Cloud service description model: an extension of USDL for cloud services

Article


Sun, Le, Ma, Jiangan, Wang, Hua, Zhang, Yanchun and Yong, Jianming. 2018. "Cloud service description model: an extension of USDL for cloud services." IEEE Transactions on Services Computing. 11 (2), pp. 354-368. https://doi.org/10.1109/TSC.2015.2474386
Article Title

Cloud service description model: an extension of USDL for cloud services

ERA Journal ID36548
Article CategoryArticle
AuthorsSun, Le (Author), Ma, Jiangan (Author), Wang, Hua (Author), Zhang, Yanchun (Author) and Yong, Jianming (Author)
Journal TitleIEEE Transactions on Services Computing
Journal Citation11 (2), pp. 354-368
Number of Pages15
Year2018
PublisherIEEE (Institute of Electrical and Electronics Engineers)
Place of PublicationUnited States
ISSN1939-1374
Digital Object Identifier (DOI)https://doi.org/10.1109/TSC.2015.2474386
Web Address (URL)https://ieeexplore.ieee.org/document/7229352
Abstract

There are a variety of well-designed specification-modelling-languages serving Internet services, however, none of them is capable of describing the special features of cloud services, from both technical and business points of view. The Unified Service Description Language (USDL) provides a new way to describe Internet services from business, operational, and technical perspectives. Nevertheless, there are various issues with USDL: it lacks a comprehensive specification model, particularly for cloud services, lacks a user-centric specification modeling paradigm, lacks a mechanism to measure cloud service attributes and to present the association relationship and re-usability of the attributes, and lacks semantic representation of cloud services. Based on the above issues, we propose a unified semantic Cloud Service Description Model (CSDM) in this paper. The proposed model will be extended from the basic structure of USDL, by defining cloud-service-specific attributes. Furthermore, an additional module, named transaction module, will be defined, which models the rating system of cloud services from several aspects, such as risk, trust, and reputation. The transaction module facilitates the capability of CSDM with regard to service ranking, and enhances its flexibility and extensibility by providing an extensible sub-module. In addition, we design an OWL-based annotation system to enrich the semantic expressivity of this model. Finally, a case study is provided to explain the application of this model in actual cloud services.

Keywordscloud service; service description model; USDL; CSDM
ANZSRC Field of Research 2020460999. Information systems not elsewhere classified
Public Notes

© 2018 IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works.

Byline AffiliationsVictoria University
School of Management and Enterprise
Institution of OriginUniversity of Southern Queensland
Permalink -

https://research.usq.edu.au/item/q50v7/cloud-service-description-model-an-extension-of-usdl-for-cloud-services

  • 222
    total views
  • 10
    total downloads
  • 1
    views this month
  • 0
    downloads this month

Export as

Related outputs

An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors
Li, Lin, Mai, Yunqi, Chu, Yu, Tao, Xiaohui and Yong, Jiaming. 2024. "An Urban Air Quality Prediction Model based on Dynamic Correlation of Influencing Factors." N., Shen W.Shen W.Barthes J.-P.Luo J.Qiu T.Zhou X.Zhang J.Zhu H.Peng K.Xu T.Chen (ed.) 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2024 ). Tianjin, China 08 - 10 May 2024 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CSCWD61410.2024.10580204
Computational Personality Analysis with Interpretability Empowered Prediction
Elmahalaw, Ahmed R., Li, Lin, Wu, Xiaohua, Tao, Xiaohui and Yong, Jianming. 2024. "Computational Personality Analysis with Interpretability Empowered Prediction." 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2024 ). Tianjin, China 08 - 10 May 2024 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CSCWD61410.2024.10580811
BADFSS: Backdoor Attacks on Federated Self-Supervised Learning
Zhang, Jiale, Zhu, Chengcheng, Wu, Di, Sun, Xiaobing, Yong, Jianming and Long, Guodong. 2024. "BADFSS: Backdoor Attacks on Federated Self-Supervised Learning." Larson, Kate (ed.) 33rd International Joint Conference on Artificial Intelligence (IJCAI-24). Jeju, Korea 03 - 09 Aug 2024 Korea. https://doi.org/10.24963/ijcai.2024/61
CrossDeFi: A Novel Cross-Chain Communication Protocol
Mohammed Abdul, Shezon Saleem, Shrestha, Anup and Yong, Jianming. 2024. "CrossDeFi: A Novel Cross-Chain Communication Protocol." Future Internet. 16 (9). https://doi.org/10.3390/fi16090314
An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network
Siuly, Siuly, Khare, Smith K., Kabir, Enamul, Sadiq, Muhammad Tariq and Wang, Hua. 2024. "An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network." Computers in Biology and Medicine. 174. https://doi.org/10.1016/j.compbiomed.2024.108462
Graph-Enabled Reinforcement Learning for Time Series Forecasting With Adaptive Intelligence
Shaik, Thanveer, Tao, Xiaohui, Xie, Haoran, Li, Lin, Yong, Jianming and Li, Yuefeng. 2024. "Graph-Enabled Reinforcement Learning for Time Series Forecasting With Adaptive Intelligence." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (4), pp. 2908-2918. https://doi.org/10.1109/TETCI.2024.3398024
Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization
Sello, Buti, Yong, Jianming and Tao, Xiaohui. 2024. "Erdos: A Novel Blockchain Consensus Algorithm with Equitable Node Selection and Deterministic Block Finalization." Data Science and Engineering. https://doi.org/10.1007/s41019-024-00251-0
Optimal Treatment Strategies for Critical Patients with Deep Reinforcement Learning
Job, Simi, Tao, Xiaohui, Li, Lin, Xie, Haoran, Cai, Taotao, Yong, Jianming and Li, Qing. 2024. "Optimal Treatment Strategies for Critical Patients with Deep Reinforcement Learning ." ACM Transactions on Intelligent Systems and Technology. 15 (2), pp. 1-22. https://doi.org/10.1145/3643856
Developing a sustainable road-rail multimodal distribution network for improved animal welfare and meat quality under carbon tax in Queensland, Australia
Babagolzadeh, Mahla, Zhang, Yahua, Yu, Hang, Yong, Jianming, Kille, Tarryn and Shrestha, Anup. 2024. "Developing a sustainable road-rail multimodal distribution network for improved animal welfare and meat quality under carbon tax in Queensland, Australia." Case Studies on Transport Policy. 17 (2024). https://doi.org/https://doi.org/10.1016/j.cstp.2024.101224
Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease
Siuly, Siuly, Alcin, Ömer Faruk, Wang, Hua, Li, Yan and Wen, Peng. 2024. "Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease ." IEEE Transactions on Emerging Topics in Computational Intelligence. 8 (2), pp. 1609-1623. https://doi.org/10.1109/TETCI.2024.3353610
Color adjustable, mechanically robust, flame-retardant and weather-resistant TiO2/MMT/CNF hierarchical nanocomposite coatings toward intelligent fire cyclic warning and protection
Shen, Yan-Bin, Yu, Ke-Xin, Wang, Ye-Jun, Qu, Yun-Hao, Pan, Long-Qian, Cao, Cheng-Fei, Cao, Kun, Gao, Jie-Feng, Shi, Yongqian, Song, Pingan, Yong, Jianming, Hong, Min, Zhang, Guo-Dong, Zhao, Li and Tang, Long-Cheng. 2024. "Color adjustable, mechanically robust, flame-retardant and weather-resistant TiO2/MMT/CNF hierarchical nanocomposite coatings toward intelligent fire cyclic warning and protection." Composites Part B: Engineering. 271. https://doi.org/10.1016/j.compositesb.2023.111159
Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion
Shaik, Thanveer, Tao, Xiaohui, Li, Lin, Higgins, Niall, Gururajan, Raj, Zhou, Xujuan and Yong, Jianming. 2024. "Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion." Pattern Recognition Letters. 177. https://doi.org/10.1016/j.patrec.2023.12.004
Machine learning for expediting next-generation of fire-retardant polymer composites
Jafari, Pooya, Zhang, Ruoran, Huo, Siqi, Wang, Qingsheng, Yong, Jianming, Hong, Min, Deo, Ravinesh, Wang, Hao and Song, Pingan. 2024. "Machine learning for expediting next-generation of fire-retardant polymer composites." Composites Communications. 45. https://doi.org/10.1016/j.coco.2023.101806
Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva Raj. 2023. "Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification." 12th International Conference on Health Information Science (HIS 2023). Melbourne, Australia 23 - 24 Oct 2023 Singapore. https://doi.org/10.1007/978-981-99-7108-4_10
The Impact on Employability by COVID-19 Pandemic - AI Case Studies
Bandi, Venkata Bharath, Tao, Xiaohui, Shaik, Thanveer, Yong, Jianming and Zhang, Ji. 2023. "The Impact on Employability by COVID-19 Pandemic - AI Case Studies ." 24th International Conference on Web Information Systems Engineering (WISE 2023). Melbourne, Australia 25 - 27 Oct 2023 Singapore . Springer. https://doi.org/10.1007/978-981-99-7254-8_66
Interrelated feature selection from health surveys using domain knowledge graph
Jaworsky, Markian, Tao, Xiaohui, Pan, Lei, Pokhrel, Shiva Raj, Yong, Jianming and Zhang, Ji. 2023. "Interrelated feature selection from health surveys using domain knowledge graph." Health Information Science and Systems. 11. https://doi.org/10.1007/s13755-023-00254-7
The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks
Khan, Danish, Zhou, Xujuan and Yong, Jianming. 2023. "The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00050
Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2023. "Decentralized Blockchain Network." 2022 Tenth International Conference on Advanced Cloud and Big Data (CBD). Guilin, China 04 - 05 Nov 2022 China. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/CBD58033.2022.00049
Exploring deep residual network based features for automatic schizophrenia detection from EEG
Siuly, Siuly, Guo, Yanhui, Alcin, Omer Faruk, Li, Yan, Wen, Peng and Wang, Hua. 2023. "Exploring deep residual network based features for automatic schizophrenia detection from EEG." Physical and Engineering Sciences in Medicine. 46 (2), pp. 561-574. https://doi.org/10.1007/s13246-023-01225-8
The Integral Role of Intelligent IoT System, Cloud Computing, Artificial Intelligence, and 5G in the User-Level Self-Monitoring of COVID-19
Ahmed, Sajjad, Yong, Jianming and Shrestha, Anup. 2023. "The Integral Role of Intelligent IoT System, Cloud Computing, Artificial Intelligence, and 5G in the User-Level Self-Monitoring of COVID-19." Electronics. 12 (8), pp. 1-24. https://doi.org/10.3390/electronics12081912
Topic Integrated Opinion-Based Drug Recommendation With Transformers
Job, Simi, Tao, Xiaohui, Li, Y., Li, Lin and Yong, Jianming. 2023. "Topic Integrated Opinion-Based Drug Recommendation With Transformers ." IEEE Transactions on Emerging Topics in Computational Intelligence. 7 (6), pp. 1676-1686. https://doi.org/10.1109/TETCI.2023.3246559
Internet penetration and airline pricing: Evidence from China
Huang, Zhibin, Yong, Jianming, Ma, Wenliang, Chen, Mengying, Xiong, Zihan and Shrestha, Anup. 2022. "Internet penetration and airline pricing: Evidence from China." Transport Policy. 123, pp. 104-111. https://doi.org/10.1016/j.tranpol.2022.04.017
Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results
Ghimire, Sujan, Deo, Ravinesh C., Wang, Hua, Al-Musaylh, Mohanad S., Casillas-Perez, David and Salcedo-sanz, Sancho. 2022. "Stacked LSTM Sequence-to-Sequence Autoencoder with Feature Selection for Daily Solar Radiation Prediction: A Review and New Modeling Results." Energies. 15 (3), pp. 1-39. https://doi.org/10.3390/en15031061
Towards a user-level self-management of COVID-19 using mobile devices supported by Artificial Intelligence, 5G and the Cloud
Ahmed, Sajjad, Shrestha, Anup and Yong, Jianming. 2021. "Towards a user-level self-management of COVID-19 using mobile devices supported by Artificial Intelligence, 5G and the Cloud." Siuly, Siuly, Wang, Hua, Chen, Lu, Guo, Yanhui and Xing, Chunxiao (ed.) 10th International Conference on Health Information Science (HIS 2021). Melbourne, Australia 25 - 28 Oct 2021 Switzerland. https://doi.org/10.1007/978-3-030-90885-0_4
Automated Knowledge Graph Construction for Healthcare Domain
Jaworsky, Markian, Tao, Xiaohui, Yong, Jianming, Pan, Lei, Zhang, Ji and Pokhrel, Shiva. 2022. "Automated Knowledge Graph Construction for Healthcare Domain." 11th International Conference on Health Information Science (HIS 2022). Biarritz, France 28 - 30 Oct 2022 Switzerland . https://doi.org/10.1007/978-3-031-20627-6_24
A Secured Movie Recommendation System using Decentralized Blockchain Network
Abduljabbar, Tamara Abdulmunim, Tao, Xiaohui, Zhang, Ji, Yong, Jianming and Zhou, Xujuan. 2022. "A Secured Movie Recommendation System using Decentralized Blockchain Network." 9th International Conference on Behavior, Economic and Social Computing (BESC 2022). Matsuyama, Japan 29 202 - 31 Oct 2022 United States. IEEE (Institute of Electrical and Electronics Engineers). https://doi.org/10.1109/BESC57393.2022.9995357
Personalised drug prescription for dental clinics using word embedding
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Oh, Xue Ling and Goh, Elizabeth Zhixin. 2020. "Personalised drug prescription for dental clinics using word embedding." Hou U, Leong, Yang, Jian, Cai, Yi, Karlapalem, Kamalakar, Liu, An and Huang, Xin (ed.) 20th International Conference on Web Information Systems Engineering (WISE 2019): Workshop, Demo and Tutorial. Hong Kong, China 19 - 22 Jan 2020 Singapore. https://doi.org/10.1007/978-981-15-3281-8_5
MeKG: building a medical knowledge graph by data mining from MEDLINE
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhou, Xujuan and Gururajan, Raj. 2019. "MeKG: building a medical knowledge graph by data mining from MEDLINE." Liang, Peipeng, Goel, Vinod and Shan, Chunlei (ed.) 12th International Conference on Brain Informatics (BI 2019). Haikou, China 13 - 15 Dec 2019 Switzerland. Springer. https://doi.org/10.1007/978-3-030-37078-7_16
Mining heterogeneous information graph for health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Cai, Yi. 2018. "Mining heterogeneous information graph for health status classification." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 United States. https://doi.org/10.1109/BESC.2018.8697292
Exploring the use of a network model in drug prescription support for dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Qin, Yongrui, Goh, Elizabeth Zhixin and Hu, Aimin. 2018. "Exploring the use of a network model in drug prescription support for dental clinics." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Piscataway, NJ, United States. https://doi.org/10.1109/BESC.2018.00042
Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure
Mahalle, Abhishek, Yong, Jianming, Tao, Xiaohui and Shen, Jun. 2018. "Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465318
Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining
Peng, Min, Ouyang, Shuang, Zhu, Jiahui, Huang, Jiajia, Wang, Hua and Yong, Jianming. 2018. "Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465166
Block Bayesian Sparse Topical Coding
Peng, Min, Shi, Hongliang, Xie, Qianqian, Zhang, Yihan, Wang, Hua, Li, Zhaoyunfei and Yong, Jianming. 2018. "Block Bayesian Sparse Topical Coding." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465366
Data Fusion for MaaS: Opportunities and Challenges
Wu, Jianqing, Zhou, Luping, Cai, Chen, Shen, Jun, Lau, Sim Kim and Yong, Jianming. 2018. "Data Fusion for MaaS: Opportunities and Challenges." 2018 IEEE 22nd International Conference on Computer Supported Cooperative Work in Design. Nanjing, China 09 - 11 May 2018 United States. https://doi.org/10.1109/CSCWD.2018.8465224
Challenges and issues that are perceived to influence cloud computing adoption in local government councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2017. "Challenges and issues that are perceived to influence cloud computing adoption in local government councils." 21st International Conference on Computer Supported Cooperative Work in Design (CSCWD 2017). Wellington, New Zealand 26 - 28 Apr 2017 https://doi.org/10.1109/CSCWD.2017.8066659
Graph-based multi-label disease prediction model learning from medical data and domain knowledge
Pham, Thuan, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Li, Yuefeng and Xie, Haoran. 2022. "Graph-based multi-label disease prediction model learning from medical data and domain knowledge." Knowledge-Based Systems. 235, pp. 1-15. https://doi.org/10.1016/j.knosys.2021.107662
Mobile-based learning of drug prescription for medical education using artificial intelligence techniques
Tao, Xiaohui, Goh, Wee Pheng, Zhang, Ji, Yong, Jianming, Goh, Elizabeth Zhixin and Oh, Xueling. 2021. "Mobile-based learning of drug prescription for medical education using artificial intelligence techniques." International Journal of Mobile Learning and Organisation. 15 (4), pp. 392-408. https://doi.org/10.1504/IJMLO.2021.118436
IT investment governance and corporate governance: perspective and approach
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "IT investment governance and corporate governance: perspective and approach." 7th International Conference on Behavioural and Social Computing (BESC 2020). Bournemouth, United Kingdom 05 - 07 Nov 2020 Piscataway, NJ, United States. https://doi.org/10.1109/BESC51023.2020.9348312
Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Challenges and mitigation for application deployment over SaaS platform in banking and financial services industry." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437798
Regulatory challenges and mitigation for account services offered by FinTech
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2021. "Regulatory challenges and mitigation for account services offered by FinTech." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Shi, Yanjun and Zhang, Jinghui (ed.) IEEE 24th International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2021). Dalian, China 05 - 07 May 2021 Piscataway, United States. https://doi.org/10.1109/CSCWD49262.2021.9437631
Special issue on “Artificial Intelligence in Health Informatics”
Siuly, Siuly, Aickelin, Uwe, Kabir, Enamul, Huang, Zhisheng and Zhang, Yanchun. 2021. "Special issue on “Artificial Intelligence in Health Informatics”." Health Information Science and Systems. 9 (1), pp. 1-4. https://doi.org/10.1007/s13755-021-00155-7
Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Farhan, Muhammad and Mahmood, Umar. 2021. "Process of Security Assurance Technique for Application Functional Logic in E-Commerce Systems." Journal of Information Security. 12 (3), pp. 189-211. https://doi.org/10.4236/jis.2021.123010
Security aspects in modern service component‑oriented application logic for social e‑commerce systems
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Security aspects in modern service component‑oriented application logic for social e‑commerce systems." Social Network Analysis and Mining. 11 (1). https://doi.org/10.1007/s13278-020-00717-9
Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Farhan, Muhammad and Naseem, Nauman. 2021. "Organizing Classification of Application Logic Attacks in Component-based E-Commerce Systems." Journal of Computer Science. 17 (11), pp. 1046-1057. https://doi.org/10.3844/JCSSP.2021.1046.1058
Classification of alcoholic EEG signals using a deep learning method
Farsi, Leila, Siuly, Siuly, Kabir, Enamul and Wang, Hua. 2021. "Classification of alcoholic EEG signals using a deep learning method." IEEE Sensors Journal. 21 (3), pp. 3552 - 3560. https://doi.org/10.1109/JSEN.2020.3026830
Concepts of Safety Critical Systems Unification Approach & Security Assurance Process
Nabi, Faisal, Yong, Jianming, Tao, Xiaohui, Malhi, Muhammad Saqib, Mahmood, Umar and Iqbal, Usman. 2020. "Concepts of Safety Critical Systems Unification Approach & Security Assurance Process." Journal of Information Security. 11 (4), pp. 292-303. https://doi.org/10.4236/jis.2020.114018
Classification of logical vulnerability based on group attack method
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2021. "Classification of logical vulnerability based on group attack method." Journal of Ubiquitous Systems and Pervasive Networks. 14 (1), pp. 19-26. https://doi.org/10.5383/JUSPN.14.01.004
The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space." Applied Soft Computing. 97 (Part A), pp. 1-14. https://doi.org/10.1016/j.asoc.2020.106805
Finding an optimum set of roles in a CPAC model
Kabir, Enamul, Wang, Hua and Sun, Lili. 2019. "Finding an optimum set of roles in a CPAC model." 2019 International Conference on Networking and Network Applications (NaNA 2019). Daegu City, Korea 10 - 13 Oct 2019 Piscataway, United States. https://doi.org/10.1109/NaNA.2019.00014
A preliminary study for the risk of probabilistic blockchain protocols
Sello, Buti, Tao, Xiaohui and Yong, Jianming. 2019. "A preliminary study for the risk of probabilistic blockchain protocols." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963205
Protecting privacy in digital era on cloud architecture for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Protecting privacy in digital era on cloud architecture for banking and financial services industry." 6th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2019). Beijing, China 28 - 30 Oct 2019 New York, United States. https://doi.org/10.1109/BESC48373.2019.8963459
Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Ethics of IT security team for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791928
Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2019. "Insider threat and mitigation for cloud architecture infrastructure in banking and financial services industry." 23rd IEEE International Conference on Computer Supported Cooperative Work in Design (IEEE CSCWD 2019). Porto, Portugal 06 - 08 May 2019 New York, United States. https://doi.org/10.1109/CSCWD.2019.8791906
ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry
Mahalle, Abhishek, Yong, Jianming and Tao, Xiaohui. 2018. "ITIL processes to control operational risk in cloud architecture infrastructure for banking and financial services industry." 5th International Conference on Behavioral, Economic, and Socio-Cultural Computing (BESC 2018). Kaohsiung, Taiwan 12 - 14 Nov 2018 Los Alamitos, CA, United States. https://doi.org/10.1109/BESC.2018.8697294
The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)
Zhou, Xiangmin, Zhang, Ji and Zhang, Yanchun. 2019. "The 1st International Workshop on Context-Aware Recommendation Systems with Big Data Analytics (CARS-BDA)." 12th ACM International Conference on Web Search and Data Mining (WSDM 2019). Melbourne, Australia 11 - 15 Feb 2019 New York, United States. https://doi.org/10.1145/3289600.3291372
Ensemble neural network approach detecting pain intensity from facial expressions
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffrey, Whittaker, Frank and Wang, Hua. 2020. "Ensemble neural network approach detecting pain intensity from facial expressions." Artificial Intelligence in Medicine. 109, pp. 1-12. https://doi.org/10.1016/j.artmed.2020.101954
Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication
Vimalachandran, Pasupathy, Zhang, Yanchun, Cao, Jinli, Sun, Lili and Yong, Jianming. 2018. "Preserving Data Privacy and Security in Australian My Health Record System : A Quality Health Care Implication." 19th International Conference on Web Information Systems Engineering (WISE 2018). Dubai, United Arab Emirates 12 - 15 Nov 2018 Germany. Springer. https://doi.org/10.1007/978-3-030-02925-8_8
A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals
Siuly, Siuly, Alcin, Omer Faruk, Kabir, Enamul, Sengur, Abdulkadir, Wang, Hua, Zhang, Yanchun and Whittaker, Frank. 2020. "A new framework for automatic detection of patients with mild cognitive impairment using resting-state EEG signals." IEEE Transactions on Neural Systems and Rehabilitation Engineering. 28 (9), pp. 1966-1976. https://doi.org/10.1109/TNSRE.2020.3013429
A security review of event-based application function and service component architecture
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A security review of event-based application function and service component architecture." International Journal of Systems and Software Security and Protection. 11 (2), pp. 58-70. https://doi.org/10.4018/IJSSSP.2020070104
Feature-Based Learning in Drug Prescription System for Medical Clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Feature-Based Learning in Drug Prescription System for Medical Clinics." Neural Processing Letters. 52, pp. 1703-1721. https://doi.org/10.1007/s11063-020-10296-7
Classification of Logical Vulnerability Based on Group Attacking Method
Nabi, Faisal, Yong, Jianming and Tao, Xaiohui. 2020. "Classification of Logical Vulnerability Based on Group Attacking Method." 11th International Conference on Ambient Systems, Networks and Technologies (ANT 2020). Warsaw Poland 06 - 09 Apr 2020 Netherlands. https://doi.org/10.1016/j.procs.2020.03.109
Mining health knowledge graph for health risk prediction
Tao, Xiaohui, Pham, Thuan, Zhang, Ji, Yong, Jianming, Goh, Wee Pheng, Zhang, Wenping and Cai, Yi. 2020. "Mining health knowledge graph for health risk prediction." World Wide Web. 23 (4), pp. 2341-2362. https://doi.org/10.1007/s11280-020-00810-1
Constructing a knowledge-based heterogeneous information graph for medical health status classification
Pham, Thuan, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2020. "Constructing a knowledge-based heterogeneous information graph for medical health status classification." Health Information Science and Systems. 8 (1). https://doi.org/10.1007/s13755-020-0100-6
Enhanced deep learning algorithm development to detect pain intensity from facial expression images
Bargshady, Ghazal, Zhou, Xujuan, Deo, Ravinesh C., Soar, Jeffery, Whittaker, Frank and Wang, Hua. 2020. "Enhanced deep learning algorithm development to detect pain intensity from facial expression images." Expert Systems with Applications. 149, pp. 1-10. https://doi.org/10.1016/j.eswa.2020.113305
Proposing a secure component-based-application logic and system’s integration testing approach
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2019. "Proposing a secure component-based-application logic and system’s integration testing approach." International Journal of Information and Electronics Engineering. 11 (1), pp. 25-39. https://doi.org/10.6636/IJEIE.20190911(1).04
A study on securing software defined networks
Ur Rasool, Raihan, Wang, Hua, Rafique, Wajid, Yong, Jianming and Cao, Jinli. 2017. "A study on securing software defined networks." 18th International Conference on Web Information Systems Engineering - WISE 2017. Puschino, Russia 07 - 11 Oct 2017 Switzerland. https://doi.org/10.1007/978-3-319-68786-5
A novel approach for component based application logic event attack modeling
Nabi, Faisal, Yong, Jianming and Tao, Xiaohui. 2020. "A novel approach for component based application logic event attack modeling." International Journal of Network Security. 22 (3), pp. 437-443.
A new design of mental state classification for subject independent BCI systems
Joadder, Md. A. M., Siuly, S., Kabir, E., Wang, H. and Zhang, Y.. 2019. "A new design of mental state classification for subject independent BCI systems." IRBM. 40 (5), pp. 297-305. https://doi.org/10.1016/j.irbm.2019.05.004
A novel statistical technique for intrusion detection systems
Kabir, Enamul, Hu, Jiankun, Wang, Hua and Zhou, Guangping. 2018. "A novel statistical technique for intrusion detection systems." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 79, pp. 303-318. https://doi.org/10.1016/j.future.2017.01.029
Special issue on service-oriented collaborative computing and applications
Yong, Jianming, Fortino, Giancarlo, Shen, Weiming, Yang, Yun, Chao, Kuo-Ming and van der Aalst, Wil. 2018. "Special issue on service-oriented collaborative computing and applications." IEEE Transactions on Services Computing. 11 (2), pp. 277-278. https://doi.org/10.1109/TSC.2017.2764559
MLaaS: a cloud-based system for delivering adaptive micro learning in mobile MOOC learning
Sun, Geng, Cui, Tingru, Yong, Jianming, Shen, Jun and Chen, Shiping. 2018. "MLaaS: a cloud-based system for delivering adaptive micro learning in mobile MOOC learning." IEEE Transactions on Services Computing. 11 (2), pp. 292-305. https://doi.org/10.1109/TSC.2015.2473854
Trustworthy service composition with secure data transmission in sensor networks
Zhang, Tao, Zheng, Lele, Wang, Yongzhi, Shen, Yulong, Xi, Ning, Ma, Jianfeng and Yong, Jianming. 2018. "Trustworthy service composition with secure data transmission in sensor networks." World Wide Web. 21 (1), pp. 185-200. https://doi.org/10.1007/s11280-017-0465-x
Drug prescription support in dental clinics through drug corpus mining
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji, Yong, Jianming, Zhang, Wenping and Xie, Haoran. 2018. "Drug prescription support in dental clinics through drug corpus mining." International Journal of Data Science and Analytics. 6 (4), pp. 341-349. https://doi.org/10.1007/s41060-018-0149-3
A joint deep neural network model for pain recognition from face
Bargshady, Ghazal, Soar, Jeffrey, Zhou, Xujuan, Deo, Ravinesh, Whittaker, Frank and Wang, Hua. 2019. "A joint deep neural network model for pain recognition from face." 4th IEEE International Conference on Computer and Communication Systems (ICCCS 2019). Singapore 23 - 25 Feb 2019 Singapore. pp. 52-56 https://doi.org/10.1109/CCOMS.2019.8821779
Mining drug properties for decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2017. "Mining drug properties for decision support in dental clinics." Kim, J., Shim, K., Cao, L., Lee, J., Lin, X. and Moon, Y. (ed.) 21st Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2017). Jeju, South Korea 23 - 26 May 2017 Germany. Springer. https://doi.org/10.1007/978-3-319-57529-2_30
An analysis system detecting epileptic seizure from EEG
Kabir, Enamul and Wang, Hua. 2017. "An analysis system detecting epileptic seizure from EEG." 2017 Young Statisticians Conference: Modelling Our Future. Tweed Heads, Australia 26 - 27 Sep 2017 Australia.
A computer aided analysis scheme for detecting epileptic seizure from EEG data
Kabir, Enamul, Siuly, Siuly, Cao, Jinli and Wang, Hua. 2018. "A computer aided analysis scheme for detecting epileptic seizure from EEG data." International Journal of Computational Intelligence Systems. 11, pp. 663-671. https://doi.org/10.2991/ijcis.11.1.51
Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments
Qin, Yongrui, Wang, Hua and Sun, Lili. 2011. "Cluster-based scheduling algorithm for periodic XML data broadcast in wireless environments ." Zhang, Yanchun (ed.) 25th IEEE International Conference on Advanced Information Networking and Applications (WAINA 2011). Biopolis, Singapore 22 - 25 Mar 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/WAINA.2011.60
Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Yong, Jianming, Soar, Jeffrey and McClymont, Hoda. 2015. "Level of policy for cloud computing adoption in Australian regional municipal governments: an exploratory study." Arabnia, Hamid R., Gravvanis, George A., Solo, Ashu M. G. and Tinetti, Fernando G. (ed.) 2015 International Conference on Grid & Cloud Computing and Applications (GCA'15). Las Vegas, United States 27 - 30 Jul 2015 United States.
On secure wireless communications for IoT under eavesdropper collusion
Zhang, Yuanyu, Shen, Yulong, Wang, Hua, Yong, Jianming and Jiang, Xiaohong. 2016. "On secure wireless communications for IoT under eavesdropper collusion." IEEE Transactions on Automation Science and Engineering. 13 (3), pp. 1281-1293. https://doi.org/10.1109/TASE.2015.2497663
EEG signal analysis and classification: techniques and applications
Siuly, Siuly, Li, Yan and Zhang, Yanchun. 2017. EEG signal analysis and classification: techniques and applications. Switzerland. Springer.
Editorial
Wang, Hua and Jia, Xiaohua. 2012. "Editorial." Journal of Software. 7 (11), pp. 2387-2388.
Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process
Bao, Jinrong, Lu, Yue, Li, Wenxian, Wang, Hua and Yu, Ranbo. 2014. "Synthesis and photoluminescence of nano/ microstructured Y0.95Eu0.05PO4 via hydrothermal process." Optoelectronics and Advanced Materials, Rapid Communications. 8 (1-2), pp. 18-22.
Extended economic models for information systems balance theory
Yong, Jianming and Finger, Susan. 2014. "Extended economic models for information systems balance theory." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2014.6846885
Positive Influence Dominating Set Games
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji, Yi, Xun and Yong, Jianming. 2014. "Positive Influence Dominating Set Games." Hou, Jiang-Liang, Trappey, Amy J. C., Wu, Chien-Wei, Chang, Kuo-Hao, Liao, Chuing-Shou, Shen, Wei-Ming, Barthes, Jean-Paul and Luo, Jun-Zhou (ed.) 18th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2014). Hsinchu, Taiwan 21 - 23 May 2014 United States. https://doi.org/10.1109/CSCWD.2014.6846890
A High Availability Application Service Platform for nuclear power enterprises
Sun, Zhe, Jin, He, Yong, Jianming, Al-Ismaili, Salim, Li, Changyin and Shen, Jun. 2016. "A High Availability Application Service Platform for nuclear power enterprises." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566060
Access control management with provenance in healthcare environments
Ma, Taotao, Wang, Hua, Cao, Jinli, Yong, Jianming and Zhao, Yueai. 2016. "Access control management with provenance in healthcare environments." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCDW 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566048
Improved media management through cloud computing technology
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "Improved media management through cloud computing technology." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7566004
NSSSD: a new semantic hierarchical storage for sensor data
Gheisari, Mehdi, Movassagh, Ali Akbar, Qin, Yongrui, Yong, Jianming, Tao, Xiaohui, Zhang, Ji and Shen, Haifeng. 2016. "NSSSD: a new semantic hierarchical storage for sensor data." 20th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016). Nanchang, China 04 - 06 May 2016 United States. https://doi.org/10.1109/CSCWD.2016.7565984
Sentiment analysis for depression detection on social networks
Tao, Xiaohui, Zhou, Xujuan, Zhang, Ji and Yong, Jianming. 2016. "Sentiment analysis for depression detection on social networks." Li, Jinyan, Li, Xue, Wang, Xue, Li, Jianxin and Sheng, Quan Z. (ed.) 12th International Conference on Advanced Data Mining and Applications (ADMA 2016). Gold Coast, QLD, Australia 12 - 15 Dec 2016 Switzerland. https://doi.org/10.1007/978-3-319-49586-6_59
Cloud computing adoption in regional councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. Cloud computing adoption in regional councils. University of Southern Queensland.
An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of anticipated benefits of cloud computing adoption in Australian regional municipal governments." The Services Transactions on Cloud Computing. 3 (3), pp. 13-24.
Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing
Kabir, Md Enamul, Mahmood, Abdun Naser, Mustafa, Abdul K. and Wang, Hua. 2020. "Microaggregation sorting framework for k-anonymity statistical disclosure control in cloud computing." IEEE Transactions on Cloud Computing. 8 (2), pp. 408-417. https://doi.org/10.1109/TCC.2015.2469649
Factors to be considered in Cloud computing adoption
Ali, Omar, Soar, Jeffrey, Yong, Jianming and Tao, Xiaohui. 2016. "Factors to be considered in Cloud computing adoption." Web Intelligence. 14 (4), pp. 309-323. https://doi.org/10.3233/WEB-160347
A local field correlated and Monte Carlo based shallow neural network model for nonlinear time series prediction
Zhou, Qingguo, Chen, Huaming, Zhao, Hong, Zhang, Gaofeng, Yong, Jianming and Shen, Jun. 2016. "A local field correlated and Monte Carlo based shallow neural network model for nonlinear time series prediction." EAI Endorsed Transactions on Scalable Information Systems. 16 (8), pp. 1-7. https://doi.org/10.4108/eai.9-8-2016.151634
Drawing micro learning into MOOC: using fragmented pieces of time to enable effective entire course learning experiences
Sun, Geng, Cui, Tingru, Shen, Jun, Yong, Jianming and Chen, Shiping. 2015. "Drawing micro learning into MOOC: using fragmented pieces of time to enable effective entire course learning experiences." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7230977
Causal dependencies of provenance data in healthcare environment
Ma, Taotao, Yong, Jianming, Wang, Hua and Zhao, Yueai. 2015. "Causal dependencies of provenance data in healthcare environment." Fortino, Giancarlo, Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio, Abel, Marie-Helene, Guerrieri, Antonio and Ramos, Milton (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 https://doi.org/10.1109/CSCWD.2015.7231033
A study of drug interaction for personalised decision support in dental clinics
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2015. "A study of drug interaction for personalised decision support in dental clinics." 2015 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT 2015). Singapore 06 - 09 Dec 2015 https://doi.org/10.1109/WI-IAT.2015.28
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment
Qin, Yongrui, Wang, Hua, Zhang, Ji, Tao, Xiaohui, Zhang, Wei Emma, Taylor, Kerry and Sheng, Quan Z.. 2015. "Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment." 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS 2015). Melbourne, Australia 14 - 17 Dec 2015 Australia. https://doi.org/10.1109/ICPADS.2015.96
Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study
Ali, Omar, Soar, Jeffrey, Yong, Jianming, McClymont, Hoda and Angus, Daniel. 2015. "Collaborative cloud computing adoption in Australian regional municipal government: an exploratory study." Fortino, Giancarlo, Shen, Weiming, Barthès, Jean-Paul A., Luo, Junzhou, Li, Wenfeng, Ochoa, Sergio F., Abel, Marie-Hélène, Guerrieri, Antonio and Ramos, Milton Pires (ed.) 19th IEEE International Conference on Computer Supported Cooperative Work in Design (CSCWD 2015). Calabria, Italy 06 - 08 May 2015 United States. https://doi.org/10.1109/CSCWD.2015.7231017
An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2016. "An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Information Security and Applications. 27-28, pp. 19-34. https://doi.org/10.1016/j.jisa.2015.11.006
Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study
Ali, Omar, Soar, Jeffrey, McClymont, Hoda, Yong, Jianming and Biswas, Jit. 2015. "Anticipated benefits of cloud computing adoption in Australian regional municipal governments: an exploratory study." 19th Pacific Asia Conference on Information Systems (PACIS 2015). Singapore 05 - 09 Jul 2015
Decision support systems for adoption in dental clinics: a survey
Goh, Wee Pheng, Tao, Xiaohui, Zhang, Ji and Yong, Jianming. 2016. "Decision support systems for adoption in dental clinics: a survey." Knowledge-Based Systems. 104, pp. 195-206. https://doi.org/10.1016/j.knosys.2016.04.022
Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments
Ali, Omar, Soar, Jeffrey, Yong, Jianming and McClymont, Hoda. 2015. "Exploratory study to investigate the factors influencing the adoption of cloud computing in Australian regional municipal governments." Journal of Art Media and Technology. 1 (1), pp. 1-13.
An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2015. "An investigation of the main factors to be considered in cloud computing adoption in Australian regional local councils." Journal of Contemporary Issues in Business and Government. 21 (1), pp. 72-93. https://doi.org/10.7790/cibg.v21i1.23
Epileptic seizure detection from EEG signals using logistic model trees
Kabir, Enamul, Siuly, . and Zhang, Yanchun. 2016. "Epileptic seizure detection from EEG signals using logistic model trees." Brain Informatics. 3 (2), pp. 93-100. https://doi.org/10.1007/s40708-015-0030-2
Exploring sampling in the detection of multicategory EEG signals
Siuly, Siuly, Kabir, Enamul, Wang, Hua and Zhang, Yanchun. 2015. "Exploring sampling in the detection of multicategory EEG signals." Computational and Mathematical Methods in Medicine. 2015. https://doi.org/10.1155/2015/576437
On efficient and robust anonymization for privacy protection on massive streaming categorical information
Zhang, Ji, Li, Hongzhou, Liu, Xuemei, Luo, Yonglong, Chen, Fulong, Wang, Hua and Chang, Liang. 2017. "On efficient and robust anonymization for privacy protection on massive streaming categorical information." IEEE Transactions on Dependable and Secure Computing. 14 (5), pp. 507-520. https://doi.org/10.1109/TDSC.2015.2483503
Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2014. "Finding weighted positive influence dominating set to make impact to negatives: a study on online social networks in the new millennium." Kaur, Harleen and Tao, Xiaohui (ed.) ICTs and the millennium development goals: a United Nations perspective. New York, NY. United States. Springer. pp. 67-81
Reducing corruption through e-procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Krishor and Yong, Jianming. 2014. "Reducing corruption through e-procurement." 2013 Annual Statistical Report on United Nations Procurement - Supplement.
Impact of Cloud computing technology on e-government
Ali, Omar, Soar, Jeffrey and Yong, Jianming. 2014. "Impact of Cloud computing technology on e-government." Dregvaite, Giedre and Damasevicius, Robertas (ed.) 20th International Conference on Information and Software Technologies (ICIST 2014). Druskininkai, Lithuania 09 - 10 Oct 2014 Heidelberg, Germany. https://doi.org/10.1007/978-3-319-11958-8_22
A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization
Wei, Jingxuan, Wang, Yuping and Wang, Hua. 2010. "A hybrid particle swarm evolutionary algorithm for constrained multi-objective optimization." Computing and Informatics. 29 (5), pp. 701-708.
Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2014. "Willingness to adopt e-procurement to reduce corruption: results of the PLS path modeling." Transforming Government: People, Process and Policy. 8 (4), pp. 500-520. https://doi.org/10.1108/TG-03-2014-0007
Access control management for e-healthcare in cloud environment
Sun, Lili, Yong, Jianming and Soar, Jeffrey. 2014. "Access control management for e-healthcare in cloud environment." EAI Endorsed Transactions on Scalable Information Systems. 1 (2), pp. 1-11. https://doi.org/10.4108/sis.1.2.e3
Telemedicine and Telemonitoring in Healthcare
Alsgaer, Salmah F. A., Tao, Xiaohui, Zhang, Ji, Wang, Hua and Guo, Zhi. 2013. "Telemedicine and Telemonitoring in Healthcare." Imamura, Kazayuki, Usui, Shiro and Shirao, Tomoaki (ed.) 2013 International Conference on Brain and Health Informatics (BHI 2013). Maebashi, Japan 29 - 31 Oct 2013 Germany. https://doi.org/10.1007/978-3-319-02753-1_20
SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients
Wang, Hua, Zhang, Ji, Soar, Jeffrey, Tao, Xiaohui and Huang, Wei. 2013. "SIMS: Self-adaptive Intelligent Monitoring System for supporting home-based heart failure patients." Biswas, Jit, Kobayashi, Hisato, Wong, Lawrence, Abdulrazak, Bessam and Mokhtari, Mounir (ed.) 11th International Conference on Smart Homes and Health Telematics (ICOST 2013): Inclusive Society: Health and Wellbeing in Ageing-Friendly Community: eHealth, Telemedicine, Chronic Disease Management and Care at Home. Singapore 19 - 21 Jun 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-39470-6_43
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2013. "Effectively delivering XML information in periodic broadcast environments ." Decker, Hendrik, Lhotska, Lenka, Link, Sebastian, Basl, Josef and Tjoa, A. Min (ed.) 24th International Conference on Database and Expert Systems Applications (DEXA 2013). Prague, Czech Republic 26 - 29 Aug 2013 Berlin, Germany. https://doi.org/10.1007/978-3-642-40285-2_16
Minimising k-dominating set in arbitrary network graphs
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhang, Jinhua. 2013. "Minimising k-dominating set in arbitrary network graphs." Motoda, Hiroshi, Wu, Zhaohui, Cao, Longbing, Zaiane, Osmar, Yao, Min and Wang, Wei (ed.) 9th International Conference on Advanced Data Mining and Applications (ADMA 2013). Hangzhou, China 14 - 16 Dec 2013 Heidelberg, Germany. Springer. https://doi.org/10.1007/978-3-642-53917-6_11
SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback
Zhang, Ji, Wang, Hua, Tao, Xiaohui and Sun, Lili. 2013. "SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback." 29th IEEE International Conference on Data Engineering (ICDE 2013). Brisbane, Australia 08 - 11 Apr 2013 Piscataway, NJ. United States. https://doi.org/10.1109/ICDE.2013.6544945
Finding a weighted positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui, Zhang, Ji and Zhu, Guohun. 2013. "Finding a weighted positive influence dominating set in e-learning social networks." International Journal of Computers and Technology. 10 (10), pp. 2136-2145.
A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A self-stabilizing algorithm for finding a minimal positive influence dominating set in social networks." Wang, Hua and Zhang, Rui (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Mapping semantic knowledge for unsupervised text categorisation
Tao, Xiaohui, Li, Yuefeng, Zhang, Ji and Yong, Jianming. 2013. "Mapping semantic knowledge for unsupervised text categorisation." Wang, Hua and Rui, Zhang (ed.) 24th Australasian Database Conference (ADC 2013). Adelaide, Australia 29 Jan - 01 Feb 2013 Sydney, Australia.
Outlier detection from large distributed databases
Zhang, Ji, Wang, Hua and Tao, Xiaohui. 2014. "Outlier detection from large distributed databases." World Wide Web. 17 (4), pp. 539-568. https://doi.org/10.1007/s11280-013-0218-4
Sentiment Analysis on Tweets for Social Events
Zhou, Xujuan, Tao, Xiaohui, Yong, Jianming and Yang, Zhenyu. 2013. "Sentiment Analysis on Tweets for Social Events." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581022
A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2013. "A Self-Stabilizing Protocol for Minimal Weighted Dominating Sets in Arbitrary Networks." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 United States. https://doi.org/10.1109/CSCWD.2013.6581012
Collaborative computing technologies and systems
Yong, Jianming, Shen, Weiming and James, Anne. 2013. "Collaborative computing technologies and systems ." Journal of Systems and Software. 86 (7), pp. 1725-1726. https://doi.org/10.1016/j.jss.2013.03.058
Evaluations of heuristic algorithms for teamwork-enhanced task allocation in mobile cloud-based learning
Sun, Geng, Shen, Jun, Luo, Junzhou and Yong, Jianming. 2013. "Evaluations of heuristic algorithms for teamwork-enhanced task allocation in mobile cloud-based learning ." Shen, Weiming, Li, Weidong, Barthes, Jean-Paul, Luo, Junzhou, Zhu, Haibin, Yong, Jianming and Li, Xiaoping (ed.) IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2013). Whistler, Canada 27 - 29 Jun 2013 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2013.6580979
Effectively delivering XML information in periodic broadcast environments
Qin, Yongrui, Sheng, Quan Z. and Wang, Hua. 2012. Effectively delivering XML information in periodic broadcast environments. Adelaide, Australia. University of Adelaide.
A novel approach to data deduplication over the engineering-oriented cloud systems
Sun, Zhe, Shen, Jun and Yong, Jianming. 2013. "A novel approach to data deduplication over the engineering-oriented cloud systems ." Integrated Computer Aided Engineering. 20 (1), pp. 45-57. https://doi.org/10.3233/ICA-120418
A role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2012. "A role-involved purpose-based access control model." Information Systems Frontiers: a journal of research and innovation. 14 (3), pp. 809-822. https://doi.org/10.1007/s10796-011-9305-1
A purpose-based access control in native XML databases
Sun, Lili and Wang, Hua. 2012. "A purpose-based access control in native XML databases." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1154-1166. https://doi.org/10.1002/cpe.1717
Microdata protection method through microaggregation: a systematic approach
Kabir, Md Enamul and Wang, Hua. 2012. "Microdata protection method through microaggregation: a systematic approach." Journal of Software. 7 (11), pp. 2415-2422. https://doi.org/10.4304/jsw.7.11.2415-2423
Unsupervised multi-label text classification using a world knowledge ontology
Tao, Xiaohui, Li, Yuefeng, Lau, Raymond Y. K. and Wang, Hua. 2012. "Unsupervised multi-label text classification using a world knowledge ontology." Tan, Pang-Ning, Chawla, Sanjay, Ho, Chin Kuan and Bailey, James (ed.) 16th Pacific-Asia Conference on Advances in Knowledge Discovery and Data Mining (PAKDD 2012). Kuala Lumpur, Malaysia 29 May - 01 Jun 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-30217-6_40
A self-stabilizing algorithm for finding a minimal K-dominating set in general networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2012. "A self-stabilizing algorithm for finding a minimal K-dominating set in general networks." Xiang, Yang, Pathan, Mukaddim, Tao, Xiaohui and Wan g, Hua (ed.) 3rd International Conference on Data and Knowledge Engineering (ICDKE 2012). Fujian, China 21 - 23 Nov 2012 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-34679-8_8
Satisfying privacy requirements before data anonymization
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "Satisfying privacy requirements before data anonymization ." The Computer Journal. 55 (4), pp. 422-437. https://doi.org/10.1093/comjnl/bxr028
An approximate microaggregation approach for microdata protection
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2012. "An approximate microaggregation approach for microdata protection." Expert Systems with Applications. 39 (2), pp. 2211-2219. https://doi.org/10.1016/j.eswa.2011.04.223
On the identity anonymization of high-dimensional rating data
Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "On the identity anonymization of high-dimensional rating data." Concurrency and Computation: Practice and Experience. 24 (10), pp. 1108-1122. https://doi.org/10.1002/cpe.1724
Purpose based access control for privacy protection in e-healthcare services
Sun, Lili, Wang, Hua, Soar, Jeffrey and Rong, Chunming. 2012. "Purpose based access control for privacy protection in e-healthcare services." Journal of Software. 7 (11), pp. 2443-2449. https://doi.org/10.4304/jsw.7.11.2443-2449
Cloud computing for higher education: a roadmap
Hossain Masud, Md. Anwar, Yong, Jianming and Huang, Xiaodi. 2012. "Cloud computing for higher education: a roadmap ." Gao, Liang, Shen, Weiming, Barthès, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221872
A survey on bio-inspired algorithms for web service composition
Wang, Lijuan, Shen, Jun and Yong, Jianming. 2012. "A survey on bio-inspired algorithms for web service composition ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221875
Effective pruning for the discovery of conditional functional dependencies
Li, Jiuyong, Liu, Jixue, Toivonen, Hannu and Yong, Jianming. 2013. "Effective pruning for the discovery of conditional functional dependencies." The Computer Journal. 56 (3), pp. 378-392. https://doi.org/10.1093/comjnl/bxs082
Data privacy against composition attack
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Ding, Xiaofeng and Wang, Hua. 2012. "Data privacy against composition attack." Lee, Sang-Goo, Peng, Zhiyong, Zhou, Xiaofang, Moon, Yang-Sae, Unland, Rainer and Yoo, Jaesoo (ed.) 17th International Conference on Database Systems for Advanced Applications (DASFAA 2012). Busan, South Korea 15 - 18 Apr 2012 Berlin, Germany. https://doi.org/10.1007/978-3-642-29038-1_24
Multi-level delegations with trust management in access control systems
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2012. "Multi-level delegations with trust management in access control systems." Journal of Intelligent Information Systems. 39 (3), pp. 611-626. https://doi.org/10.1007/s10844-012-0205-8
Role of public e-procurement technology to reduce corruption in government procurement
Neupane, Arjun, Soar, Jeffrey, Vaidya, Kishor and Yong, Jianming. 2012. "Role of public e-procurement technology to reduce corruption in government procurement." 5th International Public Procurement Conference (IPPC5). Seattle, United States 17 - 19 Aug 2012 United States.
Semantic access control for cloud computing based on e-healthcare
Sun, Lili, Wang, Hua, Yong, Jianming and Wu, Guoxin. 2012. "Semantic access control for cloud computing based on e-healthcare ." Gao, Liang, Shen, Weiming, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2012: 16th International Conference on Computer Supported Cooperative Work in Design. Wuhan, China 23 - 25 May 2012 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2012.6221866
Using automated individual white list to protect web digital identities
Han, Weili, Cao, Ye, Bertino, Elisa and Yong, Jianming. 2012. "Using automated individual white list to protect web digital identities ." Expert Systems with Applications. 39 (15), pp. 11861-11869. https://doi.org/10.1016/j.eswa.2012.02.020
Cloning for privacy protection in multiple independent data publications
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue and Wang, Hua. 2011. "Cloning for privacy protection in multiple independent data publications." Berendt, Bettina, de Vries, Arjen, Fan, Wenfei and Macdonald, Craig (ed.) CIKM 2011: 20th ACM Conference on Information and Knowledge Management . Glasgow, United Kingdom 24 - 28 Oct 2011 New York, NY, USA. https://doi.org/10.1145/2063576.2063705
A light weight approach for ontology generation and change synchronization between ontologies and source relational databases
Ahmed, Waqas, Aslam, Muhammad Ahtisham, Shen, Jun and Yong, Jianming. 2011. "A light weight approach for ontology generation and change synchronization between ontologies and source relational databases." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel and Yong, Jianming (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960076
Enhanced M-learning with cloud computing: the Bangladesh case
Hossain Masud, Md. Anwar, Huang, Xiaodi and Yong, Jianming. 2011. "Enhanced M-learning with cloud computing: the Bangladesh case." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou, Kropf, Peter, Pouly, Michel, Yong, Jianming, Xue, Yunjiao and Ramos, Milton (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/CSCWD.2011.5960200
Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments
Qin, Yongrui, Wang, Hua and Xiao, Jitian. 2011. "Effective scheduling algorithm for on-demand XML data broadcasts in wireless environments." 22nd Australasian Database Conference (ADC 2011). Perth, Australia 17 - 20 Jan 2011 Canberra, Australia.
Privacy preserving access control policy and algorithms for conflicting problems
Sun, Lili, Wang, Hua, Tao, Xiaohui, Zhang, Yanchun and Yang, Jing. 2011. "Privacy preserving access control policy and algorithms for conflicting problems." Kellenberger, Patrick (ed.) 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom 2011). Changsha, China 16 - 18 Nov 2011 Los Alamitos, CA. United States. https://doi.org/10.1109/TrustCom.2011.34
Positive influence dominating set in e-learning social networks
Wang, Guangyuan, Wang, Hua, Tao, Xiaohui and Zhang, Ji. 2011. "Positive influence dominating set in e-learning social networks." Leung, H., Popescu, E., Cao, Y., Lau, R. W. H. and Nejdl, W. (ed.) 10th International Conference on Web-Based Learning (ICWL 2011): Advances in Web-Based Learning. Hong Kong, China 08 - 10 Dec 2011 Berlin, Germany. https://doi.org/10.1007/978-3-642-25813-8_9
Access control and authorization for protecting disseminative information in E-learning workflow
Sun, Lili and Wang, Hua. 2011. "Access control and authorization for protecting disseminative information in E-learning workflow." Concurrency and Computation: Practice and Experience. 23 (16), pp. 2034-2042. https://doi.org/10.1002/cpe.1748
Publishing anonymous survey rating data
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Pei, Jian. 2011. "Publishing anonymous survey rating data." Data Mining and Knowledge Discovery. 23 (3), pp. 379-406. https://doi.org/10.1007/s10618-010-0208-4
A conditional purpose-based access control model with dynamic roles
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional purpose-based access control model with dynamic roles." Expert Systems with Applications. 38 (3), pp. 1482-1489. https://doi.org/10.1016/j.eswa.2010.07.057
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun. 2011. "Injecting purpose and trust into data anonymisation." Computers and Security. 30 (5), pp. 332-345. https://doi.org/10.1016/j.cose.2011.05.005
Extended k-anonymity models against sensitive attribute disclosure
Sun, Xiaoxun, Sun, Lili and Wang, Hua. 2011. "Extended k-anonymity models against sensitive attribute disclosure." Computer Communications. 34 (4), pp. 526-535. https://doi.org/10.1016/j.comcom.2010.03.020
Efficient systematic clustering method for k-anonymization
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "Efficient systematic clustering method for k-anonymization." Acta Informatica. 48 (1), pp. 51-66. https://doi.org/10.1007/s00236-010-0131-6
A family of enhanced (L,alpha) diversity models for privacy preserving data publishing
Sun, Xiaoxun, Li, Min and Wang, Hua. 2011. "A family of enhanced (L,alpha) diversity models for privacy preserving data publishing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 27 (3), pp. 348-356. https://doi.org/10.1016/j.future.2010.07.007
New trends in information technology in education
Lu, Yanping, Liu, Hong, Li, Shaozi and Yong, Jianming. 2011. "New trends in information technology in education ." International Journal of Distance Education Technologies. 9 (1), pp. i-iv.
A purpose based usage access control model for e-healthcare services
Sun, Lili and Wang, Hua. 2011. "A purpose based usage access control model for e-healthcare services." Zhang, Ji and Livraga, Giovanni (ed.) 2nd International Conference on Data and Knowledge Engineering (ICDKE 2011). Milan, Italy 06 - 08 Sep 2011 Piscataway, NJ. United States. https://doi.org/10.1109/ICDKE.2011.6053928
DeDu: building a deduplication storage system over cloud computing
Sun, Zhe, Shen, Jun and Yong, Jianming. 2011. "DeDu: building a deduplication storage system over cloud computing." Shen, Weiming, Barthes, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960097
Constructing robust digital identity infrastructure for future networked society
Yong, Jianming, Tiwari, Sanjib, Huang, Xiaodi and Jin, Qun. 2011. "Constructing robust digital identity infrastructure for future networked society." Shen, Weiming, Barthès, Jean-Paul, Luo, Junzhou and Kropf, Peter (ed.) CSCWD 2011: 15th International Conference on Computer Supported Cooperative Work in Design. Lausanne, Switzerland 08 - 10 Jun 2011 Piscataway, NJ. United States. https://doi.org/10.1109/CSCWD.2011.5960129
Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone
Zhou, Xiaokang, Chen, Hong, Jin, Qun and Yong, Jianming. 2011. "Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone ." Lee, Suk-Han and Hanzo, Lajos (ed.) 5th International Conference on Ubiquitous Information Management and Communication (ICUIMC 2011) . Seoul, South Korea 21 - 23 Feb 2011 New York, NY. United States. https://doi.org/10.1145/1968613.1968685
A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies
Soar, Jeffrey, Wang, Hua and Su, Ying. 2011. "A model for regional innovation and information sharing to reduce falls amongst the elderly through intelligent technologies." Su, Ying and Al-Hakim, Latif (ed.) COINFO 2011: 6th International Conference on Cooperation and Promotion of Information Resources in Science and Technology: Coordinative Innovation and Open Sharing. Hangzhou, China 12 - 14 Nov 2011 Irvine, CA, United States.
Security and privacy preservation for mobile e-learning via digital identity attributes
Yong, Jianming. 2011. "Security and privacy preservation for mobile e-learning via digital identity attributes." Journal of Universal Computer Science. 17 (2), pp. 296-310. https://doi.org/10.3217/jucs-017-02-0296
Privacy aware access control with trust management in web service
Li, Min, Sun, Xiaoxun, Wang, Hua, Zhang, Yanchun and Zhang, Ji. 2011. "Privacy aware access control with trust management in web service." World Wide Web. 14 (4), pp. 407-430. https://doi.org/10.1007/s11280-011-0114-8
DISTRO: a system for detecting global outliers from distributed data streams with privacy protection
Zhang, Ji, Dekeyser, Stijn, Wang, Hua and Shu, Yanfeng. 2010. "DISTRO: a system for detecting global outliers from distributed data streams with privacy protection." Kitagawa, Hiroyuki, Ishikawa, Yoshiharu, Li, Qing and Watanabe, Chiemi (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-12098-5_54
On memory and I/O efficient duplication detection for multiple self-clean data sources
Zhang, Ji, Shu, Yanfeng and Wang, Hua. 2010. "On memory and I/O efficient duplication detection for multiple self-clean data sources." Yoshikawa, M. (ed.) DASFAA 2010: 15th International Conference on Database Systems for Advanced Applications. Tsukuba, Japan 01 - 04 Apr 2010 Germany. Springer. https://doi.org/10.1007/978-3-642-14589-6_14
M-service and its framework
Sun, Lili, Li, Yan and Wang, Hua. 2005. "M-service and its framework." 11th Asia-Pacific Conference on Communications. Perth, Australia 03 - 05 Oct 2005 United States. https://doi.org/10.1109/APCC.2005.1554180
A flexible electronic payment scheme and its management
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Huang, Xiaodi. 2004. "A flexible electronic payment scheme and its management ." Information. 7 (2), pp. 187-196.
Achieving p-sensitive k-anonymity via anatomy
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Ross, David. 2009. "Achieving p-sensitive k-anonymity via anatomy." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.34
Extended K-anonymity models against attribute disclosure
Sun, Xiaoxun, Wang, Hua and Sun, Lili. 2009. "Extended K-anonymity models against attribute disclosure." NSS 2009: 3rd International Conference on Network and System Security. Gold Coast, Australia 19 - 21 Oct 2009 United States. https://doi.org/10.1109/NSS.2009.23
Trust-based access control for privacy protection in collaborative environment
Li, Min, Wang, Hua and Ross, David. 2009. "Trust-based access control for privacy protection in collaborative environment." ICEBE 2009: IEEE International Conference on e-Business Engineering . Macau, China 21 - 23 Oct 2009 United States. https://doi.org/10.1109/ICEBE.2009.66
Privacy preserving on radio frequency identification systems
Wang, Hua, Sun, Lili, Yong, Jianming and Zhang, Yongbing. 2009. "Privacy preserving on radio frequency identification systems." CSCWD 2009: 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile 22 - 24 Apr 2009 United States. https://doi.org/10.1109/CSCWD.2009.4968136
Delegating revocations and authorizations in collaborative business environments
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2009. "Delegating revocations and authorizations in collaborative business environments." Information Systems Frontiers: a journal of research and innovation. 11 (3), pp. 293-305. https://doi.org/10.1007/s10796-008-9091-6
Effective collaboration with information sharing in virtual universities
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2009. "Effective collaboration with information sharing in virtual universities." IEEE Transactions on Knowledge and Data Engineering. 21 (6), pp. 840-853. https://doi.org/10.1109/TKDE.2008.132
Protecting disseminative information in e-learning
Sun, Lili, Wang, Hua and Li, Yan. 2008. "Protecting disseminative information in e-learning." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_49
Secure and Efficient Information Sharing in Multi-university E-Learning Environments
Wang, Hua and Li, Qing. 2008. "Secure and Efficient Information Sharing in Multi-university E-Learning Environments." Leung, Howard, Li, Frederick, Lau, Rynson and Li, Qing (ed.) ICWL 2007: 6th International Conference on Web-Based Learning . Edinburgh, United Kingdom 15 - 17 Aug 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78139-4_48
L-diversity based dynamic update for large time-evolving microdata
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "L-diversity based dynamic update for large time-evolving microdata." Wobcke, Wayne and Zhang, Mengjie (ed.) AI 2008: 21st Australasian Joint Conference on Artificial Intelligence: Advances in Artificial Intelligence . Auckland, New Zealand 01 - 05 Dec 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-89378-3_47
Authorization approaches for advanced permission-role assignments
Wang, Hua, Yong, Jianming, Li, Jiuyong and Peng, Min. 2008. "Authorization approaches for advanced permission-role assignments." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 United States. https://doi.org/10.1109/CSCWD.2008.4536994
Special issue on computer-supported cooperative work: techniques and applications [Preface]
Yong, Jianming, Shen, Weiming and Yang, Yun. 2009. "Special issue on computer-supported cooperative work: techniques and applications [Preface]." Information Sciences. 179 (15), pp. 2513-2514. https://doi.org/10.1016/j.ins.2009.01.047
CSCWD technologies, applications and challenges
Yong, Jianming, Shen, Weiming and Pino, José A.. 2009. "CSCWD technologies, applications and challenges." Journal of Universal Computer Science. 15 (9), pp. 1744-1745. https://doi.org/10.3217/jucs-015-09
Optimal privacy-aware path in hippocratic databases
Li, Min, Sun, Xiaoxun, Wang, Hua and Zhang, Yanchun. 2009. "Optimal privacy-aware path in hippocratic databases." Zhou, X. (ed.) DASFAA 2009: 14th International Conference on Database Systems for Advanced Applications. Brisbane, Australia 21 - 23 Apr 2009 Germany. Springer. https://doi.org/10.1007/978-3-642-00887-0_39
Enhancing the privacy of e-learning systems with alias and anonymity
Yong, Jianming. 2008. "Enhancing the privacy of e-learning systems with alias and anonymity." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-92719-8
Portable devices of security and privacy preservation for e-learning
Yong, Jianming, Li, Jiuyong and Wang, Hua. 2008. "Portable devices of security and privacy preservation for e-learning." Shen, Weiming, Zheng, Qinghua, Luo, Junzhou, Yong, Jianming, Duan, Zhenhua and Tian, Feng (ed.) CSCWD 2008: 12th International Conference on Computer Supported Cooperative Work in Design . Xi'an, China 16 - 18 Apr 2008 China. https://doi.org/10.1109/CSCWD.2008.4537121
Access control management for ubiquitous computing
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2008. "Access control management for ubiquitous computing." Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications. 24 (8), pp. 870-878. https://doi.org/10.1016/j.future.2007.07.011
Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Wang, Li-Zhen. 2008. "Robustness analysis of diversified ensemble decision tree algorithms for microarray data classification." ICMLC 2008: 7th International Conference on Machine Learning and Cybernetics. Kunming, China 12 - 15 Jul 2008 United States. https://doi.org/10.1109/ICMLC.2008.4620389
ABDM: an extended flexible delegation model in RBAC
Li, Min and Wang, Hua. 2008. "ABDM: an extended flexible delegation model in RBAC." Wu, Qiang and He, Xiangjian (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594707
(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model
Sun, Xiaoxun, Wang, Hua, Truta, Traian Marius, Li, Jiuyong and Li, Ping. 2008. "(p+, α)-sensitive k-anonymity: a new enhanced privacy protection model." Wu, Qiang (ed.) 8th IEEE International Conference on Computer and Information Technology. Sydney, Australia 08 - 11 Jul 2008 United States. https://doi.org/10.1109/CIT.2008.4594650
Advanced permission-role relationship in role-based access control
Li, Min, Wang, Hua, Plank, Ashley and Yong, Jianming. 2008. "Advanced permission-role relationship in role-based access control." Mu, Yi, Susilo, Willy and Seberry, Jennifer (ed.) ACISP 2008: 13th Australasian Conference on Information Security and Privacy . Wollongong, Australia 07 - 09 Jul 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-70500-0-29
On the complexity of restricted k-anonymity problem
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "On the complexity of restricted k-anonymity problem." Yanchun, Zhang (ed.) 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Germany. Springer. https://doi.org/10.1007/978-3-540-78849-2_30
Delegating revocations and authorizations
Wang, Hua and Cao, Jinli. 2008. "Delegating revocations and authorizations." ter Hofstede, A., Benatallah, B. and Paik, H. Y. (ed.) 5th International Conference on Business Process Management (BPM 2007) . Brisbane, Australia 24 - 28 Sep 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-78238-4_29
New data integration workflow design for e-learning
Xi, Shengtian and Yong, Jianming. 2007. "New data integration workflow design for e-learning." Lecture Notes in Computer Science (Book series). 4402, pp. 699-707. https://doi.org/10.1007/978-3-540-72863-4_71
A framework of tool integration for internet-based e-commerce
Yong, Jianming and Yang, Yun. 2004. "A framework of tool integration for internet-based e-commerce." Li, M. (ed.) GCC 2003: 2nd International Workshop on Grid and Cooperative Computing. Shanghai, China Berlin, Germany. Springer.
A global ticket-based access scheme for mobile users
Wang, Hua, Cao, Jinli, Zhang, Yanchun and Kambayahsi, Yahiko. 2004. "A global ticket-based access scheme for mobile users." Information Systems Frontiers: a journal of research and innovation. 6 (1), pp. 35-46. https://doi.org/10.1023/B:ISFI.0000015873.35795.5e
Achieving secure and flexible M-services through tickets
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Varadharajan, Vijay. 2003. "Achieving secure and flexible M-services through tickets." Systems, Man, and Cybernetics. Part A. 33 (6), pp. 697-708. https://doi.org/10.1109/TSMCA.2003.819917
A flexible payment scheme and its role-based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2005. "A flexible payment scheme and its role-based access control." IEEE Transactions on Knowledge and Data Engineering. 17 (3), pp. 425-436. https://doi.org/10.1109/TKDE.2005.35
A fast algorithm for finding correlation clusters in noise data
Li, Jiuyong, Huang, Xiaodi, Selke, Clinton and Yong, Jianming. 2007. "A fast algorithm for finding correlation clusters in noise data." Zhou, Zhi-Hua, Li, Hang and Yang, Qiang (ed.) 11th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2007). Nanjing, China 22 - 25 May 2007 Germany. Springer. https://doi.org/10.1007/978-3-540-71701-0_68
Digital identity design and privacy preservation for e-learning
Yong, Jianming. 2007. "Digital identity design and privacy preservation for e-learning." Shen, Weiming, Yang, Yun, Yong, Jianming, Hawryszkiewycz, Igor, Lin, Zongkai, Barthes, Jean-Paul, Mathre, Mary Lou, Hao, Qi and Tran, Minh Hong (ed.) CSCWD 2007: 11th International Conference on Computer Supported Cooperative Work in Design: Human Centered Collaborative Design. Melbourne, Australia 26 - 28 Apr 2007 Melbourne, Australia. https://doi.org/10.1109/CSCWD.2007.4281549
Role-based delegation with negative authorization
Wang, Hua, Cao, Jinli and Ross, David. 2006. "Role-based delegation with negative authorization." Zhou, X., Li, Jianzhong, Shen, Heng Tao, Kitsuregawa, Masaru and Zhang, Yanchun (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Germany. Springer. https://doi.org/10.1007/11610113_28
Combined gene selection methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Wang, Hua and Daggard, Grant. 2006. "Combined gene selection methods for microarray data analysis." Gabrys, Bogdan, Howlett, Robert J. and Jain, Lakhmi C. (ed.) 10th International Conference on Knowledge-Based Intelligent Information and Engineering Systems (KES 2006). Bournemouth, United Kingdom 09 - 11 Oct 2006 Germany. Springer. https://doi.org/10.1007/11892960_117
Towards secure XML document with usage control
Cao, Jinli, Sun, Lili and Wang, Hua. 2005. "Towards secure XML document with usage control." Zhang, Yanchun, Tanaka, Katsumi, Yu, Jeffrey Xu, Wang, Shan and Li, Minglu (ed.) 7th Asia-Pacific Web Conference: Web Technologies Research and Development (APWeb 2005). Shanghai, China 29 Mar - 01 Apr 2005 Germany. Springer. https://doi.org/10.1007/978-3-540-31849-1_30
A framework for role-based group delegation in distributed environments
Wang, Hua, Li, Jiuyong, Addie, Ron, Dekeyser, Stijn and Watson, Richard. 2006. "A framework for role-based group delegation in distributed environments." Estivill-Castro, Vladimir and Dobbie, Gillian (ed.) 29th Australasian Computer Science Conference (ACSC 2006). Hobart, Australia 16 - 19 Jan 2006 Australia.
Formal authorization approaches for permission-role assignments using relational algebra operations
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2003. "Formal authorization approaches for permission-role assignments using relational algebra operations." Schewe, Klaus-Dieter and Zhou, Xiaofang (ed.) 14th Australasian Database Conference 2003: Database Technologies (ADC2003). Adelaide, Australia 04 - 07 Feb 2003 Australia.
A flexible payment scheme and its permission-role assignment
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2003. "A flexible payment scheme and its permission-role assignment." Oudshoorn, Michael J. (ed.) 26th Australasian Computer Science Conference (ACSC2003). Adelaide, Australia 04 - 07 Feb 2003 Darlinghurst, Australia.
Specifying role-based access constraints with object constraint language
Wang, Hua, Zhang, Yanchun, Cao, Jinli and Yang, Jian. 2004. "Specifying role-based access constraints with object constraint language." Yu, Jeffrey Xu, Lin, Xuemin, Lu, Hongjun and Zhang, Yanchun (ed.) 6th Asia-Pacific Web Conference: Advanced Web Technologies and Applications (APWeb 2004). Hangzhou, China 14 - 17 Apr 2004 Berlin, Germany. Springer.
A new blind signature for electronic commerce
Wang, Hua and Addie, Ron. 2004. "A new blind signature for electronic commerce." 3rd International Conference on Information (INFO'2004). Tokyo, Japan 2004
Validating privacy requirements in large survey rating data
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2011. "Validating privacy requirements in large survey rating data." Bessis, Nik and Xhafa, Fatos (ed.) Next generation data technologies for collective computational intelligence. Berlin, Germany. Springer. pp. 445-469
Microdata protection method through microaggregation: a median-based approach
Kabir, Md Enamul and Wang, Hua. 2011. "Microdata protection method through microaggregation: a median-based approach." Information Security Journal: a Global Perspective. 20 (1), pp. 1-8. https://doi.org/10.1080/19393555.2010.515288
Purpose-based access control policies and conflicting analysis
Wang, Hua, Sun, Lili and Varadharajan, Vijay. 2010. "Purpose-based access control policies and conflicting analysis." Rannenberg, Kai, Varadharajan, Vijay and Weber, Christian (ed.) SEC 2010: Security and Privacy: Silver Linings in the Cloud. Brisbane, Australia 20 - 23 Sep 2010 Germany. https://doi.org/10.1007/978-3-642-15257-3_20
Specifying usage control model with object constraint language
Li, Min and Wang, Hua. 2010. "Specifying usage control model with object constraint language." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.10
Systematic clustering-based microaggregation for statistical disclosure control
Kabir, Md Enamul and Wang, Hua. 2010. "Systematic clustering-based microaggregation for statistical disclosure control." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Washington, DC, USA. https://doi.org/10.1109/NSS.2010.66
Detecting anomalies from high-dimensional wireless network data streams: a case study
Zhang, Ji, Gao, Qigang, Wang, Hai and Wang, Hua. 2011. "Detecting anomalies from high-dimensional wireless network data streams: a case study." Soft Computing. 15 (6), pp. 1195-1215. https://doi.org/10.1007/s00500-010-0575-1
Satisfying privacy requirements: one step before anonymization
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2010. "Satisfying privacy requirements: one step before anonymization." Zaki, Mohammed Javeed, Yu, Jeffrey Xu, Ravindran, B. and Pudi, Vikram (ed.) 14th Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2010). Hyderabad, India 21 - 24 Jun 2010 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-642-13657-3_21
A pairwise systematic microaggregation for statistical disclosure control
Kabir, Md Enamul, Wang, Hua and Zhang, Yanchun. 2010. "A pairwise systematic microaggregation for statistical disclosure control." Webb, Geoffrey I., Liu, Bing, Zhang, Chengqi, Gunopulos, Dimitrios and Wu, Xindong (ed.) 10th IEEE International Conference on Data Mining (ICDM 2010). Sydney, Australia 14 - 17 Dec 2010 Los Alamitos, CA. United States. https://doi.org/10.1109/ICDM.2010.111
A conditional role-involved purpose-based access control model
Kabir, Md Enamul, Wang, Hua and Bertino, Elisa. 2011. "A conditional role-involved purpose-based access control model." Journal of Organizational Computing and Electronic Commerce. 21 (1), pp. 71-91. https://doi.org/10.1080/10919392.2011.541007
Access control method with XML databases
Sun, Lili, Li, Yan and Wang, Hua. 2011. "Access control method with XML databases." Wang, John (ed.) Information systems and new applications in the service sector: models and methods. Hershey, PA, USA. IGI Global. pp. 227-239
Trust-involved access control in collaborative open social networks
Wang, Hua and Sun, Lili. 2010. "Trust-involved access control in collaborative open social networks." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.13
A purpose based usage access control model
Sun, Lili and Wang, Hua. 2010. "A purpose based usage access control model." International Journal of Computer and Information Engineering. 4 (1), pp. 44-51.
Privacy protection for genomic data: current techniques and challenges
Baig, Muzammil M., Li, Jiuyong, Liu, Jixue, Wang, Hua and Wang, Junhu. 2010. "Privacy protection for genomic data: current techniques and challenges." Ras, Zbigniew W. and Tsay, Li-Shang (ed.) Advances in intelligent information systems. Berlin, Germany. Springer. pp. 175-193
A purpose based access control in XML databases system
Sun, Lili, Wang, Hua, Jururajin, Raj and Sriprakash, Sri. 2010. "A purpose based access control in XML databases system." Xiang, Yang, Samarati, Pierangela, Hu, Jiankun, Zhou, Wanlei and Sadeghi, Ahmad-Reza (ed.) NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Los Alamitos, CA. USA. https://doi.org/10.1109/NSS.2010.28
Digital identity enrolment and assurance support for VeryIDX
Yong, Jianming and Bertino, Elisa. 2010. "Digital identity enrolment and assurance support for VeryIDX." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 https://doi.org/10.1109/CSCWD.2010.5471880
Specify and enforce the policies of quantified risk adaptive access control
Chen, Chen, Han, Weili and Yong, Jianming. 2010. "Specify and enforce the policies of quantified risk adaptive access control." Shen, Weiming, Gu, Ning, Lu, Tun, Barthes, Jean-Paul and Luo, Junzhou (ed.) CSCWD 2010: 14th International Conference on Computer Supported Cooperative Work in Design . Shanghai, China 14 - 16 Apr 2010 United States.
Towards identify anonymization in large survey rating data
Sun, Xiaoxun and Wang, Hua. 2010. "Towards identify anonymization in large survey rating data." NSS 2010: 4th International Conference on Network and System Security . Melbourne, Australia 01 - 03 Sep 2010 Piscataway, NJ. United States. https://doi.org/10.1109/NSS.2010.11
Digital identity control mechanism for e-learning
Yong, Jianming. 2009. "Digital identity control mechanism for e-learning." IEEE International Symposium on IT in Medicine and Education (ITME 2009) . Jinan, China 14 - 16 Aug 2009 Piscataway, NJ. United States. https://doi.org/10.1109/ITIME.2009.5236204
Systematic clustering method for l-diversity model
Kabir, Md Enamul, Wang, Hua, Bertino, Elisa and Chi, Yunxiang. 2010. "Systematic clustering method for l-diversity model." Shen, Heng Tao and Bouguettaya, Athman (ed.) ADC 2010: 21st Australasian Conference on Database Technologies. Brisbane, Australia 18 - 22 Jan 2010 Sydney, Australia.
Microdata protection through approximate microaggregation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Microdata protection through approximate microaggregation." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Adelaide, Australia.
Privacy-aware access control with generalization boundaries
Li, Min, Wang, Hua and Plank, Ashley. 2009. "Privacy-aware access control with generalization boundaries." Mans, Bernard (ed.) 32nd Australasian Computer Science Conference (ACSC 2009). Wellington, New Zealand 19 - 23 Jan 2009 Sydney, Australia.
Injecting purpose and trust into data anonymisation
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2009. "Injecting purpose and trust into data anonymisation." Cheung, David, Song, Il-Yeol, Chu, Wesley, Hu, Xiaohua and Lin, Jimmy (ed.) 18th ACM International Conference on Information and Knowledge Management (CIKM 2009) . Hong Kong, China 02 - 06 Nov 2009 New York, USA. https://doi.org/10.1145/1645953.1646166
Anonymous access scheme for electronic services
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2004. "Anonymous access scheme for electronic services." Estivill-Castro, Vladimir (ed.) 27th Australasian Computer Science Conference (ACSC2004). Dunedin, New Zealand 18 - 22 Jan 2004 Sydney, NSW, Australia.
Conditional purpose based access control model for privacy protection
Kabir, Md Enamul and Wang, Hua. 2009. "Conditional purpose based access control model for privacy protection." Bouguettaya, Athman and Lin, Xuemin (ed.) ADC 2009: 20th Australasian Conference on Australasian Database. Wellington, New Zealand 20 - 23 Jan 2009 Sydney, Australia.
A trust degree based access control in grid environments
Luo, Junzhou, Ni, Xudong and Yong, Jianming. 2009. "A trust degree based access control in grid environments." Information Sciences. 179 (15), pp. 2618-2628. https://doi.org/10.1016/j.ins.2009.01.039
Authorization algorithms for the mobility of user-role relationship
Wang, Hua, Sun, Lili, Zhang, Yanchun and Cao, Jinli. 2005. "Authorization algorithms for the mobility of user-role relationship." Estivill-Castro, Vladimir (ed.) ACSC 2005: 28th Australasian Computer Science Conference. Newcastle, Australia 28 Jan - 03 Feb 2005 Sydney, Australia.
Authorization algorithms for permission-role assignments
Sun, Lili, Wang, Hua and Yong, Jianming. 2009. "Authorization algorithms for permission-role assignments." Journal of Universal Computer Science. 15 (9), pp. 1782-1796. https://doi.org/10.3217/jucs-015-09-1782
An integrated model for next page access prediction
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2009. "An integrated model for next page access prediction." International Journal of Knowledge and Web Intelligence. 1 (1/2), pp. 48-80. https://doi.org/10.1504/IJKWI.2009.027925
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Truta, Traian Marius. 2008. "Enhanced p-sensitive k-anonymity models for privacy preserving data publishing." Transactions on Data Privacy. 1 (2), pp. 53-66.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2008. "Integrating recommendation models for improved web page prediction accuracy." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Priority driven K-anonymisation for privacy protection
Sun, Xiaoxun, Wang, Hua and Li, Jiuyong. 2008. "Priority driven K-anonymisation for privacy protection." Roddick, John F., Li, Jiuyong, Christen, Peter and Kennedy, Paul J. (ed.) 7th Australasian Data Mining Conference (AusDM 2008). Glenelg, Adelaide 27 - 28 Nov 2008 Gold Coast, Australia.
Data integration over the internet for e-commerce
Yong, Jianming and Yang, Yun. 2003. "Data integration over the internet for e-commerce." Hesselink, Lambertus (ed.) 3rd IASTED International Conference on Wireless and Optical Communications (WOC 2003). Banff, Canada 14 - 16 Jul 2003 United States.
A new approach to multimedia information filtering based on its structure
Huang, Xiaodi and Yong, Jianming. 2004. "A new approach to multimedia information filtering based on its structure." Correia, N., Jorge, J., Chambel, T. and Pan, Z. (ed.) Mutimedia 2004 Eurographics Symposium. Nanjing, China 27 - 28 Oct 2004 New York, USA.
WSFS-based data integration for e-learning
Yong, Jianming, Yan, Jun and Huang, Xiaodi. 2006. "WSFS-based data integration for e-learning." 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006). Nanjing, China 03 - 05 May 2006 Piscataway, NJ, USA.
Prediction of student actions using weighted Markov models
Huang, Xiaodi, Yong, Jianming, Li, Jiuyong and Gao, Junbin. 2008. "Prediction of student actions using weighted Markov models." Li, Shaozi, Pan, Wei and Yong, Jianming (ed.) IEEE International Symposium on IT in Medicine and Education (ITME 2008) . Xiamen, China 12 - 14 Dec 2008 Piscataway, NJ. United States. https://doi.org/10.1109/ITME.2008.4743842
Security modelling for integrated information systems over the internet
Yong, Jianming. 2004. "Security modelling for integrated information systems over the internet." 8th Pacific Asia Conference on Information Systems (PACIS 2004). Shanghai, China 08 - 11 Jul 2004
Neighbourhood-trust dependency access control for WFMS
Yong, Jianming. 2006. "Neighbourhood-trust dependency access control for WFMS." 10th International Conference on Computer Supported Cooperative Work in Design (CSCWD2006). Nanjing, China 03 - 05 May 2006 Piscataway, NJ, USA.
Building ontology repositories for e-commerce systems
Yong, Jianming, Yang, Yun and Yan, Jun. 2003. "Building ontology repositories for e-commerce systems." WSEAS Transactions on Systems. 2 (2), pp. 241-245.
Distributed internet-based e-commerce tools
Yong, Jianming and Yang, Yun. 2004. "Distributed internet-based e-commerce tools." WSEAS Transaction on Computers. 3 (3), pp. 619-625.
Towards an authentication protocol for service outsourcing over IP networks
Lai, David, Zhang, Zhongwei and Wang, Hua. 2005. "Towards an authentication protocol for service outsourcing over IP networks." Arabnia, Hamid R. (ed.) 2005 International Conference on Security and Management. Las Vegas, United States of America 20 - 23 Jun 2005 Las Vegas, Nevada, USA.
Web graph displays by defining visible and invisible subsets
Lai, Wei, Huang, Mao Lin, Zhang, Yanchun and Toleman, Mark. 1999. "Web graph displays by defining visible and invisible subsets." Debreceny, R. and Ellis, Allan (ed.) 5th Australian World Wide Web Conference (AusWeb99). Lismore, Australia 17 - 20 Apr 1999 Lismore, NSW, Australia.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2008. "Current developments of k-anonymous data releasing." Electronic Journal of Health Informatics. 3 (1).
Protecting information sharing in distributed collaborative environment
Li, Min and Wang, Hua. 2008. "Protecting information sharing in distributed collaborative environment." 10th Asia-Pacific Web Conference (APWeb 2008). Shenyang, China 26 - 28 Apr 2008 Berlin, Germany. Springer. https://doi.org/10.1007/978-3-540-89376-9-19
An efficient hash-based algorithm for minimal k-anonymity
Sun, Xiaoxun, Li, Min, Wang, Hua and Plank, Ashley. 2008. "An efficient hash-based algorithm for minimal k-anonymity." Dobbie, Gillian and Mans, Bernard (ed.) ACSC 2008: 31st Australasian Computer Science Conference. Wollongong, Australia 22 - 25 Jan 2008 Sydney, Australia.
Integrating Markov Model with clustering for predicting web page accesses
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating Markov Model with clustering for predicting web page accesses." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Integrating recommendation models for improved web page prediction accuracy
Khalil, Faten, Wang, Hua and Li, Jiuyong. 2007. "Integrating recommendation models for improved web page prediction accuracy." 13th Australasian World Wide Web Conference (AusWeb 2007). Coffs Harbour, Australia 30 Jun - 04 Jul 2007 Australia.
Replacing lost or stolen e-passports
Yong, Jianming and Bertino, Elisa. 2007. "Replacing lost or stolen e-passports." Computer. 40 (10), pp. 89-91. https://doi.org/10.1109/MC.2007.360
Enforcing secure access control in integrated systems over the internet
Yong, Jianming, Lane, Michael S., Toleman, Mark and Yang, Yun. 2003. "Enforcing secure access control in integrated systems over the internet." 1st Australian Information Security Management Conference. Perth, Western Australia 24 Nov 2003 Perth, Western Australia.
Building a consumer anonymity scalable payment protocol for [the] Internet purchases
Wang, Hua, Cao, Jinli and Kambayahsi, Yahiko. 2002. "Building a consumer anonymity scalable payment protocol for [the] Internet purchases." 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE'02). San Jose, USA 24 - 25 Feb 2002 US.
Security modelling for e-learning
Yong, Jianming. 2007. "Security modelling for e-learning." Liu, Hong, Hu, Bin and Zheng, Xiangwei (ed.) 1st International Symposium on Information Technologies and Applications in Education (ISITAE 07). Kunming, China 23 - 25 Nov 2007 Beijing, China.
Properties of lattice-limit of a sequence on x-lattice
Zhang, Guangquan, Zhang, Yanchuan and Lu, Jie. 1997. "Properties of lattice-limit of a sequence on x-lattice." Journal of Fuzzy Mathematics. 5 (1), pp. 201-211.
Towards enhancing trust on Chinese e-commerce
Wang, Zhen, Zhang, Zhongwei and Zhang, Yanchun. 2006. "Towards enhancing trust on Chinese e-commerce." Zhou, X., Li, J., Shen, H., Kitsuregawa, M. and Zhang, Y. (ed.) 8th Asia-Pacific Web Conference (APWeb 2006): Frontiers of WWW Research and Development. Harbin, China 16 - 18 Jan 2006 Berlin, Germany. Springer. https://doi.org/10.1007/11610113_30
Building ontology repositories for e-commerce systems
Yong, Jianming, Yang, Yun and Yan, Jun. 2002. "Building ontology repositories for e-commerce systems." Mastorakis, Nikos E. (ed.) WSEAS International Conference on Information Security, Hardware/Software Codesign, E-Commerce and Computer Networks (WSEAS 2002). Copacabana, Brazil 15 - 17 Oct 2002 Athens, Greece.
A flexible payment scheme and its user-role assignment
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2002. "A flexible payment scheme and its user-role assignment." Chan, A., Chan, S., Leong, H. and Ng, V. (ed.) 2nd International Workshop on Cooperative Internet Computing. Hong Kong, China 18 - 19 Aug 2002 Hong Kong.
A protocol for untraceable electronic cash
Wang, Hua and Zhang, Yanchun. 2000. "A protocol for untraceable electronic cash." Lu, Hongjun and Zhou, Aoying (ed.) 1st Web-Age Information Management International Conference (WAIM 2000). Shanghai, China 21 - 23 Jun 2000 Berlin, Germany. https://doi.org/10.1007/3-540-45151-X_18
A boolean algebra approach for class hierarchy normalization
Zhang, Yanchun and Xiao, Jitian. 1997. "A boolean algebra approach for class hierarchy normalization." Topor, R. and Tanaka, K. (ed.) 5th International Conference on Database Systems for Advanced Applications. Melbourne, Australia 01 - 04 Apr 1997 Singapore. https://doi.org/10.1142/9789812819536_0032
A consumer anonymity scalable payment scheme with role based access control
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2001. "A consumer anonymity scalable payment scheme with role based access control." 2nd International Conference on Web Information Systems Engineering (WISE 2001). Kyoto, Japan 03 - 06 Dec 2007
Formal authorization allocation approaches for role-based access control based on relational algebra operations
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2002. "Formal authorization allocation approaches for role-based access control based on relational algebra operations." 3rd International Conference on Web Information Systems Engineering, 2002 (WISE 2002). Singapore 12 - 14 Dec 2002
An electronic cash scheme and its management
Wang, Hua, Cao, Jinli and Zhang, Yanchun. 2004. "An electronic cash scheme and its management." Concurrent Engineering: Research and Application Journal. 12 (3), pp. 247-257. https://doi.org/10.1177/1063293X04046194
An agent-based decentralised process management framework for web service composition
Yan, Jun, Pidgeon, Phillip, Krishna, Aneesh and Yong, Jianming. 2007. "An agent-based decentralised process management framework for web service composition." Li, Jianzhong (ed.) Infoscale 2007: 2nd International Conference on Scalable Information Systems. Suzhou, China 06 - 08 Jun 2007 New York, USA.
Internet-based e-learning workflow process
Yong, Jianming. 2006. "Internet-based e-learning workflow process." Lecture Notes in Computer Science (Book series). 3865, pp. 516-524. https://doi.org/10.1007/11686699_52
Fostering e-commerce among Australian SMEs
Yong, Jianming and Yang, Yun. 2003. "Fostering e-commerce among Australian SMEs." IT Professional. 5 (5), pp. 21-24. https://doi.org/10.1109/MITP.2003.1235318
Extended RBAC with role attributes
Yong, Jianming, Bertino, Elisa, Toleman, Mark and Roberts, Dave. 2006. "Extended RBAC with role attributes." Tan, Bernard (ed.) 10th Pacific Asia Conference on Information Systems (PACIS 2006). Kuala Lumpur, Malaysia 06 - 09 Jul 2006 Sheffield, UK.
Ubiquitous computing environments and its usage access control
Wang, Hua, Zhang, Yanchun and Cao, Jinli. 2006. "Ubiquitous computing environments and its usage access control." 1st International Conference on Scalable Information Systems. Hong Kong, China 29 May - 01 Jun 2006 New York, USA.
Ticket-based mobile commerce scheme and its implementation
Wang, Hua, Huang, Xiaodi and Dodda, Goutham Reddy. 2006. "Ticket-based mobile commerce scheme and its implementation ." 9th ACM International Symposium on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Terromolinos, Spain 02 - 06 Oct 2006 New York, NY, USA.
A maximally diversified multiple decision tree algorithm for microarray data classification
Hu, Hong, Li, Jiuyong, Wang, Hua, Daggard, Grant and Shi, Mingren. 2006. "A maximally diversified multiple decision tree algorithm for microarray data classification." Boden, Mikael and Bailey, Timothy (ed.) Workshop on Intelligent Systems for Bioinformatics (2006). Hobart, Australia 04 Dec 2006 Sydney, Australia.
A framework of combining Markov model with association rules for predicting web page accesses
Khalil, Faten, Li, Jiuyong and Wang, Hua. 2006. "A framework of combining Markov model with association rules for predicting web page accesses." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
A comparative study of classification methods for microarray data analysis
Hu, Hong, Li, Jiuyong, Plank, Ashley, Wang, Hua and Daggard, Grant. 2006. "A comparative study of classification methods for microarray data analysis." Christen, Peter, Kennedy, Paul J., Li, Jiuyong, Simoff, Simeon J. and Williams, Graham J. (ed.) 5th Australasian Conference on Data Mining and Analystics (AusDM 2006). Sydney, Australia 29 - 30 Nov 2006 Canberra, Australia.
Access management in electronic commerce system
Wang, Hua. 2004. Access management in electronic commerce system. PhD Thesis Doctor of Philosophy. University of Southern Queensland.
Current developments of k-anonymous data releasing
Li, Jiuyong, Wang, Hua, Jin, Huidong and Yong, Jianming. 2006. "Current developments of k-anonymous data releasing." Croll, Peter, Morarji, Hasmukh and Au, Richard (ed.) National e-Health Privacy and Security Symposium 2006. Brisbane, Australia 24 - 26 Oct 2006 Brisbane.
Mobile solutions for aged care: a transformational framework
Soar, Jeffrey, Tsai, Heng-Sheng, Yong, Jianming and Gururajan, Raj. 2005. "Mobile solutions for aged care: a transformational framework." Soar, Jeffrey and Edgecumbe, Joan (ed.) 2nd Australian Aged and Community Care Informatics Conference (ACCIC'05). Hobart, Tasmania 04 - 06 May 2005 Brunswick East, Australia.
Workflow-based e-learning platform
Yong, Jianming. 2005. "Workflow-based e-learning platform." Shen, Weiming, James, Anne, Chao, Kuo-Ming, Younas, Muhammad, Lin, Zongkai and Barthes, Jean-Paul (ed.) 9th International Conference on Computer Supported Cooperative Work in Design (CSCWD2005). Coventry, United Kingdom 24 - 26 May 2005 Coventry, UK.