Chun Ruan

Orcid: 0000-0002-8931-3411

According to our database1, Chun Ruan authored at least 50 papers between 1985 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Indoor Localization of Resource-Constrained IoT Devices Using Wi-Fi Fingerprinting and Convolutional Neural Network.
Proceedings of the 2024 Australasian Computer Science Week, 2024

2020
A Dynamic Model for Quality of Service Evaluation of Heterogeneous Networks.
Int. J. Wirel. Networks Broadband Technol., 2020

2019
A Metric-Based Approach for Quality Evaluation in Distributed Networking Systems.
Int. J. Interact. Commun. Syst. Technol., 2019

2018
Experimenting sensitivity-based anonymization framework in apache spark.
J. Big Data, 2018

2017
Improving MapReduce privacy by implementing multi-dimensional sensitivity-based anonymization.
J. Big Data, 2017

Implementing A Framework for Big Data Anonymity and Analytics Access Control.
Proceedings of the 2017 IEEE Trustcom/BigDataSE/ICESS, Sydney, Australia, August 1-4, 2017, 2017

Towards optimal sensitivity-based anonymization for big data.
Proceedings of the 27th International Telecommunication Networks and Applications Conference, 2017

2016
QoS Evaluation of Heterogeneous Networks: Application-based Approach.
CoRR, 2016

Sensitivity-Based Anonymization of Big Data.
Proceedings of the 41st IEEE Conference on Local Computer Networks Workshops, 2016

2015
Designing and evaluating weighted delegatable authorizations.
Concurr. Comput. Pract. Exp., 2015

2014
Dynamic delegation framework for role based access control in distributed data management systems.
Distributed Parallel Databases, 2014

A fuzzy logic approach for Quality of Service quantification in wireless and mobile networks.
Proceedings of the IEEE 39th Conference on Local Computer Networks, Edmonton, AB, Canada, 8-11 September, 2014, 2014

2013
QoS analysis and evaluations: Improving cellular-based distance education.
Proceedings of the 38th Annual IEEE Conference on Local Computer Networks, Sydney, Australia, October 21-24, 2013, 2013

Application Based Handover: An Energy-Efficient Approach for Heterogeneous Networks.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Sustainable Rural Areas - Network-based Architecture.
Proceedings of the SIGMAP and WINSYS 2012, 2012

Evaluating Role Based Authorization Programs.
Proceedings of the Foundations of Intelligent Systems - 20th International Symposium, 2012

A User-Centric Network Architecture for Sustainable Rural Areas.
Proceedings of the Advanced Infocomm Technology - 5th IEEE International Conference, 2012

2011
Logic based authorization program and its implementation.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

Reasoning about Dynamic Delegation in Role Based Access Control Systems.
Proceedings of the Database Systems for Advanced Applications, 2011

2010
Robust performance modelling and scheduling of distributed real-time systems.
J. Supercomput., 2010

A graph theoretic approach to authorization delegation and conflict resolution in decentralised systems.
Distributed Parallel Databases, 2010

Modeling and Robust Control for Trusted Web Server.
Proceedings of the IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing, 2010

2009
Modeling of an Intelligent e-Consent System in a Healthcare Domain.
J. Univers. Comput. Sci., 2009

FEL-H Robust Control Real-Time Scheduling.
J. Softw. Eng. Appl., 2009

Methodology and Tools of IS Audit and Computer Forensics - The Common Denominator.
Proceedings of the Advances in Information Security and Assurance, 2009

Formalizing Computer Forensics Process with UML.
Proceedings of the Information Systems: Modeling, 2009

Trust Enhanced Authorization for Mobile Agents.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

Real-Time Robust Adaptive Modeling and Scheduling for an Electronic Commerce Server.
Proceedings of the E-Commerce and Web Technologies, 10th International Conference, 2009

Reasoning on Weighted Delegatable Authorizations.
Proceedings of the Database and Expert Systems Applications, 20th International Conference, 2009

2008
Robust Feedback Control Scheduling in Distributed Embedded Real-Time Systems.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

Computer Forensics Tertiary Education in Australia.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Embedded Robust Control Real-Time Scheduling.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2006
First-Pass Contrast-Enhanced Myocardial Perfusion MRI Using a Maximum Up-Slope Parametric Map.
IEEE Trans. Inf. Technol. Biomed., 2006

Integration of Graph Based Authorization Policies.
Proceedings of the Foundations of Intelligent Systems, 16th International Symposium, 2006

Implementing Authorization Delegations Using Graph.
Proceedings of the Database and Expert Systems Applications, 17th International Conference, 2006

2005
Data Protection in Distributed Database Systems.
Proceedings of the Foundations of Intelligent Systems, 15th International Symposium, 2005

Delegatable Access Control for Fine-Grained XML.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

Access Policy Sheet for Access Control in Fine-Grained XML.
Proceedings of the Embedded and Ubiquitous Computing - EUC 2005 Workshops, 2005

2004
Identity-Based Authenticated Broadcast Encryption and Distributed Authenticated Encryption.
Proceedings of the Advances in Computer Science, 2004

A Weighted Graph Approach to Authorization Delegation and Conflict Resolution.
Proceedings of the Information Security and Privacy: 9th Australasian Conference, 2004

2003
A formal graph based framework for supporting authorization delegations and conflict resolutions.
Int. J. Inf. Sec., 2003

A Logic Model for Temporal Authorization Delegation with Negation.
Proceedings of the Information Security, 6th International Conference, 2003

Supporting E-consent on Health Data by Logic.
Proceedings of the Foundations of Intelligent Systems, 14th International Symposium, 2003

Evaluation of Authorization with Delegation and Negation.
Proceedings of the Intelligent Information Processing and Web Mining, 2003

Decentralized Temporal Authorization Administration.
Proceedings of the Database and Expert Systems Applications, 14th International Conference, 2003

Delegatable Authorization Program and Its Application.
Proceedings of the International Conference on Security and Management, 2003

An Authorization Model for E-consent Requirement in a Health Care Application.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Logic-Based Reasoning on Delegatable Authorizations.
Proceedings of the Foundations of Intelligent Systems, 13th International Symposium, 2002

Resolving Conflicts in Authorization Delegations.
Proceedings of the Information Security and Privacy, 7th Australian Conference, 2002

1985
Database Research and Development in China.
Proceedings of the Foundations of Data Organization, 1985


  Loading...