong and Chen, Fulong. 2016. "An intelligent recommender system based on predictive analysis in telehealthcare environment." Web Intelligence. 14 (4), pp. 325-336. https://doi.org/10.3233/WEB-160348
Information fusion with subject-based information gathering method for intelligent multi-agent models
Tao, Xiaohui, King, John and Li, Yuefeng. 2005. "Information fusion with subject-based information gathering method for intelligent multi-agent models." 7th International Conference on Information Integration and Web-based Applications and Services (iiWAS 2005). Kuala Lumpur, Malaysia 19 - 21 Sep 2005
Associate a user's goal: exhaustivity and specificity information retrieval using ontology
Tao, Xiaohui. 2006. "Associate a user's goal: exhaustivity and specificity information retrieval using ontology." Li, Yuefeng, Looi, Mark and Zhong, Ning (ed.) 2006 Conference on Advances in Intelligent IT: Active Media Technology. Brisbane, Australia 07 - 09 Jun 2006 Amsterdam, Netherlands.
Ontology mining for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2007. "Ontology mining for personalized web information gathering." Lin, T. Y. and Haas, Laura (ed.) 2007 IEEE/WIC/ACM International Conference on Web Intelligence. Fremont, United States of America 02 - 05 Nov 2007 Los Alamitos, CA. United States. https://doi.org/10.1109/WI.2007.88
Mining specific and general features in both positive and negative relevance feedback
Li, Yuefeng, Tao, Xiaohui, Algarni, Abdulmohsen and Wu, Sheng-Tang. 2009. "Mining specific and general features in both positive and negative relevance feedback." Voorhees, Ellen M. and Buckland, Lori P. (ed.) TREC 2009: 18th Text REtrieval Conference. Gaithersburg, United States 17 - 20 Nov 2009 Gaithersburg, MD. United States.
An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2015. "An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients." 4th International Workshop on Web Personalization, Recommender Systems and Social Media (WPRSM2015), Joint with WI-IAT 2015. Singapore 06 - 09 Dec 2015 Singapore. https://doi.org/10.1109/WI-IAT.2015.47
A study of drug interaction for personalised decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2015. "A study of drug interaction for personalised decision support in dental clinics." 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2015). Singapore 06 - 09 Dec 2015 https://doi.org/10.1109/WI-IAT.2015.28
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Decision support systems for adoption in dental clinics: a survey
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2016. "Decision support systems for adoption in dental clinics: a survey." Knowledge-Based Systems. 104, pp. 195-206. https://doi.org/10.1016/j.knosys.2016.04.022
Automatic construction of domain-specific sentiment lexicon for context sensitive opinion retrieval
Lau, Raymond Y. K., Zhang, Wenping and Tao, Xiaohui. 2012. "Automatic construction of domain-specific sentiment lexicon for context sensitive opinion retrieval." Zhou, Yanqun (ed.) 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011). Chengdu, China 10 - 12 Jun 2011 Singapore. https://doi.org/10.7763/IPCSIT
A standardized design methodology for complex digital logic components of cyber-physical systems
Chen, F., Ye, H., Yang, J., Huang, Y., Zhang, J., Qi, X., Zhao, C., Zhu, J. and Zhou, W.. 2015. "A standardized design methodology for complex digital logic components of cyber-physical systems." Microprocessors and Microsystems. 39 (8), pp. 1245-1254. https://doi.org/10.1016/j.micpro.2015.08.012
Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications
Sun, Liping, Luo, Yonglong, Ding, Xintao and Zhang, Ji. 2014. "A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications." Computational Intelligence and Neuroscience. 2014. https://doi.org/10.1155/2014/160730
A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425
Detecting anomalies from big network traffic data using an adaptive detection approach
Zhang, Ji, Li, Hongzhou, Gao, Qigang, Wang, Hai and Luo, Yonglong. 2015. "Detecting anomalies from big network traffic data using an adaptive detection approach." Information Sciences. 318, pp. 91-110. https://doi.org/10.1016/j.ins.2014.07.044
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
A knowledge retrieval model using ontology mining and user profiling
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2008. "A knowledge retrieval model using ontology mining and user profiling." Integrated Computer Aided Engineering. 15 (4), pp. 313-329. https://doi.org/10.3233/ICA-2008-15404
Text mining in microblogs for real time topic and event monitoring
Lau, Cher H., Tjondronegoro, Dian, Li, Yuefeng, Xu, Yue and Tao, Xiaohui. 2010. "Text mining in microblogs for real time topic and event monitoring." Hess, Barry and Christensen, Clayton M. (ed.) SC10 Early Adopters PhD Workshop: Building the Next Generation of Application Scientists (held during the International Conference for High Performance Computing, Networking, Storage, and Analysis 2010). New Orleans, United States 15 Nov 2010 Washington, DC. United States.
Ontology mining for personalized search
Li, Yuefeng and Tao, Xiaohui. 2009. "Ontology mining for personalized search." Cao, Longbing, Yu, Philip S., Zhang, Chengqi and Zhang, Huaifeng (ed.) Data mining for business applications. New York, NY. United States. Springer. pp. 63-78
Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360
An ontology-based framework for knowledge retrieval
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2008. "An ontology-based framework for knowledge retrieval." Jain, Lakhmi, Lingras, Pawan, Klusch, Matthias and Lu, Jie (ed.) 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008). Sydney, Australia 09 - 12 Dec 2008 Los Alamitos, CA. USA. https://doi.org/10.1109/WIIAT.2008.226
Security and privacy on low-cost radio frequency identification systems
Sun, L.. 2010. "Security and privacy on low-cost radio frequency identification systems ." International Journal of Security and Networks. 5 (2/3), pp. 128-134. https://doi.org/10.1504/IJSN.2010.032211
Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3
Energy effective congestion control for multicast with network coding in wireless ad hoc network
Zhao, Chuanxin, Luo, Yonglong, Chen, Fulong, Zhang, Ji and Wang, Ruchuan. 2014. "Energy effective congestion control for multicast with network coding in wireless ad hoc network." Mathematical Problems in Engineering. https://doi.org/10.1155/2014/135945
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Mapping semantic knowledge for unsupervised text categorisation
Tao, Xiaohui, Li, Yuefeng, Zhang, Ji and Yong, Jianming. 2013. "Mapping semantic knowledge for unsupervised text categorisation." Wang, Hua and Rui, Zhang (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
Sentiment Analysis on Tweets for Social Events
Zhou, Xujuan, Tao, Xiaohui, Yong, Jianming and Yang, Zhenyu. 2013. "Sentiment Analysis on Tweets for Social Events." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581022
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
Advancements of outlier detection: a survey
Zhang, Ji. 2013. "Advancements of outlier detection: a survey." ICST Transactions on Scalable Information Systems. 13 (1), pp. 1-26. https://doi.org/10.4108/trans.sis.2013.01-03.e2
An innovative outlier detection method using localized thresholds
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "An innovative outlier detection method using localized thresholds." Data and Knowledge Engineering. https://doi.org/10.1007/978-3-642-34679-8-7
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Semantic labelling for document feature patterns using ontological subjects
Tao, Xiaohui, Li, Yuefeng, Liu, Bin and Shen, Yan. 2012. "Semantic labelling for document feature patterns using ontological subjects." Zhong, Ning and Gong, Zhiguo (ed.) 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.47
Efficient and effective filtering of duplication detection in large database applications
Zhang, Ji. 2012. "Efficient and effective filtering of duplication detection in large database applications." Journal of Software. 7 (11), pp. 2424-2436. https://doi.org/10.4304/jsw.7.11.2424-2436
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
Matching relevance features with ontological concepts
Shen, Yan, Li, Yuefeng, Xu, Yue and Tao, Xiaohui. 2012. "Matching relevance features with ontological concepts." 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology (WPRS 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.194
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Retrieving information from microblog using pattern mining and relevance feedback
Lau, Cher Han, Tao, Xiaohui, Tjondronegoro, Dian and Li, Yuefeng. 2012. "Retrieving information from microblog using pattern mining and relevance feedback." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_15
Personalised information gathering and recommender systems: techniques and trends
Tao, Xiaohui, Zhou, Xujuan, Lau, Cher Han and Li, Yuefeng. 2013. "Personalised information gathering and recommender systems: techniques and trends." EAI Endorsed Transactions on Scalable Information Systems. 13 (1-3), pp. 1-17. https://doi.org/10.4108/trans.sis.2013.01-03.e4
Mining contextual knowledge for context-aware recommender systems
Zhang, Wenping, Lau, Raymond and Tao, Xiaohui. 2012. "Mining contextual knowledge for context-aware recommender systems." Chao, Kuo-Ming, Lei, Hui, Li, Yinsheng, Chung, Jen-Yao and Shah, Nazaraf (ed.) 9th IEEE International Conference on E-Business Engineering (ICEBE 2012). Hangzhou, China 09 - 11 Sep 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/ICEBE.2012.65
Optimal timepoint sampling in high-throughput gene expression experiments
Rosa, Bruce A., Zhang, Ji, Major, Ian T., Qin, Wensheng and Chen, Jin. 2012. "Optimal timepoint sampling in high-throughput gene expression experiments." Bioinformatics. 28 (21), pp. 2773-2781. https://doi.org/10.1093/bioinformatics/bts511
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
Multi-modal summarization of key events and top players in sports tournament videos
Tjondronegoro, Dian, Tao, Xiaohui, Sasongko, Johannes and Lau, Cher Han. 2011. "Multi-modal summarization of key events and top players in sports tournament videos." IEEE Workshop on Applications of Computer Vision (WACV 2011). Kona, United States 05 - 07 Jan 2011 Piscataway, NJ. United States. https://doi.org/10.1109/WACV.2011.5711541
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
A cross-media framework for personalized learning systems
Jia, Tingbai and Tao, Xiaohui. 2011. "A cross-media framework for personalized learning systems." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053933
A personalized ontology model for web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2011. "A personalized ontology model for web information gathering." IEEE Transactions on Knowledge and Data Engineering. 23 (4), pp. 496-511. https://doi.org/10.1109/TKDE.2010.145
A process provenance service system for scientific data analysis and sharing
Liu, Qing, Zhang, Ji, Forbes, James, Xu, Kai and Nair, Dinesh. 2011. "A process provenance service system for scientific data analysis and sharing." Zhang, Ji and Livraga, Gionvanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053921
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
Mining world knowledge for analysis of search engine content
King, John D., Li, Yuefeng, Tao, Xiaohui and Nayak, Richi. 2007. "Mining world knowledge for analysis of search engine content." Web Intelligence. 5 (3), pp. 233-253.
Automatically acquiring training sets for web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2006. "Automatically acquiring training sets for web information gathering." Liu, Jiming and Wah, Benjamin W. (ed.) 2006 IEEE/WIC/ACM International Conference on Web Intelligence. Hong Kong, China 18 - 22 Dec 2006 Piscataway, NJ. United States. https://doi.org/10.1109/WI.2006.49
Ontology mining for semantic interpretation of user information needs
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2007. "Ontology mining for semantic interpretation of user information needs." Zhang, Zili and Siekmann, Jorg (ed.) 2nd International Conference on Knowledge Science, Engineering, and Management (KSEM 2007). Melbourne, Australia 28 - 30 Nov 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-76719-0_32
A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback
Tao, Xiaohui and Li, Yuefeng. 2009. "A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback." Wen, Peng, Li, Yuefeng, Polkowski, Lech and Yao, Yiyu (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_83
Concept-Based, Personalized Web Information Gathering: A Survey
Tao, Xiaohui and Li, Yuefeng. 2009. "Concept-Based, Personalized Web Information Gathering: A Survey." 3rd International Conference on Knowledge Science, Engineering, and Management (KSEM 2009). Vienna, Austria 25 - 27 Nov 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-10488-6_23
XML documents and access control management
Sun, Lili. 2010. XML documents and access control management. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24
Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11
On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48
PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47
Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) DEXA 2009: 20th International Conference on Database and Expert Systems Applications. Linz, Austria Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) APWeb 2008: 10th Asia-Pacific Web Conference. Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: International Conference on Network and System Security. Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Web service management system for bioinformatics research: a case study
Xu, Kai, Yu, Qi, Liu, Qing, Zhang, Ji and Bouguettaya, Athman. 2011. "Web service management system for bioinformatics research: a case study." Service Oriented Computing and Applications. 5 (1), pp. 1-15. https://doi.org/10.1007/s11761-011-0076-9
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628
Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Geva, Shlomo. 2010. "Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents." Huang, Xiangji Jimmy, King, Irwin, Raghavan, Vijay and Rueger, Stefan (ed.) 2010 IEEE/WIC/ACM International Conference on Web Intelligence. Toronto, Canada 31 Aug - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2010.76
Mining specific and general features in both positive and negative relevance feedback
Algarni, Abdulmohsen, Li, Yuefeng and Tao, Xiaohui. 2010. "Mining specific and general features in both positive and negative relevance feedback." Voorhees, E. M. and Buckland, Lori P. (ed.) TREC 2010: 19th Text REtrieval Conference: Relevance Feedback Track. Gaithersburg, United States 16 - 19 Nov 2010 Gaithersburg, MD, USA.
A knowledge-based model using ontologies for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2010. "A knowledge-based model using ontologies for personalized web information gathering." Web Intelligence. 8 (3), pp. 235-254. https://doi.org/10.3233/WIA-2010-0189
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24
An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78
A web-based interactive data visualization system for outlier subspace analysis
Liu, Dong, Gao, Qigang, Wang, Hai and Zhang, Ji. 2010. "A web-based interactive data visualization system for outlier subspace analysis." Debnath, Narayan (ed.) SEDE 2010: 19th International Conference on Software Engineering and Data Engineering. San Francisco, United States 16 - 18 Jun 2010 Cary, NC. United States.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Using usage control to access XML databases
Sun, Lili and Li, Yan. 2009. "Using usage control to access XML databases." International Journal of Information Systems in the Service Sector. 1 (3), pp. 32-44.
Semi-bipartite graph visualization for gene ontology networks
Xu, Kai, Williams, Rohan, Hong, Seok-Hee, Liu, Qing and Zhang, Ji. 2010. "Semi-bipartite graph visualization for gene ontology networks." Eppstein, D. and Gansner, E. R. (ed.) GD 2009: 17th International Symposium on Graph Drawing. Chicago, United States 22 - 25 Sep 2009 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-11805-0_24
FlowRecommender: a workflow recommendation technique for process provenance
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "FlowRecommender: a workflow recommendation technique for process provenance." Kennedy, Paul J., Ong, Kok-Leong and Christen, Peter (ed.) 8th Australasian Data Mining Conference (AusDM 2009): Data Mining and Analytics. Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Image mining: issues, frameworks and techniques
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "Image mining: issues, frameworks and techniques." Zaïane, Osmar R. and Simoff, Simeon J. (ed.) 2nd ACM SIGKDD International Workshop on Multimedia Data Mining (MDM/KDD'01). San Francisco, USA 26 Aug 2001 Canada.
HOS-Miner: a system for detecting outlying subspaces of high-dimensional data
Zhang, Ji, Lou, Meng, Ling, Tok Wang and Wang, Hai. 2004. "HOS-Miner: a system for detecting outlying subspaces of high-dimensional data." Nascimento, Mario A., Özsu, M. Tamer, Kossmann, Donald, Miller, Renee J., Blakeley, Jose A. and Schiefer, K. Bernhard (ed.) 30th International Conference on Very Large Data Bases (VLDB'04). Toronto, Canada 31 Aug - 03 Sep 2004 San Francisco, California, United States.
Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance
Zhang, Ji and Wang, Hai. 2006. "Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance." Knowledge and Information Systems. 10 (3), pp. 333-355.
Outlier detection for high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2007. "Outlier detection for high-dimensional data streams." 5th Dalhousie Computer Science In-house Conference (DCSI'07). Halifax, Canada 05 Apr 2007 Halifax, Nova Scotia, Canada.
D-GridMST: clustering large distributed spatial databases
Zhang, Ji and Liu, Han. 2005. "D-GridMST: clustering large distributed spatial databases." Halgamuge, Saman K. and Wang, Lipo (ed.) Classification and clustering for knowledge discovery. Berlin, Germany. Springer. pp. 61-72
A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data
Liu, Han, Kustra, Rafal and Zhang, Ji. 2004. "A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data." Arabnia, Hamid R. (ed.) 2004 International Conference on Artificial Intelligence (ICAI'04). Las Vegas, United States 21 - 24 Jun 2004 Las Vegas, Nevada, USA.
A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval
Zhang, Ji, Wang, Wei and Zhang, Sheng. 2005. "A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval." Arabnia, Hamid R. and Scime, A. (ed.) 2005 International Conference on Data Mining (DMIN'05). Las Vegas, United States of America Jun 2005 Las Vegas, Nevada, USA.
Image mining: trends and developments
Hsu, Wynne, Lee, Mong Li and Zhang, Ji. 2002. "Image mining: trends and developments." Journal of Intelligent Information Systems. 19 (1), pp. 7-23. https://doi.org/10.1023/A:1015508302797
A framework for efficent association rule mining in XML data
Zhang, Ji, Liu, Han, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2006. "A framework for efficent association rule mining in XML data." Journal of Database Management. 17 (3), pp. 19-40.
Gene specific co-regulation discovery from gene microarray data
Zhang, Ji, Liu, Qing, Xu, Kai and de Souza, Paulo. 2008. "Gene specific co-regulation discovery from gene microarray data." Arthur, Jonathan and Ng, See-Kiong (ed.) 19th International Conference on Genome Informatics (GIW 2008). Gold Coast, Australia 01 - 03 Dec 2008
Discover gene specific local co-regulations from time-course gene expression data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Discover gene specific local co-regulations from time-course gene expression data." Journal of Scientific Programming. 16 (1), pp. 31-47. https://doi.org/10.3233/SPR-2008-0243
A review of ontology and web service composition
Zhang, Ji. 2008. A review of ontology and web service composition. Australia. CSIRO Publishing.
Bio-SENSE: semantic web services for bioinformatics provenance
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-SENSE: semantic web services for bioinformatics provenance." Bird, Trevor (ed.) 2008 CSIRO ICT Centre Conference. Sydney, Australia 20 - 21 Nov 2008 Sydney, Australia.
Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy
Zhang, Ji. 2008. Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy. PhD Thesis Doctor of Philosophy. Dalhousie University, Canada.
X-warehouse: building query pattern-driven data warehouse for XML data
Zhang, Ji, Wang, Wei, Liu, Han and Zhang, Sheng. 2005. "X-warehouse: building query pattern-driven data warehouse for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
XAR-Miner: efficient association rules mining for XML data
Zhang, Sheng, Zhang, Ji, Liu, Han and Wang, Wei. 2005. "XAR-Miner: efficient association rules mining for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
Detecting outlying subspaces for high-dimensional data: a heuristic search approach
Zhang, Ji. 2005. "Detecting outlying subspaces for high-dimensional data: a heuristic search approach." 2005 SIAM International Workshop on Feature Selection for Data Mining: Interfacing Machine Learning and Statistics. Newport Beach, United States of America 23 Apr 2005
Outlying subspace detection for high-dimensional data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2009. "Outlying subspace detection for high-dimensional data." Rivero, Laura C., Doorn, Jorge Horacio and Ferraggine, Viviana E. (ed.) Encyclopedia of database technologies and applications, 2nd ed.. Hershey, PA, United States. IGI Global. pp. 1-6
Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases
Wang, Wei, Zhang, Ji and Wang, Hai. 2005. "Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases." Hao, Y., Liu, J., Wang, Y., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.-C. (ed.) 2005 IEEE International Conference on Computational Intelligence and Security (CIS'05). Xi'an, China 15 - 19 Dec 2005 Heidelberg, Germany.
Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services." 4th IEEE International Conference on eScience (eScience'08). Indianapolis, United States 10 - 12 Dec 2009 New York, United States.
Discover gene specific local co-regulations using progressive genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "Discover gene specific local co-regulations using progressive genetic algorithm." 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06). Washington D.C., United States 13 - 15 Nov 2006 New York, United States.
A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm." 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, China 18 - 20 Dec 2006 New York, United States.
Anomaly detection in high-dimensional network data streams: a case study
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Anomaly detection in high-dimensional network data streams: a case study." 2008 IEEE International Conference on Intelligence and Security Informatics (ISI '08). Taipei, Taiwan 17 - 20 Jun 2008 New York, United States.
SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638
Clustering in dynamic spatial databases
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2005. "Clustering in dynamic spatial databases." Journal of Intelligent Information Systems. 24 (1), pp. 5-27. https://doi.org/10.1007/s10844-005-0265-0
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." APWeb 2008: 10th Asia Pacific Web Conference Workshop . Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
XML and web services security
Sun, Lili and Li, Yan. 2008. "XML and web services security." CSCWD 2008: 12th International Conference on Computer Supported Cooporative Work in Design. Xi'an, China 16 - 18 Apr 2008 Piscataway, NJ, USA. https://doi.org/10.1109/CSCWD.2008.4537075
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
XML schema in XML documents with usage control
Sun, Lili and Li, Yan. 2007. "XML schema in XML documents with usage control." International Journal of Computer Science and Network Security. 7 (10), pp. 170-177.
XML undeniable signatures
Sun, Lili and Li, Yan. 2005. "XML undeniable signatures." Mohammadian, M. (ed.) International Conference on Intelligent Agents, Web Technologies & Internet Commerce (2005). Vienna, Austria 28 - 30 Nov 2005 USA.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
DTD level authorization in XML documents with usage control
Sun, Lili and Li, Yan. 2006. "DTD level authorization in XML documents with usage control." International Journal of Computer Science and Network Security. 6 (11), pp. 244-250.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.