Positive Influence Dominating Set Games

Paper


Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
Paper/Presentation Title

Positive Influence Dominating Set Games

Presentation TypePaper
AuthorsWang, Guangyuan (Author), Wang, Hua (Author), Tao, Xiaohui (Author), Zhang, Ji (Author), Yi, Xun (Author) and Yong, Jianming (Author)
EditorsHou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou
Journal or Proceedings TitleProceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014)
Number of Pages5
Year2014
Place of PublicationUnited States
ISBN9781479937769
Digital Object Identifier (DOI)https://doi.org/10.1109/CSCWD.2014.6846890
Web Address (URL) of Paperhttps://ieeexplore.ieee.org/document/6846890
Conference/Event18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014)
Event Details
Rank
B
B
B
B
B
B
B
B
B
B
B
B
B
B
B
Event Details
18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014)
Event Date
21 to end of 23 May 2014
Event Location
Hsinchu, Taiwan
Abstract

Motivated by applications in social networks, a new type of dominating set named Positive Influence Dominating Set (PIDS) has been studied in the literature. In this paper, we investigate cooperative cost games arising from PIDS problem on social network graphs. We propose two new game models, Rigid PIDS Game and Relaxed PIDS Game, and focus on their cores. First, a relationship between the cores of both games is obtained. Next, we also prove that the core of the relaxed PIDS game is nonempty if and only if there is no integrality gap for the relaxation linear programming of the PIDS problem on graph G.

Keywordsbalancedness; cooperative game; core; positive influence dominating set
ANZSRC Field of Research 2020460399. Computer vision and multimedia computation not elsewhere classified
490407. Mathematical logic, set theory, lattices and universal algebra
360502. Computer gaming and animation
Public Notes

Files associated with this item cannot be displayed due to copyright restrictions.

Byline AffiliationsDepartment of Mathematics and Computing
Victoria University
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q2w7z/positive-influence-dominating-set-games

  • 1829
    total views
  • 326
    total downloads
  • 6
    views this month
  • 0
    downloads this month

Export as

Related outputs

EventsVista: Enhancing Event Visualization and Interpretation
Farhat, Mohamad Khalil, Zhang, Ji, Tao, Xiaohui, Li, Tianning and Yu, T.. 2024. "EventsVista: Enhancing Event Visualization and Interpretation." 2023 10th International Conference on Behavioural and Social Computing (BESC). Larnaca, Cyprus 30 Oct - 01 Nov 2023 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BESC59560.2023.10386648
Boosting Healthiness Exposure in Category-Constrained Meal Recommendation Using Nutritional Standards
Li, Ming, Li, Lin, Tao, Xiaohui, Xie, Zhongwei, Xie, Qing and Yuan, Jingling. 2024. "Boosting Healthiness Exposure in Category-Constrained Meal Recommendation Using Nutritional Standards ." ACM Transactions on Intelligent Systems and Technology. 15 (4), pp. 1-28. https://doi.org/10.1145/3643859
DeGONet: Decentralized Group-Oriented Interconnection Network for IoT-enabled Metaverse
Jiang, Sining, Cheng, Xu, Dai, Hong-Ning, Zhao, Shuo, Lan, Yujun, Xie, Haoran, Tao, Xiaohui and Guo, Zhongwen. 2024. "DeGONet: Decentralized Group-Oriented Interconnection Network for IoT-enabled Metaverse." ACM Transactions on Internet Technology. https://doi.org/10.1145/3674972
Cognitive-Inspired Deep Learning Models for Aspect-Based Sentiment Analysis: A Retrospective Overview and Bibliometric Analysis
Chen, Xieling, Xie, Haoran, Qin, S. Joe, Cai, Yaping, Tao, Xiaohui and Wang, Fu Lee. 2024. "Cognitive-Inspired Deep Learning Models for Aspect-Based Sentiment Analysis: A Retrospective Overview and Bibliometric Analysis." Cognitive Computation. 16 (6), pp. 3518-3556. https://doi.org/10.1007/s12559-024-10331-y
Multi-view Few-shot Reasoning for Emerging Entities in Knowledge Graphs
Yan, Cheng, Zhao, Feng, Tao, Xiaohui and Zhu, Xiaofeng. 2024. "Multi-view Few-shot Reasoning for Emerging Entities in Knowledge Graphs." IEEE Transactions on Big Data. https://doi.org/10.1109/TBDATA.2024.3453749
Privacy-preserving pathological data sharing among multiple remote parties
Wu, Wei, Chen, Fulong, Yuan, Pinghai, Wang, Taochun, Xie, Dong, Zhao, Chuanxin, Wang, Chao, Tang, Detao, Li, Jingtao Li and Zhang, Ji. 2024. "Privacy-preserving pathological data sharing among multiple remote parties." Blockchain: Research and Applications. 5 (3). https://doi.org/10.1016/j.bcra.2024.100204
Partial policy hidden medical data access control method based on CP-ABE
Huang, Jing, Tang, Detao, Jiang, Chenyu, Chen, Fulong, Zhang, Ji, Xie, Dong, Wang, Taochun, Zhao, Chuanxin, Wang, Chao and Li, Jintao. 2024. "Partial policy hidden medical data access control method based on CP-ABE." Journal of Ambient Intelligence and Humanized Computing. https://doi.org/10.1007/s12652-024-04843-6
Variate Associated Domain Adaptation for Unsupervised Multivariate Time Series Anomaly Detection
He, Yifan, Bian, Yatao, Ding, Xi, Wu, Bingzhe, Guan, Jihong, Zhang, Ji and Zhou, Shuigeng. 2024. "Variate Associated Domain Adaptation for Unsupervised Multivariate Time Series Anomaly Detection." ACM Transactions on Knowledge Discovery from Data. 18 (8). https://doi.org/10.1145/3663573
Generous teacher: Good at distilling knowledge for student learning
Ding, Yifeng, Yang, Gaoming, Yin, Shuting, Zhang, Ji, Fang, Xianjin and Yang, Wencheng. 2024. "Generous teacher: Good at distilling knowledge for student learning." Image and Vision Computing. 150. https://doi.org/10.1016/j.imavis.2024.105199
P-Chain: Towards privacy-aware smart contract using SMPC
Diao, Yiqing, Ye, Ayong, Zhang, Yuexin, Zhang, Ji and Xu, Li. 2024. "P-Chain: Towards privacy-aware smart contract using SMPC." Journal of Information Security and Applications. 86. https://doi.org/10.1016/j.jisa.2024.103872
Speed Prediction of Multiple Traffic Scenarios with Local Fluctuation
Zhang, Tianyu, Li, Lin, Zhang, Rui and Tao, Xiaohui. 2024. "Speed Prediction of Multiple Traffic Scenarios with Local Fluctuation." H., Zhang W.Yang Z.Wang X.Tung A.Zheng Z.Guo (ed.) 8th APWeb-WAIM joint International Conference on Web and Big Data (APWeb-WAIM 2024). Jinhua, China 30 Aug - 01 Sep 2024 Singapore . Springer. https://doi.org/10.1007/978-981-97-7235-3_28
A Novel Multi-scale Spatiotemporal Graph Neural Network for Epidemic Prediction
Xu, Zenghui, Li, Mingzhang, Yu, Ting, Hou, Linlin, Zhang, P., Kiran, Rage Uday, Li, Zhao and Zhang, Ji. 2024. "A Novel Multi-scale Spatiotemporal Graph Neural Network for Epidemic Prediction." A.M., Strauss C.Amagasa T.Manco G.Kotsis G.Khalil I.Tjoa (ed.) 35th International Conference on Database and Expert Systems Applications (DEXA 2024). Naples, Italy 26 - 28 Aug 2024 Switzerland . Springer. https://doi.org/10.1007/978-3-031-68312-1_21
Accelerating Maximal Bicliques Enumeration with GPU on large scale network
Wu, Chunqi, Li, Jingdong, Li, Zhao, Zhang, Ji and Tang, Pan. 2024. "Accelerating Maximal Bicliques Enumeration with GPU on large scale network." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 161, pp. 601-613. https://doi.org/10.1016/j.future.2024.07.021
Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection
Liang, Lifang, Qiu, Xuyi, Zhang, Yan, Guan, Donghai, Zhang, Ji and Yuan, Weiwei. 2024. "Stationary Multi-scale Hierarchical Dilated Graph Convolution for Multivariate Time Series Anomaly Detection." 5th International Conference on Big Data and Security (ICBDS 2023). Nanjing, China 22 - 24 Dec 2023 Singapore . Springer. https://doi.org/10.1007/978-981-97-4390-2_5
MealRec+: A Meal Recommendation Dataset with Meal-Course Affiliation for Personalization and Healthiness
Li, Ming, Li, Lin, Tao, Xiaohui and Huang, Jimmy Xiangji. 2024. "MealRec+: A Meal Recommendation Dataset with Meal-Course Affiliation for Personalization and Healthiness." 47th International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR ’24). Washington DC, United States 14 - 18 Jul 2024 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3626772.3657857
An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors
Li, Lin, Mai, Yunqi, Chu, Yu, Tao, Xiaohui and Yong, Jiaming. 2024. "An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors." N., Shen W.Shen W.Barthes J.-P.Luo J.Qiu T.Zhou X.Zhang J.Zhu H.Peng K.Xu T.Chen (ed.) 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2024 ). Tianjin, China 08 - 10 May 2024 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CSCWD61410.2024.10580204
CrimeAlarm: Towards Intensive Intent Dynamics in Fine-Grained Crime Prediction
Hu, Kaixi, Li, Lin, Xie, Qing, Tao, Xiaohui and Xu, Guandong. 2024. "CrimeAlarm: Towards Intensive Intent Dynamics in Fine-Grained Crime Prediction." H.V., Onizuka M.Lee J.-G.Tong Y.Xiao C.Ishikawa Y.Lu K.Amer-Yahia S.Jagadish (ed.) 29th International Conference on Database Systems for Advanced Applications (DASFAA 2024). Gifu, Japan 02 - 05 Jul 2024 Singapore . Springer. https://doi.org/10.1007/978-981-97-5575-2_7
Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection
Ge, Fei, Zhang, Ji, Wang, Zhen, Zhou, Yuqian and Li, Zhao. 2024. "Magnitude-Contrastive Network for Unsupervised Graph Anomaly Detection." H., Zhang W.Yang Z.Wang X.Tung A.Zheng Z.Guo (ed.) 8th APWeb-WAIM joint International Conference on Web and Big Data (APWeb-WAIM 2024). Jinhua, China 30 Aug - 01 Sep 2024 Singapore . Springer. https://doi.org/10.1007/978-981-97-7241-4_30
Computational Personality Analysis with Interpretability Empowered Prediction
Elmahalaw, Ahmed R., Li, Lin, Wu, Xiaohua, Tao, Xiaohui and Yong, Jianming. 2024. "Computational Personality Analysis with Interpretability Empowered Prediction." 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2024 ). Tianjin, China 08 - 10 May 2024 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CSCWD61410.2024.10580811
BADFSS: Backdoor Attacks on Federated Self-Supervised Learning
Zhang, Jiale, Zhu, Chengcheng, Wu, Di, Sun, Xiaobing, Yong, Jianming and Long, Guodong. 2024. "BADFSS: Backdoor Attacks on Federated Self-Supervised Learning." Larson, Kate (ed.) 33rd International Joint Conference on Artificial Intelligence (IJCAI-24). Jeju, Korea 03 - 09 Aug 2024 Korea. https://doi.org/10.24963/ijcai.2024/61
CrossDeFi: A Novel Cross-Chain Communication Protocol
Mohammed Abdul, Shezon Saleem, Shrestha, Anup and Yong, Jianming. 2024. "CrossDeFi: A Novel Cross-Chain Communication Protocol." Future Internet. 16 (9). https://doi.org/10.3390/fi16090314
Decoupled Progressive Distillation for Sequential Prediction with Interaction Dynamics
Hu, Kaixi, Li, Lin, Xie, Qing, Liu, Jianquan, Tao, Xiaohui and Xu, Guandong. 2024. "Decoupled Progressive Distillation for Sequential Prediction with Interaction Dynamics." ACM Transactions on Information Systems. 42 (3), pp. 1-35. https://doi.org/10.1145/3632403
Epidemic Source Identification Based on Infection Graph Learning
Hong, Xingyun, Yu, Ting, Li, Zhao and Zhang, Ji. 2024. "Epidemic Source Identification Based on Infection Graph Learning." 7th International Joint Conference on Asia-Pacific Web and Web-Age Information Management (APWeb-WAIM 2023). Wuhan, China 06 - 08 Oct 2023 Singapore . Springer. https://doi.org/10.1007/978-981-97-2303-4_16
ConIS: controllable text-driven image stylization with semantic intensity
Yang, Gaoming, Li, Changgeng and Zhang, Ji. 2024. "ConIS: controllable text-driven image stylization with semantic intensity." Multimedia Systems. 30 (4). https://doi.org/10.1007/s00530-024-01381-1
Fast face swapping with high-fidelity lightweight generator assisted by online knowledge distillation
Yang, Gaoming, Ding, Yifeng, Fang, Xianjin, Zhang, Ji and Chu, Yan. 2024. "Fast face swapping with high-fidelity lightweight generator assisted by online knowledge distillation." The Visual Computer. https://doi.org/10.1007/s00371-024-03414-2
Two-dimensional data partitioning for non-negative matrix tri-factorization
Yan, Jiaxing, Liu, Hai, Lei, Zhiqi, Rao, Yanghui, Liu, Guan, Xie, Haoran, Tao, Xiaohui and Wang, Fu Lee. 2024. "Two-dimensional data partitioning for non-negative matrix tri-factorization." Big Data Research. 37. https://doi.org/10.1016/j.bdr.2024.100473
An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network
Siuly, Siuly, Khare, Smith K., Kabir, Enamul, Sadiq, Muhammad Tariq and Wang, Hua. 2024. "An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network." Computers in Biology and Medicine. 174. https://doi.org/10.1016/j.compbiomed.2024.108462
Graph-Enabled Reinforcement Learning for Time Series Forecasting With Adaptive Intelligence
Shaik, Thanveer, Tao, Xiaohui, Xie, Haoran, Li, Lin, Yong, Jianming and Li, Yuefeng. 2024. "Graph-Enabled Reinforcement Learning for Time Series Forecasting With Adaptive Intelligence." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (4), pp. 2908-2918. https://doi.org/10.1109/TETCI.2024.3398024
Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization
Sello, Buti, Yong, Jianming and Tao, Xiaohui. 2024. "Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization." Data Science and Engineering. https://doi.org/10.1007/s41019-024-00251-0
20 years of Web Intelligence: Call for a new era of AI in the Connected World
Kuai, Hongzhi and Tao, Xiaohui. 2024. "20 years of Web Intelligence: Call for a new era of AI in the Connected World." Web Intelligence. 22 (1), pp. 1-4. https://doi.org/10.3233/WEB-230451
Never-Ending Learning for Explainable Brain Computing
Kuai, Hongzhi, Chen, Jianhui, Tao, Xiaohui, Cai, Lingyun, Imamura, Kazuyuki, Matsumoto, Hiroki, Liang, Peipeng and Zhong, Ning. 2024. "Never-Ending Learning for Explainable Brain Computing." Advanced Science. 11 (24). https://doi.org/10.1002/advs.202307647
Optimal Treatment Strategies for Critical Patients with Deep Reinforcement Learning
Job, Simi, Tao, Xiaohui, Li, Lin, Xie, Haoran, Cai, Taotao, Yong, Jianming and Li, Qing. 2024. "Optimal Treatment Strategies for Critical Patients with Deep Reinforcement Learning ." ACM Transactions on Intelligent Systems and Technology. 15 (2), pp. 1-22. https://doi.org/10.1145/3643856
Semantics and Geography Aware Hierarchical Learning for Sequential Crime Prediction
Hu, Kaixi, Li, Lin, Tao, Xiaohui and Zhang, Jianwei. 2024. "Semantics and Geography Aware Hierarchical Learning for Sequential Crime Prediction." IEEE Signal Processing Letters. 31, pp. 1234-1238. https://doi.org/10.1109/LSP.2024.3393863
Preparation of a long-term mildew resistant and strong soy protein adhesive via constructing multiple crosslinking networks
Chen, Yanqiu, Huang, Xinxin, Wang, Guang, Liu, Hanbing, Lin, Xixiang, Song, Pingan, Ding, Wenrui, Luo, Jianlin and Gao, Qiang. 2024. "Preparation of a long-term mildew resistant and strong soy protein adhesive via constructing multiple crosslinking networks." Chemical Engineering Journal. 492. https://doi.org/10.1016/j.cej.2024.152045
Leveraging text mining and analytic hierarchy process for the automatic evaluation of online courses
Chen, Xieling, Xie, Haoran, Tao, Xiaohui, Wang, Fu Lee and Cao, Jie. 2024. "Leveraging text mining and analytic hierarchy process for the automatic evaluation of online courses." International Journal of Machine Learning and Cybernetics. 15 (11), pp. 4973-4998. https://doi.org/10.1007/s13042-024-02203-6
Artificial intelligence and multimodal data fusion for smart healthcare: topic modeling and bibliometrics
Chen, Xieling, Xie, Haoran, Tao, Xiaohui, Wang, Fu Lee, Leng, Mingming and Lei, Baiying. 2024. "Artificial intelligence and multimodal data fusion for smart healthcare: topic modeling and bibliometrics." Artificial Intelligence Review. 57 (4). https://doi.org/10.1007/s10462-024-10712-7
A topic modeling-based bibliometric exploration of automatic summarization research
Chen, Xieling, Xie, Haoran, Tao, Xiaohui, Xu, Lingling, Wang, Jingjing, Dai, Hong-Ning and Wang, Fu Lee. 2024. "A topic modeling-based bibliometric exploration of automatic summarization research." WIREs Data Mining and Knowledge Discovery. 14 (5). https://doi.org/10.1002/widm.1540
Robust equivalent circuit model parameters identification scheme for State of Charge (SOC) estimation based on maximum correntropy criterion
Zhang, Kexin, Zhao, Xuezhuan, Chen, Yu, Wu, Di, Cai, Taotao, Wang, Yi, Li, Lingling and Zhang, Ji. 2024. "Robust equivalent circuit model parameters identification scheme for State of Charge (SOC) estimation based on maximum correntropy criterion." International Journal of Electrochemical Science. 19 (5). https://doi.org/10.1016/j.ijoes.2024.100558
Making sense of student feedback and engagement using artificial intelligence
Dann, Christopher, Redmond, Petrea, Fanshawe, Melissa, Brown, Alice, Getenet, Seyum, Shaik, Thanveer, Tao, Xiaohui, Galligan, Linda and Li, Yan. 2024. "Making sense of student feedback and engagement using artificial intelligence." Australasian Journal of Educational Technology. 40 (3). https://doi.org/10.14742/ajet.8903
Developing a sustainable road-rail multimodal distribution network for improved animal welfare and meat quality under carbon tax in Queensland, Australia
Babagolzadeh, Mahla, Zhang, Yahua, Yu, Hang, Yong, Jianming, Kille, Tarryn and Shrestha, Anup. 2024. "Developing a sustainable road-rail multimodal distribution network for improved animal welfare and meat quality under carbon tax in Queensland, Australia." Case Studies on Transport Policy. 17 (2024). https://doi.org/https://doi.org/10.1016/j.cstp.2024.101224
FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning
Shaik, Thanveer, Tao, Xiaohui, Li, Lin, Xie, Haoran, Cai, Taotao, Zhu, Xiaofeng and Li, Qing. 2024. "FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning ." IEEE Transactions on Knowledge and Data Engineering. 36 (10), pp. 5153-5167. https://doi.org/10.1109/TKDE.2024.3382726
Contrastive sentence representation learning with adaptive false negative cancellation
Xu, Lingling, Xie, Haoran, Wang, Fu Lee, Tao, Xiaohui, Wang, Weiming and Li, Qing. 2024. "Contrastive sentence representation learning with adaptive false negative cancellation." Information Fusion. 102. https://doi.org/10.1016/j.inffus.2023.102065
RCNet: Related Context-Driven Network with Hierarchical Attention for Salient Object Detection
Xia, Chenxing, Sun, Yanguang, Li, Kuan-Ching, Ge, Bin, Zhang, Hanling, Jiang, Bo and Zhang, Ji. 2024. "RCNet: Related Context-Driven Network with Hierarchical Attention for Salient Object Detection." Expert Systems with Applications. 237 (Part A). https://doi.org/10.1016/j.eswa.2023.121441
A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing
Wang, Canling, Wu, Wei, Chen, Fulong, Shu, Hong, Zhang, Ji, Zhang, Yuxuan, Wang, Taochun, Xie, Dong and Zhao, Chuanxin. 2024. "A Blockchain-Based Trustworthy Access Control Scheme for Medical Data Sharing." IET Information Security. 2024. https://doi.org/10.1049/2024/5559522
Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Color adjustable, mechanically robust, flame-retardant and weather-resistant TiO2/MMT/CNF hierarchical nanocomposite coatings toward intelligent fire cyclic warning and protection
Shen, Yan-Bin, Yu, Ke-Xin, Wang, Ye-Jun, Qu, Yun-Hao, Pan, Long-Qian, Cao, Cheng-Fei, Cao, Kun, Gao, Jie-Feng, Shi, Yongqian, Song, Pingan, Yong, Jianming, Hong, Min, Zhang, Guo-Dong, Zhao, Li and Tang, Long-Cheng. 2024. "Color adjustable, mechanically robust, flame-retardant and weather-resistant TiO2/MMT/CNF hierarchical nanocomposite coatings toward intelligent fire cyclic warning and protection." Composites Part B: Engineering. 271. https://doi.org/10.1016/j.compositesb.2023.111159
A survey of multimodal information fusion for smart healthcare: Mapping the journey from data to wisdom
Shaik, Thanveer, Tao, Xiaohui, Li, Lin, Xie, Haoran and Velasquez, Juan D.. 2024. "A survey of multimodal information fusion for smart healthcare: Mapping the journey from data to wisdom." Information Fusion. 102. https://doi.org/10.1016/j.inffus.2023.102040
Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion
Shaik, Thanveer, Tao, Xiaohui, Li, Lin, Higgins, Niall, Gururajan, Raj, Zhou, Xujuan and Yong, Jianming. 2024. "Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion." Pattern Recognition Letters. 177. https://doi.org/10.1016/j.patrec.2023.12.004
Category-Wise Meal Recommendation
Li, Ming, Li, Lin, Tao, Xiaohui, Xie, Qing and Yuan, Jingling. 2024. "Category-Wise Meal Recommendation." 30th International Conference on Neural Information Processing, Part XIV (ICONIP2023). Changsha, China 20 - 23 Nov 2023 Singapore . Springer. https://doi.org/10.1007/978-981-99-8181-6_22
Feature extraction and learning approaches for cancellable biometrics: A survey
Yang, Wencheng, Wang, Song, Hu, Jiankun, Tao, Xiaohui and Li, Yan. 2024. "Feature extraction and learning approaches for cancellable biometrics: A survey." CAAI Transactions on Intelligence Technology. 9 (1), pp. 4-25. https://doi.org/10.1049/cit2.12283
Machine learning for expediting next-generation of fire-retardant polymer composites
Jafari, Pooya, Zhang, Ruoran, Huo, Siqi, Wang, Qingsheng, Yong, Jianming, Hong, Min, Deo, Ravinesh, Wang, Hao and Song, Pingan. 2024. "Machine learning for expediting next-generation of fire-retardant polymer composites." Composites Communications. 45. https://doi.org/10.1016/j.coco.2023.101806
Incremental Maximal Clique Enumeration for Hybrid Edge Changes in Large Dynamic Graphs
Yu, Ting, Jiang, Ting, Bah, Mohamed Jaward, Zhao, Chen, Huang, Hao, Liu, Mengchi, Zhou, Shuigeng, Li, Zhao and Zhang, Ji. 2024. "Incremental Maximal Clique Enumeration for Hybrid Edge Changes in Large Dynamic Graphs." IEEE Transactions on Knowledge and Data Engineering. 36 (4), pp. 1650-1666. https://doi.org/10.1109/TKDE.2023.3311398
Pyramid style-attentional network for arbitrary style transfer
Yang, Gaoming, Zhang, Shicheng, Fang, Xianjin and Zhang, Ji. 2024. "Pyramid style-attentional network for arbitrary style transfer." Multimedia Tools and Applications. 83 (5), pp. 3483-13502. https://doi.org/10.1007/s11042-023-15650-0
Toward Learning Joint Inference Tasks for IASS-MTS Using Dual Attention Memory With Stochastic Generative Imputation
Wang, Zhen, Zhang, Yang, Pang, Yan, Wang, Nannan, Bah, Mohamed Jaward, Li, Ke and Zhang, Ji. 2024. "Toward Learning Joint Inference Tasks for IASS-MTS Using Dual Attention Memory With Stochastic Generative Imputation." IEEE Transactions on Neural Networks and Learning Systems. 35 (12), pp. 17504-7518. https://doi.org/10.1109/TNNLS.2023.3305542
A graph-powered large-scale fraud detection system
Li, Zhao, Wang, Biao, Huang, Jiaming, Jin, Yilun, Xu, Zenghui, Zhang, Ji and Gao, Jianliang. 2024. "A graph-powered large-scale fraud detection system." International Journal of Machine Learning and Cybernetics. 15 (1), p. 115–128. https://doi.org/10.1007/s13042-023-01786-w
Class-Level Logit Perturbation
Li, Mengyang, Su, Fengguang, Wu, Ou and Zhang, Ji. 2024. "Class-Level Logit Perturbation." IEEE Transactions on Neural Networks and Learning Systems. 35 (10), pp. 13926-13940. https://doi.org/10.1109/TNNLS.2023.3273355
CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection
Gao, Jianliang, Chen, Jiamin, Oloulade, Babatounde Moctard, Al-Sabri, Raeed, Lyu, Tengfei, Zhang, Ji and Li, Zhao. 2024. "CommGNAS: Unsupervised Graph Neural Architecture Search for Community Detection." IEEE Transactions on Emerging Topics in Computing. 12 (2), pp. 444-454. https://doi.org/10.1109/TETC.2023.3270181
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva Raj. 2023. "Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Singapore. https://doi.org/10.1007/978-981-99-7108-4_10
Predicting learners' performance using MOOC clickstream
Xiao, Kui, Pan, Xueyan, Zhang, Yan, Tao, Xiaohui and Huang, Zhifang. 2023. "Predicting learners' performance using MOOC clickstream." 19th International Conference on Advanced Data Mining and Applications (ADMA'23). Shenyang, China 21 - 23 Aug 2023 Switzerland. Springer. https://doi.org/10.1007/978-3-031-46674-8_42
HA-CMNet: A Driver CTR Model for Vehicle-Cargo Matching in O2O Platform
Jiang, Zilong, Zuo, Xiang, Li, Lin, Tao, Xiaohui and Wang, Dali. 2023. "HA-CMNet: A Driver CTR Model for Vehicle-Cargo Matching in O2O Platform." 19th International Conference on Advanced Data Mining and Applications (ADMA'23). Shenyang, China 21 - 23 Aug 2023 Switzerland . Springer. https://doi.org/10.1007/978-3-031-46674-8_45
Tree-like Interaction Learning for Bundle Recommendation
Ke, Haole, Li, Lin, Wang, Peipei, Yuan, Jingling and Tao, Xiaohui. 2023. "Tree-like Interaction Learning for Bundle Recommendation." 2023 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'23). Rhodes Island, Greece 04 - 10 Jun 2023 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICASSP49357.2023.10096246
The Impact on Employability by COVID-19 Pandemic - AI Case Studies
Bandi, Venkata Bharath, Tao, Xiaohui, Shaik, Thanveer, Yong, Jianming and Zhang, Ji. 2023. "The Impact on Employability by COVID-19 Pandemic - AI Case Studies ." 24th International Conference on Web Information Systems Engineering (WISE 2023). Melbourne, Australia 25 - 27 Oct 2023 Singapore . Springer. https://doi.org/10.1007/978-981-99-7254-8_66
User-Meal Interaction Learning for Meal Recommendation: A Reproducibility Study
Li, Ming, Li, Lin, Tao, Xiaohui and Zhong, Ning. 2023. "User-Meal Interaction Learning for Meal Recommendation: A Reproducibility Study." Annual International ACM SIGIR Conference on Research and Development in Information Retrieval in the Asia Pacific Region (SIGIR-AP '23). Beijing, China 26 - 28 Nov 2023 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3624918.3625342
Interrelated feature selection from health surveys using domain knowledge graph
Jaworsky, Markian, Tao, Xiaohui, Pan, Lei, Pokhrel, Shiva Raj, Yong, Jianming and Zhang, Ji. 2023. "Interrelated feature selection from health surveys using domain knowledge graph." Health Information Science and Systems. 11. https://doi.org/10.1007/s13755-023-00254-7
Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks
Zhang, Yang, Wang, Zhen, Yu, Ting, Lu, Mingming, Ren, Zujie and Zhang, Ji. 2023. "Knowledge Tracing Based on Gated Heterogeneous Graph Convolutional Networks." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020547
IDGMS: a One-Stop Graph Mining System for Infectious Diseases
Xu, Zenghui, Yu, Ting, Hong, Xingyun, Li, Mingzhang, Zhang, Yang, Ren, Zujie and Zhang, Ji. 2023. "IDGMS: a One-Stop Graph Mining System for Infectious Diseases." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020537
Debiased Learning of Self-Labeled Twitter Data for User Demographic Prediction
Wang, Zhen, Cooley, Madison, Zhang, Yang, Lan, Chao and Zhang, Ji. 2023. "Debiased Learning of Self-Labeled Twitter Data for User Demographic Prediction." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020166
Fast Fourier Transform and Ensemble Model to Classify Epileptic EEG Signals
Lafta, Raid, Alshaheen, Hisham, Wang, Biao, Tao, Xiaohui, Li, Lingling, Zhang, Kexin and Zhang, Ji. 2023. "Fast Fourier Transform and Ensemble Model to Classify Epileptic EEG Signals." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020818
The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks
Khan, Danish, Zhou, Xujuan and Yong, Jianming. 2023. "The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00050
A Parallel Framework for Streaming Graphs Computing
Jiang, Ting, Yu, Ting, Hong, Zexian, Ren, Zujie and Zhang, Ji. 2023. "A Parallel Framework for Streaming Graphs Computing." Proceedings of the 10th IEEE International Conference on Big Data (2022). Osaka, Japan 17 - 20 Dec 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BigData55660.2022.10020995
Hyperspectral Anomaly Detection based on Autoencoder using Superpixel Manifold Constraint
Gan, Yuquan, Liu, Wenqiang, Liu, Ying, He, Jinglu and Zhang, Ji. 2023. "Hyperspectral Anomaly Detection based on Autoencoder using Superpixel Manifold Constraint." 2022 5th International Conference on Artificial Intelligence and Pattern Recognition (AIPR 2022). Xiamen China 23 - 25 Sep 2022 United States. Association for Computing Machinery (ACM). https://doi.org/10.1145/3573942.3574108
A Generative Adversarial Active Learning Method for Effective Outlier Detection
Bah, Mohamed Jaward, Zhang, Ji, Yu, Ting, Xia, Feng, Li, Zhao, Zhou, Shuigeng and Wang, Hongzhi. 2023. "A Generative Adversarial Active Learning Method for Effective Outlier Detection." 34th International Conference on Tools with Artificial Intelligence (ICTAI 2022). Macao, China 31 Oct - 02 Nov 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICTAI56018.2022.00027
Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2023. "Decentralized Blockchain Network." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00049
Information fusion in crime event analysis: A decade survey on data, features and models
Hu, Kaixi, Li, Lin, Tao, Xiaohui, Velasquez, Juan D. and Delaney, Patrick. 2023. "Information fusion in crime event analysis: A decade survey on data, features and models." Information Fusion. 100. https://doi.org/10.1016/j.inffus.2023.101904
L2QA: Long Legal Article Question Answering with Cascaded Key Segment Learning
Xie, Shugui, Li, Lin, Yuan, Jingling, Xie, Qing and Tao, Xiaohui. 2023. "L2QA: Long Legal Article Question Answering with Cascaded Key Segment Learning." 28th International Conference on Database Systems for Advanced Applications (DASFAA 2023). Tianjin, China 17 - 20 Apr 2023 Springer. https://doi.org/10.1007/978-3-031-30675-4_27
Hierarchical Aggregation Based Knowledge Graph Embedding for Multi-task Recommendation
Wang, Yani, Zhang, Ji, Zhou, Xiangmin and Zhang, Yang. 2023. "Hierarchical Aggregation Based Knowledge Graph Embedding for Multi-task Recommendation." 6th International Joint Conference on Asia-Pacific Web and Web-Age Information Management (APWeb-WAIM 2022). Nanjing, China 25 - 27 Nov 2022 Switzerland . https://doi.org/10.1007/978-3-031-25201-3_13
Query2Trip: Dual-Debiased Learning for Neural Trip Recommendation
Wang, Peipei, Li, Lin, Wang, Ru and Tao, Xizohui. 2023. "Query2Trip: Dual-Debiased Learning for Neural Trip Recommendation." 28th International Conference on Database Systems for Advanced Applications (DASFAA 2023). Tianjin, China 17 - 20 Apr 2023 Switzerland . Springer. pp. 80-96 https://doi.org/10.1007/978-3-031-30672-3_6
Hyperbolic Mutual Learning for Bundle Recommendation
Ke, Haole, Li, Lin, Wang, PeiPei, Yuan, Jingling and Tao, Xiaohui. 2023. "Hyperbolic Mutual Learning for Bundle Recommendation." 28th International Conference on Database Systems for Advanced Applications (DASFAA 2023). Tianjin, China 17 - 20 Apr 2023 Switzerland . Springer. https://doi.org/10.1007/978-3-031-30672-3_28
An Efficient Embedding Framework for Uncertain Attribute Graph
Jiang, Ting, Yu, Ting, Qiao, Xueting and Zhang, Ji. 2023. "An Efficient Embedding Framework for Uncertain Attribute Graph." 34th International Conference on Database and Expert Systems Applications (DEXA 2023). Penang, Malaysia 28 - 30 Aug 2023 Switzerland . https://doi.org/10.1007/978-3-031-39821-6_18
Be-or-Not Prompt Enhanced Hard Negatives Generating For Memes Category Detection
Cui, Jian, Li, Lin and Tao, Xiaohui. 2023. "Be-or-Not Prompt Enhanced Hard Negatives Generating For Memes Category Detection." 2023 IEEE International Conference on Multimedia and Expo (ICME). Brisbane, Australia 10 - 14 Jul 2023 United Sates. https://doi.org/10.1109/ICME55011.2023.00038
GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing
Zhao, Jin, Zhang, Yu, He, Ligang, Li, Qikun, Zhang, Xiang, Jiang, Xinyu, Yu, Hui, Liao, Xiaofei, Jin, Hai, Gu, Lin, Liu, Haikun, He, Bingsheng, Zhang, Ji, Song, Xianzheng, Wang, Lin and Zhou, Jun. 2023. "GraphTune: An Efficient Dependency-Aware Substrate to Alleviate Irregularity in Concurrent Graph Processing." ACM Transactions on Architecture and Code Optimization. 20 (3), pp. 1-24. https://doi.org/10.1145/3600091
EGraph: Efficient Concurrent GPU-Based Dynamic Graph Processing
Zhang, Yu, Liang, Yuxuan, Zhao, Jin, Mao, Fubing, Gu, Lin, Liao, Xiaofei, Jin, Hai, Liu, Haikun, Guo, Song, Zeng, Yangqing, Hu, Hang, Li, Chen, Zhang, Ji and Wang, Biao. 2023. "EGraph: Efficient Concurrent GPU-Based Dynamic Graph Processing." IEEE Transactions on Knowledge and Data Engineering. 35 (6), pp. 5823-5836. https://doi.org/10.1109/TKDE.2022.3171588
DeepSafety: a deep neural network-based edge computing framework for detecting unsafe behaviors of construction workers
Zhang, Ji, Liu, Chia-Chun and Ying, Josh Jia-Ching. 2023. "DeepSafety: a deep neural network-based edge computing framework for detecting unsafe behaviors of construction workers." Journal of Ambient Intelligence and Humanized Computing. 14 (12), pp. 15997-16009. https://doi.org/10.1007/s12652-023-04554-4
An efficient hardware accelerator for monotonic graph algorithms on dynamic directed graphs
Yang, Yun, Yu, Hui, Zhao, Jin, Zhang, Yu, Liao, Xiaofei, Jiang, Xinyu, Jin, Hai, Liu, Haikun, Mao, Fubing, Zhang, Ji and Wang, Biao. 2023. "An efficient hardware accelerator for monotonic graph algorithms on dynamic directed graphs." Scientia Sinica Informationis. 53 (8), pp. 1575-1592. https://doi.org/10.1360/SSI-2022-0191
FDS_2D: rethinking magnitude-phase features for DeepFake detection
Yang, Gaoming, Wei, Anxing, Fang, Xianjin and Zhang, Ji. 2023. "FDS_2D: rethinking magnitude-phase features for DeepFake detection." Multimedia Systems. 29 (4), pp. 2399-2413. https://doi.org/10.1007/s00530-023-01118-6
Facial depth forgery detection based on image gradient
Xu, Kun, Yang, Gaoming, Fang, Xianjin and Zhang, Ji. 2023. "Facial depth forgery detection based on image gradient." Multimedia Tools and Applications. 82 (19), pp. 29501-29525. https://doi.org/10.1007/s11042-023-14626-4
Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach
Wang, Zhen, Jiang, Ting, Xu, Zenghui, Zhang, Ji and Gao, Jianliang. 2023. "Irregularly Sampled Multivariate Time Series Classification: A Graph Learning Approach." IEEE Intelligent Systems. 38 (3), pp. 3-11. https://doi.org/10.1109/MIS.2023.3239797
Blockchain-Enhanced Smart Contract for Cost-Effective Insurance Claims Processing
Wang, Qiping, Lau, Raymond Yiu Keung, Si, Yain-Whar, Xie, Haoran and Tao, Xiaohui. 2023. "Blockchain-Enhanced Smart Contract for Cost-Effective Insurance Claims Processing." Journal of Global Information Management. 31 (7). https://doi.org/10.4018/JGIM.329927
SAGES: Scalable Attributed Graph Embedding With Sampling for Unsupervised Learning
Wang, Jialin, Qu, Xiaoru, Bai, Jinze, Li, Zhao, Zhang, Ji and Gao, Jun. 2023. "SAGES: Scalable Attributed Graph Embedding With Sampling for Unsupervised Learning." IEEE Transactions on Knowledge and Data Engineering. 35 (5), pp. 5216-5229. https://doi.org/10.1109/TKDE.2022.3148272
Mining Periodic-Frequent Patterns in Irregular Dense Temporal Databases Using Set compliments
Veena, Pamalla, Sreepada, Tarun, Kiran, Rage Uday, Dao, Minh-Son, Zettsu, Koli, Watanobe, Yutaka and Zhang, Ji. 2023. "Mining Periodic-Frequent Patterns in Irregular Dense Temporal Databases Using Set compliments." IEEE Access. 11, pp. 118676-118688. https://doi.org/10.1109/ACCESS.2023.3326419
Towards an understanding of the engagement and emotional behaviour of MOOC students using sentiment and semantic features
Tao, Xiaohui, Shannon-Honson, Aaron, Delaney, Patrick, Dann, Christopher, Xie, Haoran, Li, Yan and O'Neill, Shirley. 2023. "Towards an understanding of the engagement and emotional behaviour of MOOC students using sentiment and semantic features." Computers and Education: Artificial Intelligence. 4. https://doi.org/10.1016/j.caeai.2022.100116
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
A novel dropout mechanism with label extension schema toward text emotion classification
Li, Zongxi, Li, Xianming, Xie, Haoran, Wang, Fu Lee, Leng, Mingming, Li, Qing and Tao, Xiaohui. 2023. "A novel dropout mechanism with label extension schema toward text emotion classification." Information Processing and Management. 60 (2). https://doi.org/10.1016/j.ipm.2022.103173
High-Order Correlation-Guided Slide-Level Histology Retrieval with Self-Supervised Hashing
Li, Shengrui, Zhao, Yining, Zhang, Jun, Yu, Ting, Zhang, Ji and Gao, Yue. 2023. "High-Order Correlation-Guided Slide-Level Histology Retrieval with Self-Supervised Hashing." IEEE Transactions on Pattern Analysis and Machine Intelligence. 45 (9), pp. 11008-11023. https://doi.org/10.1109/TPAMI.2023.3269810
Dual-interactive fusion for code-mixed deep representation learning in tag recommendation
Li, Lin, Wang, Peipei, Zheng, Xinhao, Xie, Qing, Tao, Xiaohui and Velasquez, Juan D.. 2023. "Dual-interactive fusion for code-mixed deep representation learning in tag recommendation." Information Fusion. 99. https://doi.org/10.1016/j.inffus.2023.101862
Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management
He, Yifan, Li, Zhao, Li, Zhenpeng, Zhou, Shuigeng, Yu, Ting and Zhang, Ji. 2023. "Towards Cross-Lingual Multi-Modal Misinformation Detection for E-Commerce Management." IEEE Transactions on Network and Service Management. 20 (2), pp. 1040-1050. https://doi.org/10.1109/TNSM.2023.3234114
Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks
Cui, Hui, Yang, Xuechao, Yang, Wencheng, Qin, Baodong and Yi, Xun. 2023. "Token-Based Biometric Enhanced Key Derivation for Authentication Over Wireless Networks." IEEE Transactions on Network Science and Engineering. 10 (4), pp. 2347-2357. https://doi.org/10.1109/TNSE.2023.3246439
Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Li, Yuefeng and Acharya, U. Rajendra. 2023. "Identifying predictive biomarkers for repetitive transcranial magnetic stimulation response in depression patients with explainability." Computer Methods and Programs in Biomedicine. 242. https://doi.org/10.1016/j.cmpb.2023.107771
Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan, Acharya, U. Rajendra and Li, Yuefeng. 2023. "Deep learning and machine learning in psychiatry: a survey of current progress in depression detection, diagnosis and treatment." Brain Informatics. 10 (1). https://doi.org/10.1186/s40708-023-00188-6
Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)
Sheehy, Joshua, Rutledge, Hamish, Acharya, U. Rajendra, Loh, Hui Wen, Gururajan, Raj, Tao, Xiaohui, Zhou, Xujuan, Li, Yuefeng, Gurney, Tiana and Kondalsamy-Chennakesavan, S.. 2023. "Gynecological cancer prognosis using machine learning techniques: A systematic review of the last three decades (1990–2022)." Artificial Intelligence in Medicine. 139. https://doi.org/10.1016/j.artmed.2023.102536
Video face forgery detection via facial motion-assisted capturing dense optical flow truncation
Yang, Gaoming, Xu, Kun, Fang, Xianjin and Zhang, Ji. 2023. "Video face forgery detection via facial motion-assisted capturing dense optical flow truncation." The Visual Computer. 39 (11), pp. 5589-5608. https://doi.org/10.1007/s00371-022-02683-z
RSFace: subject agnostic face swapping with expression high fidelity
Yang, Gaoming, Wang, Tao, Fang, Xianjin and Zhang, Ji. 2023. "RSFace: subject agnostic face swapping with expression high fidelity." The Visual Computer. 39 (11), pp. 5497-5511. https://doi.org/10.1007/s00371-022-02675-z
The Integral Role of Intelligent IoT System, Cloud Computing, Artificial Intelligence, and 5G in the User-Level Self-Monitoring of COVID-19
Ahmed, Sajjad, Yong, Jianming and Shrestha, Anup. 2023. "The Integral Role of Intelligent IoT System, Cloud Computing, Artificial Intelligence, and 5G in the User-Level Self-Monitoring of COVID-19." Electronics. 12 (8), pp. 1-24. https://doi.org/10.3390/electronics12081912
Topic Integrated Opinion-Based Drug Recommendation With Transformers
Job, Simi, Tao, Xiaohui, Li, Y., Li, Lin and Yong, Jianming. 2023. "Topic Integrated Opinion-Based Drug Recommendation With Transformers ." IEEE Transactions on Emerging Topics in Computational Intelligence. 7 (6), pp. 1676-1686. https://doi.org/10.1109/TETCI.2023.3246559
Remote patient monitoring using artificial intelligence: Current state, applications, and challenges
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Li, Li, Gururajan, Raj, Zhou, Xujuan and Acharya, U. Rajendra. 2023. "Remote patient monitoring using artificial intelligence: Current state, applications, and challenges." WIREs Data Mining and Knowledge Discovery. 13 (2). https://doi.org/10.1002/widm.1485
Trio-based collaborative multi-view graph clustering with multiple constraints
Wang, Ru, Li, Lin, Tao, Xiaohui, Dong, Xiao, Wang, Peipei and Liu, Peiyu. 2021. "Trio-based collaborative multi-view graph clustering with multiple constraints." Information Processing and Management. 58 (3), pp. 1-13. https://doi.org/10.1016/j.ipm.2020.102466
Multimodality Information Fusion for Automated Machine Translation
Li, Lin, Tayir, Turghun, Han, Yifeng, Tao, Xiaohui and Velasquez, Juan D.. 2023. "Multimodality Information Fusion for Automated Machine Translation." Information Fusion. 91, pp. 352-363. https://doi.org/10.1016/j.inffus.2022.10.018
Towards the Quantitative Interpretability Analysis of Citizens Happiness Prediction
Li, Lin, Wu, Xiaohua, Kong, Miao, Zhou, Dong and Tao, Xiaohui. 2022. "Towards the Quantitative Interpretability Analysis of Citizens Happiness Prediction." Raedt, Luc De (ed.) 31st International Joint Conference on Artificial Intelligence (IJCAI-ECAI 2022): Special Track on AI for Good. Vienna, Austria 23 - 29 Jul 2022 Austria.
AI enabled RPM for Mental Health Facility
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Xie, Haoran, Gururajan, Raj and Zhou, Xujuan. 2022. "AI enabled RPM for Mental Health Facility." 1st ACM Workshop on Mobile and Wireless Sensing for Smart Healthcare (WMSSH 2022). Sydney, Australia 21 Oct 2022 New York, United States. https://doi.org/10.1145/3556551.3561191
Identifying informative tweets during a pandemic via a topic‑aware neural language model
Gao, Wang, Li, Lin, Tao, Xiaohui, Zhou, Jing and Tao, Jun. 2023. "Identifying informative tweets during a pandemic via a topic‑aware neural language model." World Wide Web. 26 (1), pp. 55-70. https://doi.org/10.1007/s11280-022-01034-1
Multi-source information fusion for smart health with artificial intelligence
Tao, Xiaohui and Velasquez, Juan D.. 2022. "Multi-source information fusion for smart health with artificial intelligence." Information Fusion. 83-84, pp. 93-95. https://doi.org/10.1016/j.inffus.2022.03.010
A Review of the Trends and Challenges in Adopting Natural Language Processing Methods for Education Feedback Analysis
Shaik, Thanveer, Tao, Xiaohui, Li, Yan, Dann, Christopher, McDonald, Jacquie, Redmond, Petrea and Galligan, Linda. 2022. "A Review of the Trends and Challenges in Adopting Natural Language Processing Methods for Education Feedback Analysis." IEEE Access. 10, pp. 56720-56739. https://doi.org/10.1109/ACCESS.2022.3177752
Internet penetration and airline pricing: Evidence from China
Huang, Zhibin, Yong, Jianming, Ma, Wenliang, Chen, Mengying, Xiong, Zihan and Shrestha, Anup. 2022. "Internet penetration and airline pricing: Evidence from China." Transport Policy. 123, pp. 104-111. https://doi.org/10.1016/j.tranpol.2022.04.017
FedStack: Personalized Activity Monitoring using Stacked Federated Learning
Shaik, Thanveer, Tao, Xiaohui, Higgins, Niall, Gururajan, Raj, Li, Yuefeng, Zhou, Xujuan and Acharya, U Rajendra. 2022. "FedStack: Personalized Activity Monitoring using Stacked Federated Learning." Knowledge-Based Systems. 257, pp. 1-14. https://doi.org/10.1016/j.knosys.2022.109929
Adaptive Fault Resolution for Database Replication Systems
Wee, Chee Keong, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui and Wee, Nathan. 2022. "Adaptive Fault Resolution for Database Replication Systems." Li, Bohan, Yue, Lin, Jiang, Jing, Chen, Weitong, Li, Xue, Long, Guodong, Fang, Fei and Yu, Han (ed.) 17th International Conference on Advanced Data Mining and Applications (ADMA 2021). Sydney, Australia 02 - 04 Feb 2022 Berlin. Springer. https://doi.org/10.1007/978-3-030-95405-5_26
Data Analytics on Online Student Engagement Data for Academic Performance Modeling
Tao, Xiaohui, Shannon-Honson, Aaron, Delaney, Patrick, Li, Lin, Dann, Christopher, Li, Yan and Xie, Haoran. 2022. "Data Analytics on Online Student Engagement Data for Academic Performance Modeling." IEEE Access. 10, pp. 103176-103186. https://doi.org/10.1109/ACCESS.2022.3208953
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
Deep boundary‑aware clustering by jointly optimizing unsupervised representation learning
Wang, Ru, Li, Lin, Wang, Peipei, Tao, Xiaohui and Liu, Peiyu. 2022. "Deep boundary‑aware clustering by jointly optimizing unsupervised representation learning." Multimedia Tools and Applications. 81 (24), p. 34309–34324. https://doi.org/10.1007/s11042-021-11597-2
A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security
Btoush, Eyad, Zhou, Xujuan, Gururajan, Raj, Chan, KC and Tao, XiaoHui. 2021. "A Survey on Credit Card Fraud Detection Techniques in Banking Industry for Cyber Security." 8th IEEE International Conference on Behavioural and Social Computing (BESC 2021). Doha, Qatar 29 - 31 Oct 2021 Doha, Qatar. https://doi.org/10.1109/BESC53957.2021.9635559
Detecting depression using an ensemble classifier based on Quality of Life scales
Tao, Xiaohui, Chi, Oliver, Delaney, Patrick J., Li, Lin and Huang, Jiajin. 2021. "Detecting depression using an ensemble classifier based on Quality of Life scales." Brain Informatics. 8, pp. 1-15. https://doi.org/10.1186/s40708-021-00125-5
EmoChannelAttn: Exploring Emotional Construction Towards Multi-Class Emotion Classification
Li, Zongxi, Chen, Xinhong, Xie, Haoran, Li, Qing and Tao, Xiaohui. 2021. "EmoChannelAttn: Exploring Emotional Construction Towards Multi-Class Emotion Classification." He, Jing, Purohit, Hemant, Huang, Guangyan, Gao, Xiaoying and Deng, Ke (ed.) 2020 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2020). Melbourne, Australia 14 - 17 Dec 2020 Massachusetts, United States. https://doi.org/10.1109/WIIAT50758.2020.00036
Feature-aware unsupervised learning with joint variational attention and automatic clustering
Wang, Ru, Li, Lin, Wang, Peipei, Tao, Xiaohui and Liu, Peiyu. 2021. "Feature-aware unsupervised learning with joint variational attention and automatic clustering." 25th International Conference on Pattern Recognition (ICPR 2020). Milan, Italy 10 - 15 Jan 2021 United States. https://doi.org/10.1109/ICPR48806.2021.9412522
Learning Cooperative Max-Pressure Control by Leveraging Downstream Intersections Information for Traffic Signal Control
Peng, Yuquan, Li, Lin, Xie, Qing and Tao, Xiaohui. 2021. "Learning Cooperative Max-Pressure Control by Leveraging Downstream Intersections Information for Traffic Signal Control." U, Leong Hou, Spaniol, Marc, Sakurai, Yasushi and Chen, Junying (ed.) 5th International Joint Conference on Asia-Pacific Web and Web-Age Information Management, Part II (APWeb-WAIM 2021). Guangzhou, China 23 - 25 Aug 2021 Switzerland. Springer. https://doi.org/10.1007/978-3-030-85899-5_29
Context-aware Adaptive Outlier Detection in Trajectory Data
Danda, Srinivas, Zhang, Ji, Tao, Xiaohui, Chun-Wei, Jerry and Zhang, Wenbin. 2020. "Context-aware Adaptive Outlier Detection in Trajectory Data." Wu, Xintao, Jermaine, Chris, Xiong, Li, Hu, Xiaohua, Kotevska, Olivera, Lu, Siyuan, Xu, Weija, Aluru, Srinivas, Zhai, Chengxiang, Al-Masri, Eyhab, Chen, Zhiyuan and Saltz, Jeff (ed.) 8th IEEE International Conference on Big Data (2020). Atlanta, United States 10 - 13 Dec 2020 United States. https://doi.org/10.1109/BigData50022.2020.9378046
Exploring the Brain Information Processing Mechanisms from Functional Connectivity to Translational Applications
Kuai, Hongzhi, Chen, Jianhui, Tao, Xiaohui, Imamura, Kazuyuki, Liang, Peipeng and Zhong, Ning. 2021. "Exploring the Brain Information Processing Mechanisms from Functional Connectivity to Translational Applications." Mahmud, Mufti, Kaiser, M. Shamim, Vassanelli, Stefano, Dai, Qionghai and Zhong, Ning (ed.) 14th International Conference on Brain Informatics (BI 2021). Online Cham, Switzerland. https://doi.org/10.1007/978-3-030-86993-9_10
What is Next when Sequential Prediction Meets Implicitly Hard Interaction?
Hu, Kaixi, Li, Lin, Xie, Qing, Liu, Jianquan and Tao, Xiaohui. 2021. "What is Next when Sequential Prediction Meets Implicitly Hard Interaction?" 30th ACM International Conference on Information and Knowledge Management (CIKM 2021). Queensland, Australia 01 - 05 Nov 2021 New York, United States. https://doi.org/10.1145/3459637.3482492
Event Detection in Social Media via Graph Neural Network
Gao, Wang, Fang, Yuan, Li, Lin and Tao, Xiaohui. 2021. "Event Detection in Social Media via Graph Neural Network." Zhang, Wenjie, Zou, Lei, Maamar, Zakaria and Chen, Lu (ed.) 22nd International Conference on Web Information Systems Engineering, Part I (WISE 2021). Melbourne, Australia 26 - 29 Oct 2021 Switzerland. Springer. https://doi.org/10.1007/978-3-030-90888-1_28
Contrastive and attentive graph learning for multi-view clustering
Wang, Ru, Li, Lin, Tao, Xiaohui, Wang, Peipei and Liu, Peiyu. 2022. "Contrastive and attentive graph learning for multi-view clustering." Information Processing and Management. 59 (4), pp. 1-14. https://doi.org/10.1016/j.ipm.2022.102967
Web Intelligence meets Brain Informatics: Towards the future of artificial intelligence in the connected world
Kuai, Hongzhi, Tao, Xiaohui and Zhong, Ning. 2022. "Web Intelligence meets Brain Informatics: Towards the future of artificial intelligence in the connected world." World Wide Web. 25, pp. 1223-1241. https://doi.org/10.1007/s11280-022-01030-5
Sentiment Analysis of Chinese E-commerce Reviews Based on BERT
Xie, Song, Cao, Jingjing, Wu, Zhou, Liu, Kai, Tao, Xiaohui and Xie, Haoran. 2021. "Sentiment Analysis of Chinese E-commerce Reviews Based on BERT." 18th IEEE International Conference on Industrial Informatics (INDIN 2020). Warwick, United Kingdom 21 - 23 Jul 2020 Piscataway, United States. https://doi.org/10.1109/INDIN45582.2020.9442190
A Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting
Li, Zhaoyang, Li, Lin, Peng, Yuquan and Tao, Xiaohui. 2020. "A Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting." Alamaniotis, Miltos and Pan, Shimei (ed.) 32nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2020). Baltimore, United States 09 - 11 Nov 2020 Piscataway, United States. https://doi.org/10.1109/ICTAI50040.2020.00063
Machine and cognitive intelligence for human health: systematic review
Chen, Xieling, Cheng, Gary, Wang, Fu Lee, Tao, Xiaohui, Xie, Haoran and Xu, Lingling. 2022. "Machine and cognitive intelligence for human health: systematic review." Brain Informatics. 9 (1), pp. 1-20. https://doi.org/10.1186/s40708-022-00153-9
Towards a user-level self-management of COVID-19 using mobile devices supported by Artificial Intelligence, 5G and the Cloud
Ahmed, Sajjad, Shrestha, Anup and Yong, Jianming. 2021. "Towards a user-level self-management of COVID-19 using mobile devices supported by Artificial Intelligence, 5G and the Cloud." Siuly, Siuly, Wang, Hua, Chen, Lu, Guo, Yanhui and Xing, Chunxiao (ed.) 10th International Conference on Health Information Science (HIS 2021). Melbourne, Australia 25 - 28 Oct 2021 Switzerland. https://doi.org/10.1007/978-3-030-90885-0_4
A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean
Li, Lin, Long, Sijie, Bi, Jiaxiu, Wang, Guowei, Zhang, Jiawei and Tao, Xiaohui. 2021. "A federated learning based semi-supervised credit prediction approach enhanced by multi-layer label mean." Web Intelligence. 19 (4), pp. 329-342. https://doi.org/10.3233/WEB-210476
A novel genetic algorithm based system for the scheduling of medical treatments
Squires, Matthew, Tao, Xiaohui, Elangovan, Soman, Gururajan, Raj, Zhou, Xujuan and Acharya, Udyavara Rajendra. 2022. "A novel genetic algorithm based system for the scheduling of medical treatments." Expert Systems with Applications. 195, pp. 1-12. https://doi.org/10.1016/j.eswa.2021.116464
EmoChannel-SA: exploring emotional dependency towards classification task with self-attention mechanism
Li, Zongxi, Chen, Xinhong, Xie, Haoran, Li, Qing, Tao, Xiaohui and Cheng, Gary. 2021. "EmoChannel-SA: exploring emotional dependency towards classification task with self-attention mechanism." World Wide Web. 24 (6), pp. 2049-2070. https://doi.org/10.1007/s11280-021-00957-5
An Empirical Study of Learning Based Happiness Prediction Approaches
Kong, Miao, Li, Lin, Wu, Renwei and Tao, Xiaohui. 2021. "An Empirical Study of Learning Based Happiness Prediction Approaches." Human-centric Computing and Information Sciences. 1 (1-2), pp. 18-24. https://doi.org/10.2991/hcis.k.210622.001
Semantic Knowledge Discovery for User Profiling for Location-Based Recommender Systems
Tao, Xiaohui, Sharma, Nischal, Delaney, Patrick and Hu, Aimin. 2021. "Semantic Knowledge Discovery for User Profiling for Location-Based Recommender Systems." Human-centric Computing and Information Sciences. 1 (1-2), pp. 32-42. https://doi.org/10.2991/hcis.k.210704.001
Distant Supervision for E-commerce Query Segmentation via Attention Network
Li, Zhao, Ding, Donghui, Zou, Pengcheng, Gong, Yu, Chen, Xi, Zhang, Ji, Gao, Jianliang, Wu, Youxi and Duan, Yucong. 2022. "Distant Supervision for E-commerce Query Segmentation via Attention Network." Gao, Honghao, Kim, Jung Yoon, Hussain, Walayat, Iqbal, Muddesar and Duan, Yucong (ed.) Intelligent Processing Practices and Tools for E-Commerce Data, Information, and Knowledge. Switzerland . Springer. pp. 3-19
A Deep Learning Framework for Removing Bias from Single-Photon Emission Computerized Tomography
Ying, Josh Jia-Ching, Yang, Wan-Ju, Zhang, Ji, Ni, Yu-Ching, Lin, Chia-Yu, Tseng, Fan-Pin and Tao, Xiaohui. 2022. "A Deep Learning Framework for Removing Bias from Single-Photon Emission Computerized Tomography." 18th International Conference on Advanced Data Mining and Applications (ADMA 2022). Brisbane, Australia 28 - 30 Nov 2022 Switzerland. https://doi.org/10.1007/978-3-031-22064-7_21
Enhanced Simple Question Answering with Contrastive Learning
Wang, Xin, Yang, Lan, He, Honglian, Fang, Yu, Zhan, Huayi and Zhang, Ji. 2022. "Enhanced Simple Question Answering with Contrastive Learning." 15th International Conference on Knowledge Science, Engineering and Management (KSEM 2022). Singapore 06 - 08 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-10983-6_39
Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements
Veena, P., Sreepada, Tarun, Kiran, R. Uday, Dao, Minh-Son, Zettsu, Koji, Watanobe, Yutaka and Zhang, Ji. 2022. "Towards Efficient Discovery of Periodic-Frequent Patterns in Dense Temporal Databases Using Complements." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-12426-6_16
Educational Decision Support System Adopting Sentiment Analysis on Student Feedback
Shaik, Thanveer, Tao, Xiaohui, Dann, Chris, Quadrelli, Carol, Li, Yan and O’Neill, Shirley. 2022. "Educational Decision Support System Adopting Sentiment Analysis on Student Feedback." 2022 IEEE/WIC/ACM International Joint Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT). Niagara Falls, Canada 17 - 20 Nov 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/WI-IAT55865.2022.00062
Effective and Robust Boundary-Based Outlier Detection Using Generative Adversarial Networks
Liang, Qiliang, Zhang, Ji, Bah, Mohamed Jaward, Li, Hongzhou, Chang, Liang and Kiran, Rage Uday. 2022. "Effective and Robust Boundary-Based Outlier Detection Using Generative Adversarial Networks." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland. Springer. https://doi.org/10.1007/978-3-031-12426-6_14
Logit Perturbation
Li, Mengyang, Su, Fengguang, Wu, Ou and Zhang, Ji. 2022. "Logit Perturbation." 36th AAAI Conference on Artificial Intelligence (AAAI 2022). 22 Feb - 01 Mar 2022 United Sates. https://doi.org/10.1609/aaai.v36i2.20024
Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention
Jia, Xiangze, Zhang, Ji, Wang, Zhen, Luo, Yonglong, Chen, Fulong and Yang, Gaoming. 2022. "Skeleton-Based Mutual Action Recognition Using Interactive Skeleton Graph and Joint Attention." 33rd International Conference on Database and Expert Systems Applications (DEXA 2022). Vienna, Austria 22 - 24 Aug 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-12426-6_9
JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning
Jia, Xiangze, Zhang, Ji, Wang, Zhen, Luo, Yonglong, Chen, Fulong and Xiao, Jing. 2022. "JointContrast: Skeleton-Based Mutual Action Recognition with Contrastive Learning." 19th Pacific Rim International Conference on Artificial Intelligence (PRICAI 2022). Shanghai, China 10 - 13 Nov 2022 Switzerland . Springer. https://doi.org/10.1007/978-3-031-20868-3_35
Automated Knowledge Graph Construction for Healthcare Domain
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva. 2022. "Automated Knowledge Graph Construction for Healthcare Domain." 11th International Conference on Health Information Science (HIS 2022). Biarritz, France 28 - 30 Oct 2022 Switzerland . https://doi.org/10.1007/978-3-031-20627-6_24
TAGCN: Typed Attention Graph Convolutional Networks for Entity Alignment in Cross-lingual Knowledge Graphs
Gao, Jianliang, Li, Zhao, Xiong, Fan, Liu, Xiangyue, Xiao, Jie, Wang, Biao and Zhang, Ji. 2022. "TAGCN: Typed Attention Graph Convolutional Networks for Entity Alignment in Cross-lingual Knowledge Graphs." 2021 IEEE 23rd International Conference on High Performance Computing and Communications (HPCC). Hainan, China 20 - 22 Dec 2021 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00306
A Secured Movie Recommendation System using Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2022. "A Secured Movie Recommendation System using Decentralized Blockchain Network." 9th International Conference on Behavior, Economic and Social Computing (BESC 2022). Matsuyama, Japan 29 202 - 31 Oct 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BESC57393.2022.9995357
An efficient storage system towards high throughput of concurrent graph processing jobs
Zhao, Jin, Jiang, Xinyu, Zhang, Yu, Zhu, Xiaofei, Jin, Hai, Liu, Haikun, Yang, Yun, Zhang, Ji, Wang, Biao and Yu, Ting. 2022. "An efficient storage system towards high throughput of concurrent graph processing jobs." Scientia Sinica Informationis. 52 (1), pp. 111-128.
Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation
Zhang, Kexin, Li, Lingling, Di, Jinhong, Wang, Yi, Zhao, Xuezhuan and Zhang, Ji. 2022. "Multiple Graph Adaptive Regularized Semi-Supervised Nonnegative Matrix Factorization with Sparse Constraint for Data Representation." Processes. 10 (12). https://doi.org/10.3390/pr10122623
Learning discriminative representation with global and fine-grained features for cross-view gait recognition
Xiao, Jing, Yang, Huan, Xie, Kun, Zhu, Jia and Zhang, Ji. 2022. "Learning discriminative representation with global and fine-grained features for cross-view gait recognition." CAAI Transactions on Intelligence Technology. 7 (2), pp. 187-199. https://doi.org/10.1049/cit2.12051
OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining
Wu, Youxi, Wang, Xiaohui, Li, Yan, Guo, Lei, Li, Zhao, Zhang, Ji and Wu, Xindong. 2022. "OWSP-Miner: Self-adaptive One-off Weak-gap Strong Pattern Mining." ACM Transactions on Management Information Systems. 13 (3), pp. 1-23. https://doi.org/10.1145/3476247
Deep Multi-Branch Aggregation Network for Real-Time Semantic Segmentation in Street Scenes
Weng, Xi, Yan, Yan, Dong, Genshun, Shu, Chang, Wang, Biao, Wang, Hanzi and Zhang, Ji. 2022. "Deep Multi-Branch Aggregation Network for Real-Time Semantic Segmentation in Street Scenes." IEEE Transactions on Intelligent Transportation Systems. 23 (10), pp. 17224-17240. https://doi.org/10.1109/TITS.2022.3150350
Message from the program chairs: CBD 2022
Tao, Xiaohui, Zhang, Shichao, Xie, Xiaolan and Dong, Fang. 2022. "Message from the program chairs: CBD 2022 ." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 Guilin, China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00006
Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest
Shao, Ming-Min, Jiang, Wen-Jun, Wu, Jie, Shi, Yu-Qing, Yum, TakShing and Zhang, Ji. 2022. "Improving Friend Recommendation for Online Learning with Fine-Grained Evolving Interest." Journal of Computer Science and Technology. 37 (6), pp. 1444-1463. https://doi.org/10.1007/s11390-021-2124-z
Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network
Pang, Yan, Shan, Ai, Wang, Zhen, Wang, Mengyu, Lin, Jianwei, Zhang, Ji, Huang, Teng and Liu, Chao. 2022. "Sparse-Dyn: Sparse dynamic graph multirepresentation learning via event-based sparse temporal attention network." International Journal of Intelligent Systems. 37 (11), pp. 8770-8789. https://doi.org/10.1002/int.22967
Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification
Pang, Yan, Huang, Teng, Wang, Zhen, Lin, Jianwei, Hosseini, Poorya, Zhang, Ji, Liu, Chao and Ai, Shan. 2022. "Graph Decipher: A transparent dual-attention graph neural network to understand the message-passing mechanism for the node classification ." International Journal of Intelligent Systems. 37 (11), pp. 8747-8769. https://doi.org/10.1002/int.22966
Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting
Li, Zhaoyang, Li, Lin and Tao, Xiaohui. 2022. "Two-Stream Graph Convolutional Neural Network for Dynamic Traffic Flow Forecasting." Journal of Frontiers of Computer Science and Technology. 16 (2), pp. 384-394. https://doi.org/10.3778/j.issn.1673-9418.2009097
An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection
Li, Jiamu, Zhang, Ji, Bah, Mohamed Jaward, Wang, Jian, Zhu, Youwen, Yang, Gaoming, Li, Lingling and Zhang, Kexin. 2022. "An Auto-Encoder with Genetic Algorithm for High Dimensional Data: Towards Accurate and Interpretable Outlier Detection." Algorithms. 15 (11). https://doi.org/10.3390/a15110429
Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks
Kong, Lingjun, Chen, Bing, Hu, Feng and Zhang, Ji. 2022. "Lightweight Mutual Authentication Scheme Enabled by Stateless Blockchain for UAV Networks." Security and Communication Networks. 2022. https://doi.org/10.1155/2022/2330052
A Survey on Contact Tracing: The Latest Advancements and Challenges
Jiang, Ting, Zhang, Yang Zhang, Zhang, Minhao, Yu, Ting, Chen, Yizheng, Lu, Chenhao, Zhang, Ji, Li, Zhao, Gao, Jun and Zhou, Shuigeng. 2022. "A Survey on Contact Tracing: The Latest Advancements and Challenges." ACM Transactions on Spatial Algorithms and Systems. 8 (2), pp. 1-35. https://doi.org/10.1145/3494529
Message from the Program Chair
Zhang, Ji. 2022. "Message from the Program Chair." 2022 7th International Conference on Cyber Security and Information Engineering (ICCSIE). Brisbane, Australia 23 - 25 Sep 2022 Brisbane, Australia. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/ICCSIE56462.2022.00006
Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention
Hou, Linlin, Zhang, Ji, Wu, Ou, Yu, Ting, Wang, Zhen, Li, Zhao, Gao, Jianliang, Ye, Yingchun and Yao, Rujing. 2022. "Method and dataset entity mining in scientific literature: A CNN + BiLSTM model with self-attention." Knowledge-Based Systems. 235. https://doi.org/10.1016/j.knosys.2021.107621
Event Detection from Web Data in Chinese Based on Bi-LSTM with Attention
Wu, Yuxin, Xu, Zenghui, Li, Hongzhou, Gan, Yuquan, Ying, Josh Jia-Ching, Yu, Ting and Zhang, Ji. 2022. "Event Detection from Web Data in Chinese Based on Bi-LSTM with Attention." 18th International Conference on Advanced Data Mining and Applications (ADMA 2022). Brisbane, Australia 28 - 30 Nov 2022 Switzerland. https://doi.org/10.1007/978-3-031-22064-7_8
Detecting relational states in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan, Zhu, Xiaodong, Li, Hongzhou and Chang, Liang. 2018. "Detecting relational states in online social networks." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697237
On link stability detection for online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Lin, Jerry Chun-Wei, Li, Hongzhou and Chang, Liang. 2018. "On link stability detection for online social networks." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-319-98809-2_20
Learning relational fractals for deep knowledge graph embedding in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Wang, Dianwei, Ying, Josh Jia-Ching and Wang, Xin. 2019. "Learning relational fractals for deep knowledge graph embedding in online social networks." Cheng, Reynold, mamoulis, Nikos, Sun, Yizhou and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. Springer. https://doi.org/10.1007/978-3-030-34223-4_42
Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions
Munawar, Hafiz Suliman, Zhang, Ji, Li, Hongzhou, Mo, Deqing and Chang, Liang. 2019. "Mining multispectral aerial images for automatic detection of strategic bridge locations for disaster relief missions." Leong, Hou U. and Lauw, Hady W. (ed.) 8th Workshop on Biologically-Inspired Techniques for Knowledge Discovery and Data Mining (BDM 2019), held in conjunction with the 23rd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2019). Macau, China 14 - 17 Apr 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-26142-9_17
A metaheuristic algorithm for hiding sensitive itemsets
Lin, Jerry Chun-Wei, Zhang, Yuyu, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "A metaheuristic algorithm for hiding sensitive itemsets." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_45
Twitter analysis for depression on social networks based on sentiment and stress
Tao, Xiaohui, Dharmalingam, Ravi, Zhang, Ji, Zhou, Xujuan, Li, Lin and Gururajan, Raj. 2019. "Twitter analysis for depression on social networks based on sentiment and stress." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963550
Personalised drug prescription for dental clinics using word embedding
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Oh, Xue Ling and Goh, Elizabeth Zhixin. 2020. "Personalised drug prescription for dental clinics using word embedding." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_5
MeKG: building a medical knowledge graph by data mining from MEDLINE
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhou, Xujuan and Gururajan, Raj. 2019. "MeKG: building a medical knowledge graph by data mining from MEDLINE." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_16
A Case Study of Predicting Banking Customers Behaviour by Using Data Mining
Zhou, Xujuan, Bargshady, Ghazal, Abdar, Moloud, Tao, Xiaohui, Gururajan, Raj and Chan, K. C.. 2019. "A Case Study of Predicting Banking Customers Behaviour by Using Data Mining." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 United States. https://doi.org/10.1109/BESC48373.2019.8963436
An efficient and secure itinerary-based data aggregation algorithm for WSNs
Wang, Taochun, Zhang, Ji, Luo, Yonglong, Zuo, Kaizhong and Ding, Xintao. 2017. "An efficient and secure itinerary-based data aggregation algorithm for WSNs." 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-17). Sydney, Australia 01 - 04 Aug 2017 United States. https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.268
A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Lin, Jerry Chun-Wei, Chen, Fulong, Luo, Yonglong and Zheng, Xiaoyao. 2018. "A recommender system with advanced time series medical data analysis for diabetes patients in a telehealth environment." Hartmann, Sven, Ma, Hui, Hameurlain, Abdelkader, Pernul, Gunther and Wagner, Roland R. (ed.) 29th International Conference on Database and Expert Systems Applications (DEXA 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-319-98812-2_15
A genetic algorithm based technique for outlier detection with fast convergence
Zhu, Xiaodong, Zhang, Ji, Hu, Zewen, Li, Hongzhou, Chang, Liang, Zhu, Youwen, Lin, Jerry Chun-Wei and Qin, Yongrui. 2018. "A genetic algorithm based technique for outlier detection with fast convergence." Gan, Guojun, Li, Bohan, Li, Xue and Wang, Shuliang (ed.) 14th International Conference on Advanced Data Mining and Applications (ADMA 2018). Nanjing, China 16 - 18 Nov 2018 Switzerland. Springer. https://doi.org/10.1007/978-3-030-05090-0_8
Mining heterogeneous information graph for health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Cai, Yi. 2018. "Mining heterogeneous information graph for health status classification." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697292
Exploring the use of a network model in drug prescription support for dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Qin, Yongrui, Goh, Elizabeth Zhixin and Hu, Aimin. 2018. "Exploring the use of a network model in drug prescription support for dental clinics." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Piscataway, NJ, United States. https://doi.org/10.1109/BESC.2018.00042
Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure
Mahalle, Abhishek, Yong, Jianming, Tao, Xiaohui and Shen, Jun. 2018. "Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465318
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Data Fusion for MaaS: Opportunities and Challenges
Wu, Jianqing, Zhou, Luping, Cai, Chen, Shen, Jun, Lau, Sim Kim and Yong, Jianming. 2018. "Data Fusion for MaaS: Opportunities and Challenges." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465224
Challenges and issues that are perceived to influence cloud computing adoption in local government councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2017. "Challenges and issues that are perceived to influence cloud computing adoption in local government councils." 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD 2017). Wellington, New Zealand 26 - 28 Apr 2017 https://doi.org/10.1109/CSCWD.2017.8066659
Hierarchical neural topic modeling with manifold regularization
Chen, Ziye, Ding, Cheng, Rao, Yanghui, Xie, Haoran, Tao, Xiaohui, Cheng, Gary and Wang, Fu Lee. 2021. "Hierarchical neural topic modeling with manifold regularization." World Wide Web. 24 (6), pp. 2139-2160. https://doi.org/10.1007/s11280-021-00963-7
Graph-based multi-label disease prediction model learning from medical data and domain knowledge
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Li, Yuefeng and Xie, Haoran. 2022. "Graph-based multi-label disease prediction model learning from medical data and domain knowledge." Knowledge-Based Systems. 235, pp. 1-15. https://doi.org/10.1016/j.knosys.2021.107662
Mobile-based learning of drug prescription for medical education using artificial intelligence techniques
Tao, Xiaohui, Goh, Wee Pheng, Zhang, Ji, Yong, Jianming, Goh, Elizabeth Zhixin and Oh, Xueling. 2021. "Mobile-based learning of drug prescription for medical education using artificial intelligence techniques." International Journal of Mobile Learning and Organisation. 15 (4), pp. 392-408. https://doi.org/10.1504/IJMLO.2021.118436
IT investment governance and corporate governance: perspective and approach
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "IT investment governance and corporate governance: perspective and approach." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 Piscataway, NJ, United States. https://doi.org/10.1109/BESC51023.2020.9348312
Using Machine Learning to Automate Mammogram Images Analysis
Tang, Xuejiao, Zhang, Liuhua, Zhang, Wenbin, Huang, Xin, Iosifidis, Vasileios, Liu, Zhen, Zhang, Mingli, Messina, Enza and Zhang, Ji. 2021. "Using Machine Learning to Automate Mammogram Images Analysis." Park, Taesung, Cho, Young-Rae, Hu, Xiaohua, Yoo, Illhoi, Woo, Hyun Goo, Wang, Jianxin, Facelli, Julio and Nam, Seungyoon (ed.) 2020 International Conference on Bioinformatics and Biomedicine (BIBM'20). Seoul, South Korea 16 - 19 Dec 2020 Piscataway, United States. https://doi.org/10.1109/BIBM49941.2020.9313247
Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437798
Regulatory challenges and mitigation for account services offered by FinTech
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Regulatory challenges and mitigation for account services offered by FinTech." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437631
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010
Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9
Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks
Ghimire, Sujan, Yaseen, Zaher Mundher, Farooque, Aitazaz A., Deo, Ravinesh C., Zhang, Ji and Tao, Xiaohui. 2021. "Streamflow prediction using an integrated methodology based on convolutional neural network and long short‑term memory networks." Scientific Reports. 11, pp. 1-26. https://doi.org/10.1038/s41598-021-96751-4
Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities
Tao, Xiaohui, Shaik, Thanveer Basha, Higgins, Niall, Gururajan, Raj and Zhou, Xujuan. 2021. "Remote Patient Monitoring Using Radio Frequency Identification (RFID) Technology and Machine Learning for Early Detection of Suicidal Behaviour in Mental Health Facilities." Sensors. 21 (3), pp. 1-20. https://doi.org/10.3390/s21030776
Charge prediction modeling with interpretation enhancement driven by double-layer criminal system
Li, Lin, Zhao, Lingyun, Nai, Peiran and Tao, Xiaohui. 2022. "Charge prediction modeling with interpretation enhancement driven by double-layer criminal system." World Wide Web. 25 (1), pp. 381-400. https://doi.org/10.1007/s11280-021-00873-8
BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management
Zhang, Guipeng, Xie, Haoran, Yang, Zhenguo, Tao, Xiaohui and Liu, Wenyin. 2022. "BDKM: A Blockchain‑Based Secure Deduplication Scheme with Reliable Key Management." Neural Processing Letters. 54, pp. 2657-2674. https://doi.org/10.1007/s11063-021-10450-9
A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Zhou, Xujuan, Li, Lin and Cai, Yi. 2021. "A survey of privacy solutions using blockchain for recommender systems: current status, classification and open issues." The Computer Journal. 64 (7), pp. 1104-1129. https://doi.org/10.1093/comjnl/bxab065
Using back-and-forth translation to create artificial augmented textual data for sentiment analysis models
Body, Thomas, Tao, Xiaohui, Li, Yuefeng, Li, Lin and Zhong, Ning. 2021. "Using back-and-forth translation to create artificial augmented textual data for sentiment analysis models." Expert Systems with Applications. 178, pp. 1-12. https://doi.org/10.1016/j.eswa.2021.115033
Extending Graph Pattern Matching with Regular Expressions
Wang, Xin, Wang, Yang, Xu, Yang, Zhang, Ji and Zhong, Xueyan. 2020. "Extending Graph Pattern Matching with Regular Expressions." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59051-2_8
Bounded Pattern Matching Using Views
Wang, Xin, Wang, Yang, Zhang, Ji and Zhu, Yan. 2020. "Bounded Pattern Matching Using Views." Hartmann, Sven, Kung, Josef, Kotsis, Gabriele, Tjoa, A Min and Khalil, Ismail (ed.) 31st International Conference on Database and Expert Systems Applications (DEXA 2020). Bratislava, Slovakia 14 - 17 Sep 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-59003-1_19
Predicting Workplace Injuries Using Machine Learning Algorithms
Sukumar, Divya, Zhang, Ji, Tao, Xiaohui, Wang, Xin and Zhang, Wenbin. 2020. "Predicting Workplace Injuries Using Machine Learning Algorithms." Webb, Geoff, Zhang, Zhongfei, Tseng, Vincent S., Williams, Graham, Vlachos, Michalis and Cao, Longbing (ed.) 7th IEEE International Conference on Data Science and Advanced Analytics (DSAA 2020). Sydney, Australia 06 - 09 Oct 2020 Piscataway, United States. https://doi.org/10.1109/DSAA49011.2020.00104
Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams
Zhang, Wenbin, Zhang, Mingli, Zhang, Ji, Liu, Zhen, Chen, Zhiyuan, Wang, Jianwu, Raff, Edward and Messina, Enza. 2020. "Flexible and Adaptive Fairness-aware Learning in Non-stationary Data Streams." Alamaniotis, Miltos and Pan, Shimei (ed.) 32nd IEEE International Conference on Tools with Artificial Intelligence (ICTAI 2020). Baltimore, United States 09 - 11 Nov 2020 Piscataway, United States. https://doi.org/10.1109/ICTAI50040.2020.00069
Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science
Jahmunah, Vicnesh, Sudarshan, Vidya K., Oh, Shu Lih, Gururajan, Raj, Gururajan, Rashmi, Zhou, Xujuan, Tao, Xiaohui, Faust, Oliver, Ciaccio, Edward J., Ng, Kwan Hoong and Acharya, U. Rajendra. 2021. "Future IoT tools for COVID-19 contact tracing and prediction: A review of the state-of-the-science." International Journal of Imaging Systems and Technology. 31 (2), pp. 455-471. https://doi.org/10.1002/ima.22552
User authentication into electronic health record based on reliable lightweight algorithms
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2021. "User authentication into electronic health record based on reliable lightweight algorithms." Cruz-Cunha, Maria Manuela and Mateus-Coelho, Nuno Ricardo (ed.) Handbook of research on cyber crime and information privacy. United States. IGI Global. pp. 700-738
Locally differentially private distributed algorithms for set intersection and union [Letter]
Xue, Qiao, Zhu, Youwen, Wang, Jian, Li, Xingxin and Zhang, Ji. 2020. "Locally differentially private distributed algorithms for set intersection and union [Letter]." Science China Information Sciences. https://doi.org/10.1007/s11432-018-9899-8
Proof Learning in PVS with Utility Pattern Mining
Nawaz, M. Saqib, Fournier-Viger, Philippe and Zhang, Ji. 2020. "Proof Learning in PVS with Utility Pattern Mining." IEEE Access. 8, pp. 119806-119818. https://doi.org/10.1109/ACCESS.2020.3004199
Deep interest shifting network with meta embeddings for fresh item recommendation
Li, Zhao, Wang, Haobo, Ding, Donghui, Hu, Shichang, Zhang, Zhen, Liu, Weiwei, Gao, Jianliang, Zhang, Zhiqiang and Zhang, Ji. 2020. "Deep interest shifting network with meta embeddings for fresh item recommendation." Complexity. https://doi.org/10.1155/2020/8828087
Global research on artificial intelligence-enhanced human electroencephalogram analysis
Chen, Xieling, Tao, Xiaohui, Wang, Fu Lee and Xie, Haoran. 2022. "Global research on artificial intelligence-enhanced human electroencephalogram analysis." Neural Computing and Applications. 34 (14), pp. 11295-11333. https://doi.org/10.1007/s00521-020-05588-x
A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection
Zhou, Xujuan, Li, Yuefeng, Gururajan, Raj, Bargshady, Ghazal, Tao, Xiaohui, Venkataraman, Revathi, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A New Deep Convolutional Neural Network Model for Automated Breast Cancer Detection." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 United Kingdom. https://doi.org/10.1109/BESC51023.2020.9348322
A Densely Connected Encoder Stack Approach for Multi-type Legal Machine Reading Comprehension
Nai, Peiran, Li, Lin and Tao, Xiaohui. 2020. "A Densely Connected Encoder Stack Approach for Multi-type Legal Machine Reading Comprehension." Huang, Zhisheng, Beek, Wouter, Wang, Hua, Zhou, Rui and Zhang, Yanchun (ed.) 21st International Conference on Web Information Systems Engineering (WISE 2020). Amsterdam, The Netherlands 20 - 24 Oct 2020 Cham, Switzerland. https://doi.org/10.1007/978-3-030-62008-0_12
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2021. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018
Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004
Information Retrieval Technology: 15th Asia Information Retrieval Societies Conference, AIRS 2019, Hong Kong, November 7-9, 2019, Proceedings
Wang, Fu Lee, Xie, Haoran, Lam, Wai, Sun, Aixin, Ku, Lun-Wei, Hao, Tianyong, Chen, Wei, Wong, Tak-Lam and Tao, Xiaohui. 2020. Information Retrieval Technology: 15th Asia Information Retrieval Societies Conference, AIRS 2019, Hong Kong, November 7-9, 2019, Proceedings. Switzerland. Springer.
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
A preliminary study for the risk of probabilistic blockchain protocols
Sello, Buti, Tao, Xiaohui and Yong, Jianming. 2019. "A preliminary study for the risk of probabilistic blockchain protocols." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963205
An efficient chain structure to mine high-utility sequential patterns
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2019. "An efficient chain structure to mine high-utility sequential patterns." 19th IEEE International Conference on Data Mining Workshops (ICDMW 2019). Beijing, China 08 - 11 Nov 2019 https://doi.org/10.1109/ICDMW.2019.00146
Anesthesia assessment based on ICA permutation entropy analysis of two-channel EEG signals
Li, Tianning, Sivakumar, Prashanth and Tao, Xiaohui. 2019. "Anesthesia assessment based on ICA permutation entropy analysis of two-channel EEG signals." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_24
Identification of stress impact on personality density distributions
Lys, Brendan, Tao, Xiaohui, Machin, Tony, Zhang, Ji and Zhong, Ning. 2019. "Identification of stress impact on personality density distributions." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Cham, Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_26
Protecting privacy in digital era on cloud architecture for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Protecting privacy in digital era on cloud architecture for banking and financial services industry." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963459
Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791928
Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791906
SLIND: identifying stable links in online social networks
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Zheng, Xiaoyao, Luo, Yonglong and Lin, Jerry Chun-Wei. 2018. "SLIND: identifying stable links in online social networks." Pei, Jian, Sadiq, Shazia, Manolopoulos, Yannis and Li, Jianxin (ed.) 23rd International Conference on Database Systems for Advanced Applications (DASFAA 2018). Gold Coast, Australia 21 - 24 May 2018 Switzerland. https://doi.org/10.1007/978-3-319-91458-9_54
Anonymization of multiple and personalized sensitive attributes
Lin, Jerry Chun-Wei, Liu, Qiankun, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2018. "Anonymization of multiple and personalized sensitive attributes." Ordonez, Carlos and Bellatreche, Ladjel (ed.) 20th International Conference on Big Data Analytics and Knowledge Discovery (DaWaK 2018). Regensburg, Germany 03 - 06 Sep 2018 Cham, Switzerland. https://doi.org/10.1007/978-3-319-98539-8_16
ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2018. "ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.8697294
Welcome message BESC 2018
Wang, Leon S. L., Hong, Tzung-Pei, Xu, Guandong, Ting, I-Hsien and Tao, Xiaohui. 2018. "Welcome message BESC 2018." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.8697887
The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)
Zhou, Xiangmin, Zhang, Ji and Zhang, Yanchun. 2019. "The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)." 12th ACM International Conference on Web Search and Data Mining (WSDM 2019). Melbourne, Australia 11 - 15 Feb 2019 New York, United States. https://doi.org/10.1145/3289600.3291372
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
PPSF: an open-source privacy-preserving and security mining framework
Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Wu, Lintai, Gan, Wensheng, Djenouri, Youcef and Zhang, Ji. 2018. "PPSF: an open-source privacy-preserving and security mining framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 18th IEEE International Conference on Data Mining Workshops (ICDMW 2018). Singapore 17 - 20 Nov 2018 New York, United States. https://doi.org/10.1109/ICDMW.2018.00208
Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication
Vimalachandran, Pasupathy, Zhang, Yanchun, Cao, Jinli, Sun, Lili and Yong, Jianming. 2018. "Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication." 19th International Conference on Web Information Systems Engineering (WISE 2018). Dubai, United Arab Emirates 12 - 15 Nov 2018 Germany. Springer. https://doi.org/10.1007/978-3-030-02925-8_8
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
A survey on text classification and its applications
Zhou, Xujuan, Gururajan, Raj, Li, Yuefeng, Venkataraman, Revathi, Tao, Xiaohui, Bargshady, Ghazala, Barua, Prabal D. and Kondalsamy-Chennakesavan, Srinivas. 2020. "A survey on text classification and its applications." Web Intelligence. 18 (2), pp. 205-216. https://doi.org/10.3233/WEB-200442
Automated prediction of sepsis using temporal convolutional network
Kok, Christopher, Jahmunah, V., Oh, Shu Lih, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Cheong, Kang Hao, Gururajan, Rashmi, Molinari, Filippo and Acharya, U. Rajendra. 2020. "Automated prediction of sepsis using temporal convolutional network." Computers in Biology and Medicine. 127, pp. 1-10. https://doi.org/10.1016/j.compbiomed.2020.103957
A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104
A bibliometric and visual analysis of artificial intelligence technologies-enhanced brain MRI research
Chen, Xieling, Zhang, Xinxin, Xie, Haoran, Tao, Xiaohui, Wang, Fu Lee, Xie, Nengfu and Hao, Tianyong. 2021. "A bibliometric and visual analysis of artificial intelligence technologies-enhanced brain MRI research." Multimedia Tools and Applications. 80, pp. 17335-17363. https://doi.org/10.1007/s11042-020-09062-7
Feature-Based Learning in Drug Prescription System for Medical Clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Feature-Based Learning in Drug Prescription System for Medical Clinics." Neural Processing Letters. 52, pp. 1703-1721. https://doi.org/10.1007/s11063-020-10296-7
Multisource multimedia data understanding: special theme issue of Multimedia Tools and Applications, Vol. 78, No. 33221
Zhang, Shichao, Wang, Ruili, Tao, Xiaohui and Zhu, Yingying. 2019. Multisource multimedia data understanding: special theme issue of Multimedia Tools and Applications, Vol. 78, No. 33221. New York, United States. Springer.
A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Diykh, Mohammed and Lin, Jerry Chun-Wei. 2018. "A structural graph-coupled advanced machine learning ensemble model for disease risk prediction in a telehealthcare environment." Roy, Sanjiban Sekhar, Samui, Pijushi, Deo, Ravinesh and Ntalampiras, Stalampiras (ed.) Big data in engineering applications. Singapore. Springer. pp. 363-384
Enhanced sequence labeling based on latent variable conditional random fields
Lin, Jerry Chun-Wei, Shao, Yinan, Zhang, Ji and Yun, Unil. 2020. "Enhanced sequence labeling based on latent variable conditional random fields." Neurocomputing. 403, pp. 431-440. https://doi.org/10.1016/j.neucom.2020.04.102
SLIND+: stable LINk detection
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Li, Hongzhou, Chen, Fulong and Luo, Yonglong. 2020. "SLIND+: stable LINk detection." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_8
Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109
A novel differential privacy recommendation method based on distributed framework
Zheng, Xiaoyao, Luo, Yonglong, Zhang, Ji, Sun, Liping and Chen, Fulong. 2018. "A novel differential privacy recommendation method based on distributed framework." Tong, Hanghang, Li, Zhenhui (Jessie), Zhu, Feida and Yu, Jeffrey (ed.) 2018 Workshop on Scalable and Applicable Recommendation Systems (SAREC 2018), in conjunction with the 18th IEEE International Conference on Data Mining (ICDM 2018). Singapore 17 - 20 Nov 2018 Los Alamitos, California. https://doi.org/10.1109/ICDMW.2018.00189
Mining health knowledge graph for health risk prediction
Tao, Xiaohui, Pham, Thuan, Zhang, Ji, Yong, Jianming, Goh, Wee Pheng, Zhang, Wenping and Cai, Yi. 2020. "Mining health knowledge graph for health risk prediction." World Wide Web. 23 (4), pp. 2341-2362. https://doi.org/10.1007/s11280-020-00810-1
REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2020. "REISCH: incorporating lightweight and reliable algorithms into healthcare applications of WSNs." Applied Sciences. 10 (6), pp. 1-36. https://doi.org/10.3390/app10062007
Computational Social Science as the ultimate Web Intelligence
Tao, Xiaohui, Velasquez-Silva, Juan Domingo, Liu, Jiming and Zhong, Ning. 2020. "Computational Social Science as the ultimate Web Intelligence." World Wide Web. 23 (3), pp. 1743-1745. https://doi.org/10.1007/s11280-020-00801-2
Constructing a knowledge-based heterogeneous information graph for medical health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Constructing a knowledge-based heterogeneous information graph for medical health status classification." Health Information Science and Systems. 8 (1). https://doi.org/10.1007/s13755-020-0100-6
Relational intelligence recognition in online social networks - a survey
Zhang, Ji, Tan, Leonard, Tao, Xiaohui, Pham, Thuan and Chen, Bing. 2020. "Relational intelligence recognition in online social networks - a survey." Computer Science Review. 35. https://doi.org/10.1016/j.cosrev.2019.100221
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
A general extensible learning approach for multi-disease recommendations in a telehealth environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Zhu, Xiaodong, Li, Hongzhou, Chang, Liang and Deo, Ravinesh. 2020. "A general extensible learning approach for multi-disease recommendations in a telehealth environment ." Pattern Recognition Letters. 132, pp. 106-114. https://doi.org/10.1016/j.patrec.2018.11.006
A hybrid representation based simile component extraction
Ren, Da, Zhang, Pengfei, Li, Qing, Tao, Xiaohui, Chen, Junying and Cai, Yi. 2020. "A hybrid representation based simile component extraction." Neural Computing and Applications. 32 (18), pp. 14655-14665. https://doi.org/10.1007/s00521-020-04818-6
Efficient chain structure for high-utility sequential pattern mining
Lin, Jerry Chun-Wei, Li, Yuanfa, Fournier-Viger, Philippe, Djenouri, Youcef and Zhang, Ji. 2020. "Efficient chain structure for high-utility sequential pattern mining." IEEE Access. 8, pp. 40714-40722. https://doi.org/10.1109/ACCESS.2020.2976662
FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection
Zhu, Xiaodong, Zhang, Ji, Li, Hongzhou, Fournier-Viger, Philippe, Lin, Jerry Chun-Wei and Chang, Liang. 2017. "FRIOD: a deeply integrated feature-rich interactive system for effective and efficient outlier detection." IEEE Access. 5, pp. 25682-25695. https://doi.org/10.1109/ACCESS.2017.2771237
Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04
Affective and sentimental computing
Xie, Haoran, Wong, Tak‑Lam, Wang, Fu Lee, Wong, Raymond, Tao, Xiaohui and Wang, Ran. 2019. "Affective and sentimental computing." International Journal of Machine Learning and Cybernetics. 10 (8), pp. 2043-2044. https://doi.org/10.1007/s13042-019-00977-8
Mining of high average-utility patterns with item-level thresholds
Lin, Jerry Chun-Wei, Li, Ting, Fournier-Viger, Philippe, Zhang, Ji and Guo, Xiangmin. 2019. "Mining of high average-utility patterns with item-level thresholds." Journal of Internet Technology. 20 (1), pp. 187-194. https://doi.org/10.3966/160792642019012001017
High average-utility sequential pattern mining based on uncertain databases
Lin, Jerry Chun-Wei, Li, Ting, Pirouz, Matin, Zhang, Ji and Fournier-Viger, Philippe. 2020. "High average-utility sequential pattern mining based on uncertain databases." Knowledge and Information Systems. 62 (3), pp. 1199-1228. https://doi.org/10.1007/s10115-019-01385-8
Efficient and secure multi-dimensional geometric range query over encrypted data in cloud
Li, Xingxin, Zhu, Youwen, Wang, Jian and Zhang, Ji. 2019. "Efficient and secure multi-dimensional geometric range query over encrypted data in cloud." Journal of Parallel and Distributed Computing. 131, pp. 44-54. https://doi.org/10.1016/j.jpdc.2019.04.015
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.
Knowledge graph embedding by dynamic translation
Chang, Liang, Zhu, Manli, Gu, Tianlong, Bin, Chenzhong, Qian, Junyan and Zhang, Ji. 2017. "Knowledge graph embedding by dynamic translation." IEEE Access. 5 (3), pp. 20898-20907. https://doi.org/10.1109/ACCESS.2017.2759139
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "PAX: using pseudonymization and anonymization to protect patients’ identities and data in the healthcare system." International Journal of Environmental Research and Public Health. 16 (1490), pp. 1-36. https://doi.org/10.3390/ijerph16091490
Efficient and secure ECDSA algorithm and its applications: a survey
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "Efficient and secure ECDSA algorithm and its applications: a survey." International Journal of Communication Networks and Information Security. 11 (1), pp. 7-35.
A two-phase approach to mine short-periodic high utility itemsets in transactional databases
Lin, Jerry Chun-Wei, Zhang, Jiexiong, Fournier-Viger, Philippe, Hong, Tzung-Pei and Zhang, Ji. 2017. "A two-phase approach to mine short-periodic high utility itemsets in transactional databases." Advanced Engineering Informatics: the science of supporting knowledge-intensive activities. 33, pp. 29-43. https://doi.org/10.1016/j.aei.2017.04.007
RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications
Al-Zubaidie, Mishall, Zhang, Zhongwei and Zhang, Ji. 2019. "RAMHU: A new robust lightweight scheme for mutual users authentication in healthcare applications." Security and Communication Networks. 2019, pp. 1-26. https://doi.org/10.1155/2019/3263902
A novel social network hybrid recommender system based on hypergraph topologic structure
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Ding, Xintao and Zhang, Ji. 2018. "A novel social network hybrid recommender system based on hypergraph topologic structure." World Wide Web. 21 (4), pp. 985-1013. https://doi.org/10.1007/s11280-017-0494-5
Exploiting highly qualified pattern with frequency and weight occupancy
Gan, Wensheng, Lin, Jerry Chun-Wei, Fournier-Viger, Philippe, Chao, Han-Chieh, Zhan, Justin and Zhang, Ji. 2018. "Exploiting highly qualified pattern with frequency and weight occupancy." Knowledge and Information Systems. 56 (1), pp. 165-196. https://doi.org/10.1007/s10115-017-1103-8
An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control
Chen, Fulong, Luo, Yonglong, Zhang, Ji, Zhu, Junru, Zhang, Ziyang, Zhao, Chuanxin and Wang, Taochun. 2018. "An infrastructure framework for privacy protection of community medical internet of things - transmission protection, storage protection and access control." World Wide Web. 21 (1), pp. 33-57. https://doi.org/10.1007/s11280-017-0455-z
A tourism destination recommender system using users' sentiment and temporal dynamics
Zheng, Xiaoyao, Luo, Yonglong, Sun, Liping, Zhang, Ji and Chen, Fulong. 2018. "A tourism destination recommender system using users' sentiment and temporal dynamics." Journal of Intelligent Information Systems. 51 (3), pp. 557-578. https://doi.org/10.1007/s10844-018-0496-5
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
A new nested ensemble technique for automated diagnosis of breast cancer
Abdar, Moloud, Zomorodi-Moghadam, Mariam, Zhou, Xujuan, Gururajan, Raj, Tao, Xiaohui, Barua, Prabal D. and Gururajan, Rashmi. 2020. "A new nested ensemble technique for automated diagnosis of breast cancer." Pattern Recognition Letters. https://doi.org/10.1016/j.patrec.2018.11.004
Special issue on service-oriented collaborative computing and applications
Yong, Jianming, Fortino, Giancarlo, Shen, Weiming, Yang, Yun, Chao, Kuo-Ming and van der Aalst, Wil. 2018. "Special issue on service-oriented collaborative computing and applications." IEEE Transactions on Services Computing. 11 (2), pp. 277-278. https://doi.org/10.1109/TSC.2017.2764559
MLaaS: a cloud-based system for delivering adaptive micro learning in mobile MOOC learning
Sun, Geng, Cui, Tingru, Yong, Jianming, Shen, Jun and Chen, Shiping. 2018. "MLaaS: a cloud-based system for delivering adaptive micro learning in mobile MOOC learning." IEEE Transactions on Services Computing. 11 (2), pp. 292-305. https://doi.org/10.1109/TSC.2015.2473854
Cloud service description model: an extension of USDL for cloud services
Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
On relational learning and discovery in social networks: a survey
Zhang, Ji, Tan, Leonard and Tao, Xiaohui. 2018. "On relational learning and discovery in social networks: a survey." International Journal of Machine Learning and Cybernetics. 10 (8), pp. 2085-2102. https://doi.org/10.1007/s13042-018-0823-8
Trustworthy service composition with secure data transmission in sensor networks
Zhang, Tao, Zheng, Lele, Wang, Yongzhi, Shen, Yulong, Xi, Ning, Ma, Jianfeng and Yong, Jianming. 2018. "Trustworthy service composition with secure data transmission in sensor networks." World Wide Web. 21 (1), pp. 185-200. https://doi.org/10.1007/s11280-017-0465-x
Drug prescription support in dental clinics through drug corpus mining
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Xie, Haoran. 2018. "Drug prescription support in dental clinics through drug corpus mining." International Journal of Data Science and Analytics. 6 (4), pp. 341-349. https://doi.org/10.1007/s41060-018-0149-3
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
Mining drug properties for decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2017. "Mining drug properties for decision support in dental clinics." Kim, J., Shim, K., Cao, L., Lee, J., Lin, X. and Moon, Y. (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Germany. Springer. https://doi.org/10.1007/978-3-319-57529-2_30
Preface - Proceedings of the 2017 IEEE/WIC/ACM international conference on web intelligence
Alt, Rainer, Tao, Xiaohui and Unland, Rainer. 2017. "Preface - Proceedings of the 2017 IEEE/WIC/ACM international conference on web intelligence." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States.
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
Coupling topic modelling in opinion mining for social media analysis
Zhou, Xujuan, Tao, Xiaohui, Rahman, Md Mostafijur and Zhang, Ji. 2017. "Coupling topic modelling in opinion mining for social media analysis." 2017 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2017). Leipzig, Germany 23 - 26 Aug 2017 New York, United States. https://doi.org/10.1145/3106426.3106459
A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Abbas, Wessam, Luo, Yonglong, Chen, Fulong and Tseng, Vincent S.. 2017. "A Fast Fourier Transform-Coupled Machine Learning-Based Ensemble Model for Disease Risk Prediction Using a Real-Life Dataset." Kim, Jinho, Shim, Kyuseok, Cao, Longbing, Lee, Jae-Gil, Lin, Xuemin and Moon, Yang-Sae (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Switzerland. Springer. https://doi.org/10.1007/978-3-319-57454-7_51
A survey of itemset mining
Fournier-Viger, Philippe, Lin, Jerry Chun-Wei, Vo, Bay, Chi, Tin Truong, Zhang, Ji and Le, Hoai Bac. 2017. "A survey of itemset mining." WIREs Data Mining and Knowledge Discovery. 7 (4). https://doi.org/10.1002/widm.1207
Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment
Zhang, Ji, Lafta, Raid, Tao, Xiaohui, Li, Yan, Chen, Fulong, Luo, Yonglong and Zhu, Xiaodong. 2017. "Coupling a fast fourier transformation with a machine learning ensemble model to support recommendations for heart disease patients in a telehealth environment." IEEE Access. 5 (1), pp. 10674-10685. https://doi.org/10.1109/ACCESS.2017.2706318
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
Detecting global outliers from large distributed databases
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "Detecting global outliers from large distributed databases." Liu, Yanbing, Yue, Shigang, Leung, Frank H. F., Zhao, Guofeng and Wang, Lipo (ed.) 9th International Conference on Fuzzy Systems and Knowledge Discovery (FSKD 2012). Chongqing, China 29 - 31 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/FSKD.2012.6233948
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Yong, Jianming, Soar, Jeffrey and McClymont, Hoda. 2015. "Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study." Arabnia, Hamid R., Gravvanis, George A., Solo, Ashu M. G. and Tinetti, Fernando G. (ed.) 2015 International Conference on Grid & Cloud Computing and Applications (GCA'15). Las Vegas, United States 27 - 30 Jul 2015 United States.
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
Special issue on knowledge management of web social media
Tao, Xiaohui, Huang, Wei, Mu, Xiangming and Xie, Haoran. 2016. "Special issue on knowledge management of web social media ." Web Intelligence. 14 (4), pp. 273-274. https://doi.org/10.3233/WEB-160343
Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization
Qi, Xuemei, Wang, Hongtao, Zhu, Haihong, Zhang, Ji, Chen, Fulong and Yang, Jie. 2016. "Fast local neighborhood search algorithm for the no-wait flow shop scheduling with total flow time minimization." International Journal of Production Research. 54 (16), pp. 4957-4972. https://doi.org/10.1080/00207543.2016.1150615
GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques
Li, Hongzhou, Zhang, Ji, Luo, Yonglong, Chen, Fulong and Chang, Liang. 2016. "GO-PEAS: a scalable yet accurate grid-based outlier detection method using novel pruning searching techniques." Ray, T., Sarker, R. and Li, X. (ed.) 2nd Australasian Conference on Artificial Life and Computational Intelligence (ACALCI 2016). Canberra, Australia 02 - 05 Feb 2016 Switzerland. Springer. https://doi.org/10.1007/978-3-319-28270-1_11
Settlement analyses of underground circular tunneling in soft clay
Shiau, J. S., Sams, M. S., Zhang, J. and Kemp, R. J.. 2014. "Settlement analyses of underground circular tunneling in soft clay." Yoo, Chungsik, Park, Seong-Wan, Kim, Bumjoo and Ban, Hoki (ed.) 8th International Symposium on Geotechnical Aspects of Underground Construction in Soft Ground (TC204 ISSMGE IS-SEOUL 2014). Seoul, Korea 25 - 27 Aug 2014 Netherlands. https://doi.org/10.1201/b17240-63
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
Automatic Text Summarization Using Fuzzy Inference
Jafari, Mehdi, Shahabi, Amir Shahab, Wang, Jing, Qin, Yongrui, Tao, Xiaohui and Gheisari, Mehdi. 2016. "Automatic Text Summarization Using Fuzzy Inference." 22nd IEEE International Conference on Automation and Computing (ICAC 2016). Colchester, United Kingdom 07 - 08 Sep 2016 United States. https://doi.org/10.1109/IConAC.2016.7604928
IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2016. "IRS-HD: an intelligent personalized recommender system for heart disease patients in a tele-health environment." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_58
Extended economic models for information systems balance theory
Yong, Jianming and Finger, Susan. 2014. "Extended economic models for information systems balance theory." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2014.6846885
A High Availability Application Service Platform for nuclear power enterprises
Sun, Zhe, Jin, He, Yong, Jianming, Al-Ismaili, Salim, Li, Changyin and Shen, Jun. 2016. "A High Availability Application Service Platform for nuclear power enterprises." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566060
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
Improved media management through cloud computing technology
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "Improved media management through cloud computing technology." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566004
PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection
Ying, Josh Jia-Ching, Zhang, Ji, Huang, Che-Wei, Chen, Kuan-Ta and Tseng, Vincent S.. 2016. "PFrauDetector: a parallelized graph mining approach for efficient fraudulent phone call detection." 22nd IEEE International Conference on Parallel and Distributed Systems (ICPADS 2016). Wuhan, China 13 - 16 Dec 2016 United States. https://doi.org/10.1109/ICPADS.2016.0140
NSSSD: a new semantic hierarchical storage for sensor data
Gheisari, Mehdi, Movassagh, Ali Akbar, Qin, Yongrui, Yong, Jianming, Tao, Xiaohui, Zhang, Ji and Shen, Haifeng. 2016. "NSSSD: a new semantic hierarchical storage for sensor data." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7565984
Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification
Al-kharaz, Ali A., Tao, Xiaohui, Zhang, Ji and Lafta, Raid. 2016. "Adopting hybrid descriptors to recognise leaf images for automatic plant specie identification." Li, Jinyan, Li, Xue, Wang, Shuliang, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_15
Sentiment analysis for depression detection on social networks
Tao, Xiaohui, Zhou, Xujuan, Zhang, Ji and Yong, Jianming. 2016. "Sentiment analysis for depression detection on social networks." Li, Jinyan, Li, Xue, Wang, Xue, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_59
Cloud computing adoption in regional councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. Cloud computing adoption in regional councils. University of Southern Queensland.
An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments." The Services Transactions on Cloud Computing. 3 (3), pp. 13-24.
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Anonymity-based privacy preserving network data publication
Liu, Peng, Li, Yidong, Sang, Yingpeng and Zhang, Ji. 2016. "Anonymity-based privacy preserving network data publication." 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2016). Tianjin, China 23 - 26 Aug 2016 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2016.0144
Multi-level big data content services for mental health care
Chen, Jianhui, Han, Jian, Deng, Yue, Zhong, Han, Wang, Ningning, Li, Youjun, Wan, Zhijiang, Kotake, Taihei, Wang, Dongsheng, Tao, Xiaohui and Zhong, Ning. 2016. "Multi-level big data content services for mental health care." Zhong, Ning, Ma, Jianhua, Liu, Jiming, Huang, Runhe and Tao, Xiaohui (ed.) Wisdom web of things, Part II. Switzerland. Springer. pp. 155-180
Wisdom web of things
Zhong, Ning, Ma, Jianhua, Liu, Jiming, Huang, Runhe and Tao, Xiaohui. 2016. Wisdom web of things. Switzerland. Springer.
Factors to be considered in Cloud computing adoption
Ali, Omar, Soar, Jeffrey, Yong, Jianming and Tao, Xiaohui. 2016. "Factors to be considered in Cloud computing adoption." Web Intelligence. 14 (4), pp. 309-323. https://doi.org/10.3233/WEB-160347
An intelligent recommender system based on predictive analysis in telehealthcare environment
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan, Tseng, Vincent S., Luo, Yonglong and Chen, Fulong. 2016. "An intelligent recommender system based on predictive analysis in telehealthcare environment." Web Intelligence. 14 (4), pp. 325-336. https://doi.org/10.3233/WEB-160348
A local field correlated and Monte Carlo based shallow neural network model for nonlinear time series prediction
Zhou, Qingguo, Chen, Huaming, Zhao, Hong, Zhang, Gaofeng, Yong, Jianming and Shen, Jun. 2016. "A local field correlated and Monte Carlo based shallow neural network model for nonlinear time series prediction." EAI Endorsed Transactions on Scalable Information Systems. 16 (8), pp. 1-7. https://doi.org/10.4108/eai.9-8-2016.151634
Information fusion with subject-based information gathering method for intelligent multi-agent models
Tao, Xiaohui, King, John and Li, Yuefeng. 2005. "Information fusion with subject-based information gathering method for intelligent multi-agent models." 7th International Conference on Information Integration and Web-based Applications and Services (iiWAS 2005). Kuala Lumpur, Malaysia 19 - 21 Sep 2005
Associate a user's goal: exhaustivity and specificity information retrieval using ontology
Tao, Xiaohui. 2006. "Associate a user's goal: exhaustivity and specificity information retrieval using ontology." Li, Yuefeng, Looi, Mark and Zhong, Ning (ed.) 2006 Conference on Advances in Intelligent IT: Active Media Technology. Brisbane, Australia 07 - 09 Jun 2006 Amsterdam, Netherlands.
Ontology mining for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2007. "Ontology mining for personalized web information gathering." Lin, T. Y. and Haas, Laura (ed.) 2007 IEEE/WIC/ACM International Conference on Web Intelligence. Fremont, United States of America 02 - 05 Nov 2007 Los Alamitos, CA. United States. https://doi.org/10.1109/WI.2007.88
Mining specific and general features in both positive and negative relevance feedback
Li, Yuefeng, Tao, Xiaohui, Algarni, Abdulmohsen and Wu, Sheng-Tang. 2009. "Mining specific and general features in both positive and negative relevance feedback." Voorhees, Ellen M. and Buckland, Lori P. (ed.) TREC 2009: 18th Text REtrieval Conference. Gaithersburg, United States 17 - 20 Nov 2009 Gaithersburg, MD. United States.
Drawing micro learning into MOOC: using fragmented pieces of time to enable effective entire course learning experiences
Sun, Geng, Cui, Tingru, Shen, Jun, Yong, Jianming and Chen, Shiping. 2015. "Drawing micro learning into MOOC: using fragmented pieces of time to enable effective entire course learning experiences." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7230977
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients
Lafta, Raid, Zhang, Ji, Tao, Xiaohui, Li, Yan and Tseng, Vincent S.. 2015. "An Intelligent Recommender System based on Short-term Risk Prediction for Heart Disease Patients." 4th International Workshop on Web Personalization, Recommender Systems and Social Media (WPRSM2015), Joint with WI-IAT 2015. Singapore 06 - 09 Dec 2015 Singapore. https://doi.org/10.1109/WI-IAT.2015.47
A study of drug interaction for personalised decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2015. "A study of drug interaction for personalised decision support in dental clinics." 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2015). Singapore 06 - 09 Dec 2015 https://doi.org/10.1109/WI-IAT.2015.28
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study
Ali, Omar, Soar, Jeffrey, Yong, Jianming, McClymont, Hoda and Angus, Daniel. 2015. "Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study." Fortino, Giancarlo, Shen, Weiming, Barthès, Jean-Paul A., Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio F., Abel, Marie-Hélène, Guerrieri, Antonio and Ramos, Milton Pires (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 United States. https://doi.org/10.1109/CSCWD.2015.7231017
An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Information Security and Applications. 27-28, pp. 19-34. https://doi.org/10.1016/j.jisa.2015.11.006
Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Soar, Jeffrey, McClymont, Hoda, Yong, Jianming and Biswas, Jit. 2015. "Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study." 19th Pacific Asia Conference on Information Systems (PACIS 2015). Singapore 05 - 09 Jul 2015
Decision support systems for adoption in dental clinics: a survey
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2016. "Decision support systems for adoption in dental clinics: a survey." Knowledge-Based Systems. 104, pp. 195-206. https://doi.org/10.1016/j.knosys.2016.04.022
Automatic construction of domain-specific sentiment lexicon for context sensitive opinion retrieval
Lau, Raymond Y. K., Zhang, Wenping and Tao, Xiaohui. 2012. "Automatic construction of domain-specific sentiment lexicon for context sensitive opinion retrieval." Zhou, Yanqun (ed.) 4th IEEE International Conference on Computer Science and Information Technology (ICCSIT 2011). Chengdu, China 10 - 12 Jun 2011 Singapore. https://doi.org/10.7763/IPCSIT
Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey, Yong, Jianming and McClymont, Hoda. 2015. "Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Art Media and Technology. 1 (1), pp. 1-13.
An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils." Journal of Contemporary Issues in Business and Government. 21 (1), pp. 72-93. https://doi.org/10.7790/cibg.v21i1.23
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
A standardized design methodology for complex digital logic components of cyber-physical systems
Chen, F., Ye, H., Yang, J., Huang, Y., Zhang, J., Qi, X., Zhao, C., Zhu, J. and Zhou, W.. 2015. "A standardized design methodology for complex digital logic components of cyber-physical systems." Microprocessors and Microsystems. 39 (8), pp. 1245-1254. https://doi.org/10.1016/j.micpro.2015.08.012
Explore interregional EEG correlations changed by sport training using feature selection
Gao, Jia, Wang, Wei and Zhang, Ji. 2016. "Explore interregional EEG correlations changed by sport training using feature selection." Computational Intelligence and Neuroscience. 2016. https://doi.org/10.1155/2016/6184823
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
Reducing corruption through e-procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Krishor and Yong, Jianming. 2014. "Reducing corruption through e-procurement." 2013 Annual Statistical Report on United Nations Procurement - Supplement.
A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications
Sun, Liping, Luo, Yonglong, Ding, Xintao and Zhang, Ji. 2014. "A novel artificial immune algorithm for spatial clustering with obstacle constraint and its applications." Computational Intelligence and Neuroscience. 2014. https://doi.org/10.1155/2014/160730
A dynamic subspace anomaly detection method using generic algorithm for streaming network data
Zhang, Ji and Li, Hongzhou. 2015. "A dynamic subspace anomaly detection method using generic algorithm for streaming network data." Gupta, Manish (ed.) Handbook of research on emerging developments in data privacy. Hershey, PA. United States. IGI Global. pp. 403-425
Detecting anomalies from big network traffic data using an adaptive detection approach
Zhang, Ji, Li, Hongzhou, Gao, Qigang, Wang, Hai and Luo, Yonglong. 2015. "Detecting anomalies from big network traffic data using an adaptive detection approach." Information Sciences. 318, pp. 91-110. https://doi.org/10.1016/j.ins.2014.07.044
Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
A knowledge retrieval model using ontology mining and user profiling
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2008. "A knowledge retrieval model using ontology mining and user profiling." Integrated Computer Aided Engineering. 15 (4), pp. 313-329. https://doi.org/10.3233/ICA-2008-15404
Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2014. "Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling." Transforming Government: People, Process and Policy. 8 (4), pp. 500-520. https://doi.org/10.1108/TG-03-2014-0007
Text mining in microblogs for real time topic and event monitoring
Lau, Cher H., Tjondronegoro, Dian, Li, Yuefeng, Xu, Yue and Tao, Xiaohui. 2010. "Text mining in microblogs for real time topic and event monitoring." Hess, Barry and Christensen, Clayton M. (ed.) SC10 Early Adopters PhD Workshop: Building the Next Generation of Application Scientists (held during the International Conference for High Performance Computing, Networking, Storage, and Analysis 2010). New Orleans, United States 15 Nov 2010 Washington, DC. United States.
Ontology mining for personalized search
Li, Yuefeng and Tao, Xiaohui. 2009. "Ontology mining for personalized search." Cao, Longbing, Yu, Philip S., Zhang, Chengqi and Zhang, Huaifeng (ed.) Data mining for business applications. New York, NY. United States. Springer. pp. 63-78
Effective pattern taxonomy mining in text documents
Li, Yuefeng, Wu, Sheng-Tang and Tao, Xiaohui. 2008. "Effective pattern taxonomy mining in text documents." Shanahan, James G., Amer-Yahia, Sihem, Zhang, Yi and Kolcz, Alek (ed.) CIKM 2008: ACM 17th Conference on Information and Knowledge Management. Napa Valley, United States 26 - 30 Oct 2008 New York, NY. USA. https://doi.org/10.1145/1458082.1458360
An ontology-based framework for knowledge retrieval
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2008. "An ontology-based framework for knowledge retrieval." Jain, Lakhmi, Lingras, Pawan, Klusch, Matthias and Lu, Jie (ed.) 2008 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2008). Sydney, Australia 09 - 12 Dec 2008 Los Alamitos, CA. USA. https://doi.org/10.1109/WIIAT.2008.226
Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3
Energy effective congestion control for multicast with network coding in wireless ad hoc network
Zhao, Chuanxin, Luo, Yonglong, Chen, Fulong, Zhang, Ji and Wang, Ruchuan. 2014. "Energy effective congestion control for multicast with network coding in wireless ad hoc network." Mathematical Problems in Engineering. https://doi.org/10.1155/2014/135945
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
An efficient and robust privacy protection technique for massive streaming choice-based information
Zhang, Ji, Liu, Xuemei and Luo, Yonglong. 2013. "An efficient and robust privacy protection technique for massive streaming choice-based information." He, Qi and Iyengar, Arun (ed.) 22nd ACM International Conference on Information and Knowledge Management (CIKM 2013). San Francisco, United States 27 Oct - 01 Nov 2013 New York, NY. United States. https://doi.org/10.1145/2505515.2507816
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Mapping semantic knowledge for unsupervised text categorisation
Tao, Xiaohui, Li, Yuefeng, Zhang, Ji and Yong, Jianming. 2013. "Mapping semantic knowledge for unsupervised text categorisation." Wang, Hua and Rui, Zhang (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
Sentiment Analysis on Tweets for Social Events
Zhou, Xujuan, Tao, Xiaohui, Yong, Jianming and Yang, Zhenyu. 2013. "Sentiment Analysis on Tweets for Social Events." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581022
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058
Domination problems in social networks
Wang, Guangyuan. 2014. Domination problems in social networks. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Evaluations of heuristic algorithms for teamwork-enhanced task allocation in mobile cloud-based learning
Sun, Geng, Shen, Jun, Luo, Junzhou and Yong, Jianming. 2013. "Evaluations of heuristic algorithms for teamwork-enhanced task allocation in mobile cloud-based learning ." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2013.6580979
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A novel approach to data deduplication over the engineering-oriented cloud systems
Sun, Zhe, Shen, Jun and Yong, Jianming. 2013. "A novel approach to data deduplication over the engineering-oriented cloud systems ." Integrated Computer Aided Engineering. 20 (1), pp. 45-57. https://doi.org/10.3233/ICA-120418
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
Advancements of outlier detection: a survey
Zhang, Ji. 2013. "Advancements of outlier detection: a survey." ICST Transactions on Scalable Information Systems. 13 (1), pp. 1-26. https://doi.org/10.4108/trans.sis.2013.01-03.e2
An innovative outlier detection method using localized thresholds
Zhang, Ji, Cao, Jie and Zhu, Xiaodong. 2012. "An innovative outlier detection method using localized thresholds." Data and Knowledge Engineering. https://doi.org/10.1007/978-3-642-34679-8-7
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Semantic labelling for document feature patterns using ontological subjects
Tao, Xiaohui, Li, Yuefeng, Liu, Bin and Shen, Yan. 2012. "Semantic labelling for document feature patterns using ontological subjects." Zhong, Ning and Gong, Zhiguo (ed.) 2012 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.47
Efficient and effective filtering of duplication detection in large database applications
Zhang, Ji. 2012. "Efficient and effective filtering of duplication detection in large database applications." Journal of Software. 7 (11), pp. 2424-2436. https://doi.org/10.4304/jsw.7.11.2424-2436
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
Matching relevance features with ontological concepts
Shen, Yan, Li, Yuefeng, Xu, Yue and Tao, Xiaohui. 2012. "Matching relevance features with ontological concepts." 2012 IEEE/WIC/ACM International Joint Conferences on Web Intelligence and Intelligent Agent Technology (WPRS 2012). Macau, China 04 - 07 Dec 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2012.194
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Retrieving information from microblog using pattern mining and relevance feedback
Lau, Cher Han, Tao, Xiaohui, Tjondronegoro, Dian and Li, Yuefeng. 2012. "Retrieving information from microblog using pattern mining and relevance feedback." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_15
Personalised information gathering and recommender systems: techniques and trends
Tao, Xiaohui, Zhou, Xujuan, Lau, Cher Han and Li, Yuefeng. 2013. "Personalised information gathering and recommender systems: techniques and trends." EAI Endorsed Transactions on Scalable Information Systems. 13 (1-3), pp. 1-17. https://doi.org/10.4108/trans.sis.2013.01-03.e4
Mining contextual knowledge for context-aware recommender systems
Zhang, Wenping, Lau, Raymond and Tao, Xiaohui. 2012. "Mining contextual knowledge for context-aware recommender systems." Chao, Kuo-Ming, Lei, Hui, Li, Yinsheng, Chung, Jen-Yao and Shah, Nazaraf (ed.) 9th IEEE International Conference on E-Business Engineering (ICEBE 2012). Hangzhou, China 09 - 11 Sep 2012 Los Alamitos, CA. United States. https://doi.org/10.1109/ICEBE.2012.65
Optimal timepoint sampling in high-throughput gene expression experiments
Rosa, Bruce A., Zhang, Ji, Major, Ian T., Qin, Wensheng and Chen, Jin. 2012. "Optimal timepoint sampling in high-throughput gene expression experiments." Bioinformatics. 28 (21), pp. 2773-2781. https://doi.org/10.1093/bioinformatics/bts511
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Cloud computing for higher education: a roadmap
Hossain Masud, Md. Anwar, Yong, Jianming and Huang, Xiaodi. 2012. "Cloud computing for higher education: a roadmap ." Gao, Liang, Shen, Weiming, Barthès, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221872
A survey on bio-inspired algorithms for web service composition
Wang, Lijuan, Shen, Jun and Yong, Jianming. 2012. "A survey on bio-inspired algorithms for web service composition ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221875
Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Role of public e-procurement technology to reduce corruption in government procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2012. "Role of public e-procurement technology to reduce corruption in government procurement." 5th International Public Procurement Conference (IPPC5). Seattle, United States 17 - 19 Aug 2012 United States.
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Using automated individual white list to protect web digital identities
Han, Weili, Cao, Ye, Bertino, Elisa and Yong, Jianming. 2012. "Using automated individual white list to protect web digital identities ." Expert Systems with Applications. 39 (15), pp. 11861-11869. https://doi.org/10.1016/j.eswa.2012.02.020
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076
Enhanced M-learning with cloud computing: the Bangladesh case
Hossain Masud, Md. Anwar, Huang, Xiaodi and Yong, Jianming. 2011. "Enhanced M-learning with cloud computing: the Bangladesh case." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel, Yong, Jianming, Xue, Yunjiao and Ramos, Milton (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/CSCWD.2011.5960200
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
An ontology-based mining approach for user search intent discovery
Shen, Yan, Li, Yuefeng, Xu, Yue, Iannella, Renato, Algarni, Abdulmohsen and Tao, Xiaohui. 2011. "An ontology-based mining approach for user search intent discovery." Cunningham, Sally Jo, Scholer, Falk and Thomas, Paul (ed.) 16th Australasian Document Computing Symposium (ADCS 2011). Canberra, Australia 02 Dec 2011 Melbourne, Australia.
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
Multi-modal summarization of key events and top players in sports tournament videos
Tjondronegoro, Dian, Tao, Xiaohui, Sasongko, Johannes and Lau, Cher Han. 2011. "Multi-modal summarization of key events and top players in sports tournament videos." IEEE Workshop on Applications of Computer Vision (WACV 2011). Kona, United States 05 - 07 Jan 2011 Piscataway, NJ. United States. https://doi.org/10.1109/WACV.2011.5711541
New trends in information technology in education
Lu, Yanping, Liu, Hong, Li, Shaozi and Yong, Jianming. 2011. "New trends in information technology in education ." International Journal of Distance Education Technologies. 9 (1), pp. i-iv.
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
A cross-media framework for personalized learning systems
Jia, Tingbai and Tao, Xiaohui. 2011. "A cross-media framework for personalized learning systems." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053933
A personalized ontology model for web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2011. "A personalized ontology model for web information gathering." IEEE Transactions on Knowledge and Data Engineering. 23 (4), pp. 496-511. https://doi.org/10.1109/TKDE.2010.145
DeDu: building a deduplication storage system over cloud computing
Sun, Zhe, Shen, Jun and Yong, Jianming. 2011. "DeDu: building a deduplication storage system over cloud computing." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960097
Constructing robust digital identity infrastructure for future networked society
Yong, Jianming, Tiwari, Sanjib, Huang, Xiaodi and Jin, Qun. 2011. "Constructing robust digital identity infrastructure for future networked society." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960129
A process provenance service system for scientific data analysis and sharing
Liu, Qing, Zhang, Ji, Forbes, James, Xu, Kai and Nair, Dinesh. 2011. "A process provenance service system for scientific data analysis and sharing." Zhang, Ji and Livraga, Gionvanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053921
Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Security and privacy preservation for mobile e-learning via digital identity attributes
Yong, Jianming. 2011. "Security and privacy preservation for mobile e-learning via digital identity attributes." Journal of Universal Computer Science. 17 (2), pp. 296-310. https://doi.org/10.3217/jucs-017-02-0296
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
Mining world knowledge for analysis of search engine content
King, John D., Li, Yuefeng, Tao, Xiaohui and Nayak, Richi. 2007. "Mining world knowledge for analysis of search engine content." Web Intelligence. 5 (3), pp. 233-253.
Automatically acquiring training sets for web information gathering
Tao, Xiaohui, Li, Yuefeng, Zhong, Ning and Nayak, Richi. 2006. "Automatically acquiring training sets for web information gathering." Liu, Jiming and Wah, Benjamin W. (ed.) 2006 IEEE/WIC/ACM International Conference on Web Intelligence. Hong Kong, China 18 - 22 Dec 2006 Piscataway, NJ. United States. https://doi.org/10.1109/WI.2006.49
Ontology mining for semantic interpretation of user information needs
Tao, Xiaohui, Li, Yuefeng and Nayak, Richi. 2007. "Ontology mining for semantic interpretation of user information needs." Zhang, Zili and Siekmann, Jorg (ed.) 2nd International Conference on Knowledge Science, Engineering, and Management (KSEM 2007). Melbourne, Australia 28 - 30 Nov 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-76719-0_32
A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback
Tao, Xiaohui and Li, Yuefeng. 2009. "A User Profiles Acquiring Approach Using Pseudo-Relevance Feedback." Wen, Peng, Li, Yuefeng, Polkowski, Lech and Yao, Yiyu (ed.) 4th International Conference on Rough Sets and Knowledge Technology (RSKT 2009). Gold Coast, Australia 14 - 16 Jul 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-02962-2_83
Concept-Based, Personalized Web Information Gathering: A Survey
Tao, Xiaohui and Li, Yuefeng. 2009. "Concept-Based, Personalized Web Information Gathering: A Survey." 3rd International Conference on Knowledge Science, Engineering, and Management (KSEM 2009). Vienna, Austria 25 - 27 Nov 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-10488-6_23
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
An information-driven framework for image mining
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "An information-driven framework for image mining." Mayr, Heinrich C., Lazansky, Jiri, Quirchmayr, Gerald and Vogel, Pavel (ed.) 12th International Conference on Database and Expert Systems Applications (DEXA'01). Munich, Germany 03 - 05 Sep 2001 Germany. Springer. https://doi.org/10.1007/3-540-44759-8_24
Building XML data warehouse based on frequent patterns in user queries
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2003. "Building XML data warehouse based on frequent patterns in user queries." Kambayahsi, Yahiko, Mohania, Mukesh K. and Wob, Wolfram (ed.) 5th International Conference on Data Warehousing and Knowledge Discovery (DaWaK'03). Prague, Czech Republic 03 - 05 Sep 2003 Germany. Springer. https://doi.org/10.1007/978-3-540-45228-7_11
On efficient and effective association rule mining from XML data
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert, Tjoa, A. Min and Liu, Han. 2004. "On efficient and effective association rule mining from XML data." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_48
PC-filter: a Robust filtering technique for duplicate record detection in large databases
Zhang, Ji, Ling, Tok Wang, Bruckner, Robert and Liu, Han. 2004. "PC-filter: a Robust filtering technique for duplicate record detection in large databases." Galindo, Fernando, Takizawa, Makoto and Traunmuller, Roland (ed.) 15th International Conference on Database and Expert Systems Applications (DEXA'04). Zaragoza, Spain 30 Aug - 03 Sep 2004 Germany. Springer. https://doi.org/10.1007/978-3-540-30075-5_47
Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047
CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09
Gene specific co-regulation discovery: an improved approach
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "Gene specific co-regulation discovery: an improved approach." Allen, G., Nabrzyski, J., Seidel, E., van Albada, G. D., Dongarra, J. and Sloot, P. M. A. (ed.) 2009 International Conference on Computational Science (ICCS 2009): Compute. Discover. Innovate.. Baton Rouge, United States of America 25 - 27 May 2009 Germany. Springer.
Detecting projected outliers in high-dimensional data streams
Zhang, Ji, Gao, Qigang, Wang, Hai, Liu, Qing and Xu, Kai. 2009. "Detecting projected outliers in high-dimensional data streams." Bhowmick, Sourav S., Kung, Josef and Wagner, Roland (ed.) 20th International Conference on Database and Expert Systems Applications (DEXA 2009). Linz, Austria 31 Aug - 04 Sep 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-03573-9_53
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Enhancing the privacy of e-learning systems with alias and anonymity
Yong, Jianming. 2008. "Enhancing the privacy of e-learning systems with alias and anonymity." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-92719-8
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
New data integration workflow design for e-learning
Xi, Shengtian and Yong, Jianming. 2007. "New data integration workflow design for e-learning." Lecture Notes in Computer Science (Book series). 4402, pp. 699-707. https://doi.org/10.1007/978-3-540-72863-4_71
A framework of tool integration for internet-based e-commerce
Yong, Jianming and Yang, Yun. 2004. "A framework of tool integration for internet-based e-commerce." Li, M. (ed.) GCC 2003: 2nd International Workshop on Grid and Cooperative Computing. Shanghai, China Berlin, Germany. Springer.
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers: a journal of research and innovation. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68
Digital identity design and privacy preservation for e-learning
Yong, Jianming. 2007. "Digital identity design and privacy preservation for e-learning." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Melbourne, Australia. https://doi.org/10.1109/CSCWD.2007.4281549
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Web service management system for bioinformatics research: a case study
Xu, Kai, Yu, Qi, Liu, Qing, Zhang, Ji and Bouguettaya, Athman. 2011. "Web service management system for bioinformatics research: a case study." Service Oriented Computing and Applications. 5 (1), pp. 1-15. https://doi.org/10.1007/s11761-011-0076-9
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Connecting users and items with weighted tags for personalized item recommendations
Liang, Huizhi, Xu, Yue, Li, Yuefeng, Nayak, Richi and Tao, Xiaohui. 2010. "Connecting users and items with weighted tags for personalized item recommendations." Chignell, Mark and Toms, Elaine (ed.) HT 2010: 21st ACM Conference on Hypertext and Hypermedia. Toronto, Canada 13 - 16 Jun 2010 New York, USA. https://doi.org/10.1145/1810617.1810628
Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Geva, Shlomo. 2010. "Ontology-based specific and exhaustive user profiles for constraint information fusion for multi-agents." Huang, Xiangji Jimmy, King, Irwin, Raghavan, Vijay and Rueger, Stefan (ed.) 2010 IEEE/WIC/ACM International Conference on Web Intelligence. Toronto, Canada 31 Aug - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/WI-IAT.2010.76
Mining specific and general features in both positive and negative relevance feedback
Algarni, Abdulmohsen, Li, Yuefeng and Tao, Xiaohui. 2010. "Mining specific and general features in both positive and negative relevance feedback." Voorhees, E. M. and Buckland, Lori P. (ed.) TREC 2010: 19th Text REtrieval Conference: Relevance Feedback Track. Gaithersburg, United States 16 - 19 Nov 2010 Gaithersburg, MD, USA.
A knowledge-based model using ontologies for personalized web information gathering
Tao, Xiaohui, Li, Yuefeng and Zhong, Ning. 2010. "A knowledge-based model using ontologies for personalized web information gathering." Web Intelligence. 8 (3), pp. 235-254. https://doi.org/10.3233/WIA-2010-0189
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy-preserving protocols for string matching
Luo, Yonglong, Shi, Lei, Zhang, Caiyun and Zhang, Ji. 2010. "Privacy-preserving protocols for string matching." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.24
An efficient and effective duplication detection method in large database applications
Zhang, Ji. 2010. "An efficient and effective duplication detection method in large database applications." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/NSS.2010.78
A web-based interactive data visualization system for outlier subspace analysis
Liu, Dong, Gao, Qigang, Wang, Hai and Zhang, Ji. 2010. "A web-based interactive data visualization system for outlier subspace analysis." Debnath, Narayan (ed.) SEDE 2010: 19th International Conference on Software Engineering and Data Engineering. San Francisco, United States 16 - 18 Jun 2010 Cary, NC. United States.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880
Specify and enforce the policies of quantified risk adaptive access control
Chen, Chen, Han, Weili and Yong, Jianming. 2010. "Specify and enforce the policies of quantified risk adaptive access control." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 United States.
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Digital identity control mechanism for e-learning
Yong, Jianming. 2009. "Digital identity control mechanism for e-learning." IEEE International Symposium on IT in Medicine and Education (ITME 2009) . Jinan, China 14 - 16 Aug 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ITIME.2009.5236204
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
A trust degree based access control in grid environments
Luo, Junzhou, Ni, Xudong and Yong, Jianming. 2009. "A trust degree based access control in grid environments." Information Sciences. 179 (15), pp. 2618-2628. https://doi.org/10.1016/j.ins.2009.01.039
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Semi-bipartite graph visualization for gene ontology networks
Xu, Kai, Williams, Rohan, Hong, Seok-Hee, Liu, Qing and Zhang, Ji. 2010. "Semi-bipartite graph visualization for gene ontology networks." Eppstein, D. and Gansner, E. R. (ed.) GD 2009: 17th International Symposium on Graph Drawing. Chicago, United States 22 - 25 Sep 2009 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-11805-0_24
FlowRecommender: a workflow recommendation technique for process provenance
Zhang, Ji, Liu, Qing and Xu, Kai. 2009. "FlowRecommender: a workflow recommendation technique for process provenance." Kennedy, Paul J., Ong, Kok-Leong and Christen, Peter (ed.) 8th Australasian Data Mining Conference (AusDM 2009): Data Mining and Analytics. Melbourne, Australia 01 - 04 Dec 2009 Melbourne, Australia.
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Data integration over the internet for e-commerce
Yong, Jianming and Yang, Yun. 2003. "Data integration over the internet for e-commerce." Hesselink, Lambertus (ed.) 3rd IASTED International Conference on Wireless and Optical Communications (WOC 2003). Banff, Canada 14 - 16 Jul 2003 United States.
A new approach to multimedia information filtering based on its structure
Huang, Xiaodi and Yong, Jianming. 2004. "A new approach to multimedia information filtering based on its structure." Correia, N., Jorge, J., Chambel, T. and Pan, Z. (ed.) Mutimedia 2004 Eurographics Symposium. Nanjing, China 27 - 28 Oct 2004 New York, USA.
WSFS-based data integration for e-learning
Yong, Jianming, Yan, Jun and Huang, Xiaodi. 2006. "WSFS-based data integration for e-learning." 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006). Nanjing, China 03 - 05 May 2006 Piscataway, NJ, USA.
Prediction of student actions using weighted Markov models
Huang, Xiaodi, Yong, Jianming, Li, Jiuyong and Gao, Junbin. 2008. "Prediction of student actions using weighted Markov models." Li, Shaozi, Pan, Wei and Yong, Jianming (ed.) IEEE International Symposium on IT in Medicine and Education (ITME 2008) . Xiamen, China 12 - 14 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ITME.2008.4743842
Security modelling for integrated information systems over the internet
Yong, Jianming. 2004. "Security modelling for integrated information systems over the internet." 8th Pacific Asia Conference on Information Systems (PACIS 2004). Shanghai, China 08 - 11 Jul 2004
Neighbourhood-trust dependency access control for WFMS
Yong, Jianming. 2006. "Neighbourhood-trust dependency access control for WFMS." 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006). Nanjing, China 03 - 05 May 2006 Piscataway, NJ, USA.
Building ontology repositories for e-commerce systems
Yong, Jianming, Yang, Yun and Yan, Jun. 2003. "Building ontology repositories for e-commerce systems." WSEAS Transactions on Systems. 2 (2), pp. 241-245.
Distributed internet-based e-commerce tools
Yong, Jianming and Yang, Yun. 2004. "Distributed internet-based e-commerce tools." WSEAS Transaction on Computers. 3 (3), pp. 619-625.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Image mining: issues, frameworks and techniques
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2001. "Image mining: issues, frameworks and techniques." Zaïane, Osmar R. and Simoff, Simeon J. (ed.) 2nd ACM SIGKDD International Workshop on Multimedia Data Mining (MDM/KDD'01). San Francisco, USA 26 Aug 2001 Canada.
HOS-Miner: a system for detecting outlying subspaces of high-dimensional data
Zhang, Ji, Lou, Meng, Ling, Tok Wang and Wang, Hai. 2004. "HOS-Miner: a system for detecting outlying subspaces of high-dimensional data." Nascimento, Mario A., Özsu, M. Tamer, Kossmann, Donald, Miller, Renee J., Blakeley, Jose A. and Schiefer, K. Bernhard (ed.) 30th International Conference on Very Large Data Bases (VLDB'04). Toronto, Canada 31 Aug - 03 Sep 2004 San Francisco, California, United States.
Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance
Zhang, Ji and Wang, Hai. 2006. "Detecting outlying subspaces for high-dimensional data: the new task, algorithms and performance." Knowledge and Information Systems. 10 (3), pp. 333-355.
Outlier detection for high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2007. "Outlier detection for high-dimensional data streams." 5th Dalhousie Computer Science In-house Conference (DCSI'07). Halifax, Canada 05 Apr 2007 Halifax, Nova Scotia, Canada.
D-GridMST: clustering large distributed spatial databases
Zhang, Ji and Liu, Han. 2005. "D-GridMST: clustering large distributed spatial databases." Halgamuge, Saman K. and Wang, Lipo (ed.) Classification and clustering for knowledge discovery. Berlin, Germany. Springer. pp. 61-72
A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data
Liu, Han, Kustra, Rafal and Zhang, Ji. 2004. "A novel dimensionality reduction technique based on independent component analysis for modeling microarray gene expression data." Arabnia, Hamid R. (ed.) 2004 International Conference on Artificial Intelligence (ICAI'04). Las Vegas, United States 21 - 24 Jun 2004 Las Vegas, Nevada, USA.
A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval
Zhang, Ji, Wang, Wei and Zhang, Sheng. 2005. "A color indexing scheme using two-Level clustering processing for effective and efficient image retrieval." Arabnia, Hamid R. and Scime, A. (ed.) 2005 International Conference on Data Mining (DMIN'05). Las Vegas, United States of America Jun 2005 Las Vegas, Nevada, USA.
Image mining: trends and developments
Hsu, Wynne, Lee, Mong Li and Zhang, Ji. 2002. "Image mining: trends and developments." Journal of Intelligent Information Systems. 19 (1), pp. 7-23. https://doi.org/10.1023/A:1015508302797
A framework for efficent association rule mining in XML data
Zhang, Ji, Liu, Han, Ling, Tok Wang, Bruckner, Robert and Tjoa, A. Min. 2006. "A framework for efficent association rule mining in XML data." Journal of Database Management. 17 (3), pp. 19-40.
Gene specific co-regulation discovery from gene microarray data
Zhang, Ji, Liu, Qing, Xu, Kai and de Souza, Paulo. 2008. "Gene specific co-regulation discovery from gene microarray data." Arthur, Jonathan and Ng, See-Kiong (ed.) 19th International Conference on Genome Informatics (GIW 2008). Gold Coast, Australia 01 - 03 Dec 2008
Discover gene specific local co-regulations from time-course gene expression data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Discover gene specific local co-regulations from time-course gene expression data." Journal of Scientific Programming. 16 (1), pp. 31-47. https://doi.org/10.3233/SPR-2008-0243
A review of ontology and web service composition
Zhang, Ji. 2008. A review of ontology and web service composition. Australia. CSIRO Publishing.
Bio-SENSE: semantic web services for bioinformatics provenance
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-SENSE: semantic web services for bioinformatics provenance." Bird, Trevor (ed.) 2008 CSIRO ICT Centre Conference. Sydney, Australia 20 - 21 Nov 2008 Sydney, Australia.
Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy
Zhang, Ji. 2008. Towards outlier detection for high-dimensional data streams using projected outlier analysis strategy. PhD Thesis Doctor of Philosophy. Dalhousie University, Canada.
X-warehouse: building query pattern-driven data warehouse for XML data
Zhang, Ji, Wang, Wei, Liu, Han and Zhang, Sheng. 2005. "X-warehouse: building query pattern-driven data warehouse for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
XAR-Miner: efficient association rules mining for XML data
Zhang, Sheng, Zhang, Ji, Liu, Han and Wang, Wei. 2005. "XAR-Miner: efficient association rules mining for XML data." Ellis, Allan and Hagino, Tatsuya (ed.) 14th International World Wide Web Conference (WWW'05). Chiba, Japan 10 - 14 May 2005 New York, NY, USA.
Detecting outlying subspaces for high-dimensional data: a heuristic search approach
Zhang, Ji. 2005. "Detecting outlying subspaces for high-dimensional data: a heuristic search approach." 2005 SIAM International Workshop on Feature Selection for Data Mining: Interfacing Machine Learning and Statistics. Newport Beach, United States of America 23 Apr 2005
Outlying subspace detection for high-dimensional data
Zhang, Ji, Gao, Qigang and Wang, Hai. 2009. "Outlying subspace detection for high-dimensional data." Rivero, Laura C., Doorn, Jorge Horacio and Ferraggine, Viviana E. (ed.) Encyclopedia of database technologies and applications, 2nd ed.. Hershey, PA, United States. IGI Global. pp. 1-6
Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases
Wang, Wei, Zhang, Ji and Wang, Hai. 2005. "Grid-ODF: detecting outliers effectively and efficiently in large multi-dimensional databases." Hao, Y., Liu, J., Wang, Y., Cheung, Y.-M., Yin, H., Jiao, L., Ma, J. and Jiao, Y.-C. (ed.) 2005 IEEE International Conference on Computational Intelligence and Security (CIS'05). Xi'an, China 15 - 19 Dec 2005 Heidelberg, Germany.
Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services
Bouguettaya, Athman, Hepburn, Mark, Liu, Qing, Xu, Kai and Zhang, Ji. 2008. "Bio-Sense: a system for supporting sharing and exploration in bioinformatics using semantic web services." 4th IEEE International Conference on eScience (eScience'08). Indianapolis, United States 10 - 12 Dec 2009 New York, United States.
Discover gene specific local co-regulations using progressive genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "Discover gene specific local co-regulations using progressive genetic algorithm." 18th IEEE International Conference on Tools with Artificial Intelligence (ICTAI'06). Washington D.C., United States 13 - 15 Nov 2006 New York, United States.
A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm
Zhang, Ji, Gao, Qigang and Wang, Hai. 2006. "A novel method for detecting outlying subspaces in high-dimensional databases using genetic algorithm." 6th IEEE International Conference on Data Mining (ICDM 2006). Hong Kong, China 18 - 20 Dec 2006 New York, United States.
Anomaly detection in high-dimensional network data streams: a case study
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "Anomaly detection in high-dimensional network data streams: a case study." 2008 IEEE International Conference on Intelligence and Security Informatics (ISI '08). Taipei, Taiwan 17 - 20 Jun 2008 New York, United States.
SPOT: a system for detecting projected outliers from high-dimensional data streams
Zhang, Ji, Gao, Qigang and Wang, Hai. 2008. "SPOT: a system for detecting projected outliers from high-dimensional data streams." 24th IEEE International Conference on Data Engineering (ICDE 2008). Cancun, Mexico 07 - 12 Apr 2008 New York, United States. https://doi.org/10.1109/ICDE.2008.4497638
Clustering in dynamic spatial databases
Zhang, Ji, Hsu, Wynne and Lee, Mong Li. 2005. "Clustering in dynamic spatial databases." Journal of Intelligent Information Systems. 24 (1), pp. 5-27. https://doi.org/10.1007/s10844-005-0265-0
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Replacing lost or stolen e-passports
Yong, Jianming and Bertino, Elisa. 2007. "Replacing lost or stolen e-passports." Computer. 40 (10), pp. 89-91. https://doi.org/10.1109/MC.2007.360
Enforcing secure access control in integrated systems over the internet
Yong, Jianming, Lane, Michael S., Toleman, Mark and Yang, Yun. 2003. "Enforcing secure access control in integrated systems over the internet." 1st Australian Information Security Management Conference. Perth, Western Australia 24 Nov 2003 Perth, Western Australia.
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
Security modelling for e-learning
Yong, Jianming. 2007. "Security modelling for e-learning." Liu, Hong, Hu, Bin and Zheng, Xiangwei (ed.) 1st International Symposium on Information Technologies and Applications in Education (ISITAE 07). Kunming, China 23 - 25 Nov 2007 Beijing, China.
Building ontology repositories for e-commerce systems
Yong, Jianming, Yang, Yun and Yan, Jun. 2002. "Building ontology repositories for e-commerce systems." Mastorakis, Nikos E. (ed.) WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks (WSEAS 2002). Copacabana, Brazil 15 - 17 Oct 2002 Athens, Greece.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
An agent-based decentralised process management framework for web service composition
Yan, Jun, Pidgeon, Phillip, Krishna, Aneesh and Yong, Jianming. 2007. "An agent-based decentralised process management framework for web service composition." Li, Jianzhong (ed.) Infoscale 2007: 2nd International Conference on Scalable Information Systems. Suzhou, China 06 - 08 Jun 2007 New York, USA.
Internet-based e-learning workflow process
Yong, Jianming. 2006. "Internet-based e-learning workflow process." Lecture Notes in Computer Science (Book series). 3865, pp. 516-524. https://doi.org/10.1007/11686699_52
Fostering e-commerce among Australian SMEs
Yong, Jianming and Yang, Yun. 2003. "Fostering e-commerce among Australian SMEs." IT Professional. 5 (5), pp. 21-24. https://doi.org/10.1109/MITP.2003.1235318
Extended RBAC with role attributes
Yong, Jianming, Bertino, Elisa, Toleman, Mark and Roberts, Dave. 2006. "Extended RBAC with role attributes." Tan, Bernard (ed.) 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 Sheffield, UK.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Mobile solutions for aged care: a transformational framework
Soar, Jeffrey, Tsai, Heng-Sheng, Yong, Jianming and Gururajan, Raj. 2005. "Mobile solutions for aged care: a transformational framework." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
Workflow-based e-learning platform
Yong, Jianming. 2005. "Workflow-based e-learning platform." Shen, Weiming, James, Anne, Chao, Kuo-Ming, Younas, Muhammad, Lin, Zongkai and Barthes, Jean-Paul (ed.) 9th International Conference on Computer Supported Cooperative Work in Design (CSCWD2005). Coventry, United Kingdom 24 - 26 May 2005 Coventry, UK.