Hua Wang

Orcid: 0000-0002-8465-0996

Affiliations:
  • Victoria University, Centre for Applied Informatics, Melbourne, Australia
  • University of Southern Queensland, Toowoomba, QLD, Australia (former)


According to our database1, Hua Wang authored at least 333 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
XKT: Toward Explainable Knowledge Tracing Model With Cognitive Learning Theories for Questions of Multiple Knowledge Concepts.
IEEE Trans. Knowl. Data Eng., November, 2024

GENet: A Generic Neural Network for Detecting Various Neurological Disorders From EEG.
IEEE Trans. Cogn. Dev. Syst., October, 2024

A Compact Vulnerability Knowledge Graph for Risk Assessment.
ACM Trans. Knowl. Discov. Data, September, 2024

Privacy Preservation of Electronic Health Records in the Modern Era: A Systematic Survey.
ACM Comput. Surv., August, 2024

Hierarchical adaptive evolution framework for privacy-preserving data publishing.
World Wide Web (WWW), July, 2024

A heterogeneous graph-based semi-supervised learning framework for access control decision-making.
World Wide Web (WWW), July, 2024

Exploring Rhythms and Channels-Based EEG Biomarkers for Early Detection of Alzheimer's Disease.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2024

A Novel Evolutionary Algorithm With Column and Sub-Block Local Search for Sudoku Puzzles.
IEEE Trans. Games, March, 2024

Privacy-preserving data publishing: an information-driven distributed genetic algorithm.
World Wide Web (WWW), January, 2024

Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency.
ACM Trans. Knowl. Discov. Data, January, 2024

Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility.
IEEE Trans. Dependable Secur. Comput., 2024

A Survey on the Real Power of ChatGPT.
CoRR, 2024

GPT, Ontology, and CAABAC: A Tripartite Personalized Access Control Model Anchored by Compliance, Context and Attribute.
CoRR, 2024

An efficient Parkinson's disease detection framework: Leveraging time-frequency representation and AlexNet convolutional neural network.
Comput. Biol. Medicine, 2024

Insider Threat Detection: A Review.
Proceedings of the International Conference on Networking and Network Applications, 2024

Multi-objective Demand Responsive Transit Scheduling in Smart City: A Multiple Populations Ant Colony System Approach.
Proceedings of the 16th International Conference on Advanced Computational Intelligence, 2024

Adaptive Aggregative Multitask Competitive Particle Swarm Optimization with Bi-Directional Asymmetric Flip Strategy for High-Dimensional Feature Selection.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024

Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024

CADIF-OSN: Detecting Cloned Accounts with Missing Profile Attributes on Online Social Networks.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
Patient assignment optimization in cloud healthcare systems: a distributed genetic algorithm.
Health Inf. Sci. Syst., December, 2023

Bi-Directional Feature Fixation-Based Particle Swarm Optimization for Large-Scale Feature Selection.
IEEE Trans. Big Data, June, 2023

A knowledge learning and random pruning-based memetic algorithm for user route planning in bike-sharing system.
Memetic Comput., June, 2023

Distributed Differential Evolution With Adaptive Resource Allocation.
IEEE Trans. Cybern., May, 2023

Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery.
IEEE Trans. Ind. Informatics, April, 2023

A Long Short-Term Memory Based Framework for Early Detection of Mild Cognitive Impairment From EEG Signals.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2023

A knowledge graph empowered online learning framework for access control decision-making.
World Wide Web (WWW), March, 2023

Guest Editorial: WWWJ Special Issue of the 22th International Conference on Web Information Systems Engineering (WISE 2021).
World Wide Web (WWW), March, 2023

An optimized artificial intelligence based technique for identifying motor imagery from EEGs for advanced brain computer interface technology.
Neural Comput. Appl., March, 2023

Guest Editorial Introduction to the Special Issue on Cognitive Networking for Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., January, 2023

Towards a Universal Privacy Model for Electronic Health Record Systems: An Ontology and Machine Learning Approach.
Informatics, 2023

Elastic Optimization for Stragglers in Edge Federated Learning.
Big Data Min. Anal., 2023

TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Conjugate Surrogate for Expensive Multiobjective Optimization.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

A Multi-Population Genetic Algorithm for Multiobjective Recommendation System.
Proceedings of the IEEE Symposium Series on Computational Intelligence, 2023

Australian Animal Species Selection and Image Data Collection.
Proceedings of the 27th International Conference Information Visualisation, 2023

Anomaly Detection in Quasi-Periodic Time Series based on Automatic Data Segmentation and Attentional LSTM-CNN (Extended Abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Analysis of reverse engineering.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

Multi-step reinforcement learning-based offloading for vehicle edge computing.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

A Robust Two-Part Modeling Strategy for Knowledge Graph Enhanced Recommender Systems.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

Analysis and Protection of Public Medical Dataset: From Privacy Perspective.
Proceedings of the Health Information Science - 12th International Conference, 2023

Diversity-driven Multi-population Particle Swarm Optimization for Dynamic Optimization Problem.
Proceedings of the Companion Proceedings of the Conference on Genetic and Evolutionary Computation, 2023

Evolutionary Multitasking Bi-Directional Particle Swarm Optimization for High-Dimensional Feature Selection.
Proceedings of the IEEE Congress on Evolutionary Computation, 2023

A Study on Historical Behaviour Enabled Insider Threat Prediction.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

Surveying the Landscape: Compound Methods for Aspect-Based Sentiment Analysis.
Proceedings of the Databases Theory and Applications, 2023

Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning.
World Wide Web, 2022

Guest editorial: WWWJ special issue of the 21th international Conference on Web Information Systems Engineering (WISE 2020).
World Wide Web, 2022

MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation.
VLDB J., 2022

A Coevolutionary Estimation of Distribution Algorithm for Group Insurance Portfolio.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Guest Editorial: Introduction to the Special Section on Advanced Networking Technologies in the Battle Against the Outbreak of Epidemic Diseases.
IEEE Trans. Netw. Sci. Eng., 2022

Anomaly Detection in Quasi-Periodic Time Series Based on Automatic Data Segmentation and Attentional LSTM-CNN.
IEEE Trans. Knowl. Data Eng., 2022

A Probabilistic Niching Evolutionary Computation Framework Based on Binary Space Partitioning.
IEEE Trans. Cybern., 2022

Convolutional Neural Network for Multi-class Classification of Diabetic Eye Disease.
EAI Endorsed Trans. Scalable Inf. Syst., 2022

A deep learning based framework for diagnosis of mild cognitive impairment.
Knowl. Based Syst., 2022

DSGA: A Distributed Segment-Based Genetic Algorithm for Multi-Objective Outsourced Database Partitioning.
Inf. Sci., 2022

A real-time dynamic concept adaptive learning algorithm for exploitability prediction.
Neurocomputing, 2022

Exploring fine-grained syntactic information for aspect-based sentiment classification with dual graph neural networks.
Neurocomputing, 2022

Automatic breast lesion segmentation in phase preserved DCE-MRIs.
Health Inf. Sci. Syst., 2022

Deep-Learning-Based Computer Vision Approach For The Segmentation Of Ball Deliveries And Tracking In Cricket.
CoRR, 2022

Neurological abnormality detection from electroencephalography data: a review.
Artif. Intell. Rev., 2022

An Information-Driven Genetic Algorithm for Privacy-Preserving Data Publishing.
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022

Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022

Elastic Optimized Edge Federated Learning.
Proceedings of the International Conference on Networking and Network Applications, 2022

Assessing the Utilisation of TELedentistry from Perspectives of Early Career Dental Practitioners - Development of the UTEL Questionnaire.
Proceedings of the Health Information Science - 11th International Conference, 2022

DRAM-Net: A Deep Residual Alzheimer's Diseases and Mild Cognitive Impairment Detection Network Using EEG Data.
Proceedings of the Health Information Science - 11th International Conference, 2022

SMiLE: Schema-augmented Multi-level Contrastive Learning for Knowledge Graph Link Prediction.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Brain Data Mining Framework Involving Entropy Topography and Deep Learning.
Proceedings of the Databases Theory and Applications, 2022

Enhancing System Security by Intrusion Detection Using Deep Learning.
Proceedings of the Databases Theory and Applications, 2022

Analysing Big Brain Signal Data for Advanced Brain Computer Interface System.
Proceedings of the Databases Theory and Applications, 2022

Challenges in Electroencephalography Data Processing Using Machine Learning Approaches.
Proceedings of the Databases Theory and Applications, 2022

2021
Enhanced Branch-and-Bound Framework for a Class of Sequencing Problems.
IEEE Trans. Syst. Man Cybern. Syst., 2021

Privacy-Preserving Task Recommendation Services for Crowdsourcing.
IEEE Trans. Serv. Comput., 2021

EEG Sleep Stages Analysis and Classification Based on Weighed Complex Network Features.
IEEE Trans. Emerg. Top. Comput. Intell., 2021

Data-Driven Evolutionary Algorithm With Perturbation-Based Ensemble Surrogates.
IEEE Trans. Cybern., 2021

Distributed Memetic Algorithm for Outsourced Database Fragmentation.
IEEE Trans. Cybern., 2021

Secure $k$k-NN Query on Encrypted Cloud Data with Multiple Keys.
IEEE Trans. Big Data, 2021

Investigation of Social Behaviour Patterns using Location-Based Data - A Melbourne Case Study.
EAI Endorsed Trans. Scalable Inf. Syst., 2021

Knowledge transfer-based distributed differential evolution for dynamic database fragmentation.
Knowl. Based Syst., 2021

CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks.
Int. J. Intell. Syst., 2021

Neighbor-aware review helpfulness prediction.
Decis. Support Syst., 2021

Image Preprocessing in Classification and Identification of Diabetic Eye Diseases.
Data Sci. Eng., 2021

Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation.
Data Sci. Eng., 2021

Targeted Aspect-Based Multimodal Sentiment Analysis: An Attention Capsule Extraction and Multi-Head Fusion Network.
IEEE Access, 2021

A Minority Class Boosted Framework for Adaptive Access Control Decision-Making.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Data Mining Based Artificial Intelligent Technique for Identifying Abnormalities from Brain Signal Data.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Developing a Deep Learning Based Approach for Anomalies Detection from EEG Data.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

Comparative study of symmetric cryptographic algorithms.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

Auto-correlation Based Feature Extraction Approach for EEG Alcoholism Identification.
Proceedings of the Health Information Science - 10th International Conference, 2021

Automatic Breast Lesion Segmentation Using Continuous Max-Flow Algorithm in Phase Preserved DCE-MRIs.
Proceedings of the Health Information Science - 10th International Conference, 2021

Multi-criteria differential evolution: treating multitask optimization as multi-criteria optimization.
Proceedings of the GECCO '21: Genetic and Evolutionary Computation Conference, 2021

Historical Information-based Differential Evolution for Dynamic Optimization Problem.
Proceedings of the IEEE Congress on Evolutionary Computation, 2021

The Effect of Regional Economic Clusters on Housing Price.
Proceedings of the Databases Theory and Applications, 2021

2020
Decision-based evasion attacks on tree ensemble classifiers.
World Wide Web, 2020

Editorial: Special issue on security and privacy in network computing.
World Wide Web, 2020

A framework for cardiac arrhythmia detection from IoT-based ECGs.
World Wide Web, 2020

Preface to the special issue on web information systems engineering (WISE 2018).
World Wide Web, 2020

Coordinated Charging Scheduling of Electric Vehicles: A Mixed-Variable Differential Evolution Approach.
IEEE Trans. Intell. Transp. Syst., 2020

Parameter-Free Voronoi Neighborhood for Evolutionary Multimodal Optimization.
IEEE Trans. Evol. Comput., 2020

Automatic Niching Differential Evolution With Contour Prediction Approach for Multimodal Optimization Problems.
IEEE Trans. Evol. Comput., 2020

A Niching Memetic Algorithm for Multi-Solution Traveling Salesman Problem.
IEEE Trans. Evol. Comput., 2020

Distributed Individuals for Multiple Peaks: A Novel Differential Evolution for Multimodal Optimization Problems.
IEEE Trans. Evol. Comput., 2020

Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing.
IEEE Trans. Cloud Comput., 2020

Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description.
Knowl. Based Syst., 2020

A survey of link flooding attacks in software defined network ecosystems.
J. Netw. Comput. Appl., 2020

DTC: Transfer learning for commonsense machine comprehension.
Neurocomputing, 2020

Generation of topic evolution graphs from short text streams.
Neurocomputing, 2020

Improving accessibility of the Australian My Health Records while preserving privacy and security of the system.
Health Inf. Sci. Syst., 2020

Automated epilepsy detection techniques from electroencephalogram signals: a review study.
Health Inf. Sci. Syst., 2020

Automated detection of mild and multi-class diabetic eye diseases using deep learning.
Health Inf. Sci. Syst., 2020

Enhanced deep learning algorithm development to detect pain intensity from facial expression images.
Expert Syst. Appl., 2020

An Interactive Network for End-to-End Review Helpfulness Modeling.
Data Sci. Eng., 2020

Exploiting Review Neighbors for Contextualized Helpfulness Prediction.
CoRR, 2020

The modeling of human facial pain intensity based on Temporal Convolutional Networks trained with video frames in HSV color space.
Appl. Soft Comput., 2020

Ensemble neural network approach detecting pain intensity from facial expressions.
Artif. Intell. Medicine, 2020

Deep Learning for Multi-Class Antisocial Behavior Identification From Twitter.
IEEE Access, 2020

From logs to Stories: Human-Centred Data Mining for Cyber Threat Intelligence.
IEEE Access, 2020

Automatic Detection of Diabetic Eye Disease Through Deep Learning Using Fundus Images: A Survey.
IEEE Access, 2020

Adaptive Online Learning for Vulnerability Exploitation Time Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

An Advanced Two-Step DNN-Based Framework for Arrhythmia Detection.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2020

MSReNet: Multi-step Reformulation for Open-Domain Question Answering.
Proceedings of the Natural Language Processing and Chinese Computing, 2020

A Blockchain based model for Curbing Doctors Shopping and Ensuring Provenance Management.
Proceedings of the International Conference on Networking and Network Applications, 2020

Deep learning for Antisocial Behaviour Analysis on Social Media.
Proceedings of the 24th International Conference on Information Visualisation, 2020

The effects of travel containment measures within COVID-19.
Proceedings of the 24th International Conference on Information Visualisation, 2020

A DNN for Arrhythmia Prediction Based on ECG.
Proceedings of the Health Information Science - 9th International Conference, 2020

Antisocial Behaviour Analyses Using Deep Learning.
Proceedings of the Health Information Science - 9th International Conference, 2020

A Novel Blockchain Based Smart Contract System for eReferral in Healthcare: HealthChain.
Proceedings of the Health Information Science - 9th International Conference, 2020

Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group.
Proceedings of the Databases Theory and Applications, 2020

Early Detection of Diabetic Eye Disease from Fundus Images with Deep Learning.
Proceedings of the Databases Theory and Applications, 2020

Access Control Management in Cloud Environments
Springer, ISBN: 978-3-030-31728-7, 2020

2019
Security and Privacy in Big Data Environment.
Proceedings of the Encyclopedia of Big Data Technologies., 2019

Sentence level topic models for associated topics extraction.
World Wide Web, 2019

Bayesian Sparse Topical Coding.
IEEE Trans. Knowl. Data Eng., 2019

Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining.
Sensors, 2019

Dynamic optimisation based fuzzy association rule mining method.
Int. J. Mach. Learn. Cybern., 2019

Deep learning for pollen allergy surveillance from twitter in Australia.
BMC Medical Informatics Decis. Mak., 2019

Incorporating word embeddings into topic modeling of short text.
Knowl. Inf. Syst., 2019

A novel JSON based regular expression language for pattern matching in the internet of things.
J. Ambient Intell. Humaniz. Comput., 2019

Unsupervised feature selection with adaptive residual preserving.
Neurocomputing, 2019

An Integrated MCI Detection Framework Based on Spectral-temporal Analysis.
Int. J. Autom. Comput., 2019

Neural attention with character embeddings for hay fever detection from twitter.
Health Inf. Sci. Syst., 2019

The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019

Deep Learning for Multi-Class Identification From Domestic Violence Online Posts.
IEEE Access, 2019

Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks.
IEEE Access, 2019

Security and Privacy-Preserving Challenges of e-Health Solutions in Cloud Computing.
IEEE Access, 2019

Pattern Filtering Attention for Distant Supervised Relation Extraction via Online Clustering.
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019

Helpfulness Prediction for Online Reviews with Explicit Content-Rating Interaction.
Proceedings of the Web Information Systems Engineering - WISE 2019, 2019

Arrhythmias Classification by Integrating Stacked Bidirectional LSTM and Two-Dimensional CNN.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

Finding an Optimum Set of Roles in a CPAC Model.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

Discriminative Regularization with Conditional Generative Adversarial Nets for Semi-Supervised Learning.
Proceedings of the International Joint Conference on Neural Networks, 2019

Dilated Convolutional Networks Incorporating Soft Entity Type Constraints for Distant Supervised Relation Extraction.
Proceedings of the International Joint Conference on Neural Networks, 2019

An Attention-based Hybrid LSTM-CNN Model for Arrhythmias Classification.
Proceedings of the International Joint Conference on Neural Networks, 2019

Discriminative Regularized Deep Generative Models for Semi-Supervised Learning.
Proceedings of the 2019 IEEE International Conference on Data Mining, 2019

A LSTM and CNN Based Assemble Neural Network Framework for Arrhythmias Classification.
Proceedings of the IEEE International Conference on Acoustics, 2019

A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

A Framework for Early Detection of Antisocial Behavior on Twitter Using Natural Language Processing.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

A Joint Deep Neural Network Model for Pain Recognition from Face.
Proceedings of the IEEE 4th International Conference on Computer and Communication Systems, 2019

2018
Editorial: Special Issue on Security and Privacy of IoT.
World Wide Web, 2018

Personalized app recommendation based on app permissions.
World Wide Web, 2018

Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016).
World Wide Web, 2018

Organizing XML Data in a Wireless Broadcast System by Exploiting Structural Similarity.
Wirel. Pers. Commun., 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Serv. Comput., 2018

Cloud Service Description Model: An Extension of USDL for Cloud Services.
IEEE Trans. Serv. Comput., 2018

Mining Event-Oriented Topics in Microblog Stream with Unsupervised Multi-View Hierarchical Embedding.
ACM Trans. Knowl. Discov. Data, 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

A computer aided analysis scheme for detecting epileptic seizure from EEG data.
Int. J. Comput. Intell. Syst., 2018

Depression detection from social network data using machine learning techniques.
Health Inf. Sci. Syst., 2018

A novel statistical technique for intrusion detection systems.
Future Gener. Comput. Syst., 2018

Intent Classification using Feature Sets for Domestic Violence Discourse on Social Media.
CoRR, 2018

Ensuring Data Integrity in Electronic Health Records: A Quality Health Care Implication.
CoRR, 2018

Preserving Patient-centred Controls in Electronic Health Record Systems: A Reliance-based Model Implication.
CoRR, 2018

Domestic Violence Crisis Identification From Facebook Posts Based on Deep Learning.
IEEE Access, 2018

Gradient Correlation: Are Ensemble Classifiers More Robust Against Evasion Attacks in Practical Settings?
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Geographical Proximity Boosted Recommendation Algorithms for Real Estate.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

A Novel Incremental Dictionary Learning Method for Low Bit Rate Speech Streaming.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Topic-Net Conversation Model.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

D-ECG: A Dynamic Framework for Cardiac Arrhythmia Detection from IoT-Based ECGs.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Alcoholic Brain State Identification from Brain Signals Using Support Vector Machine-Based Algorithm.
Proceedings of International Joint Conference on Computational Intelligence, 2018

Understanding Housing Market Behaviour from a Microscopic Perspective.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Text Mining and Real-Time Analytics of Twitter Data: A Case Study of Australian Hay Fever Prediction.
Proceedings of the Health Information Science - 7th International Conference, 2018

Automatic Hotel Photo Quality Assessment Based on Visual Features.
Proceedings of the Information and Communication Technologies in Tourism 2018, 2018

Block Bayesian Sparse Topical Coding.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

A Pulmonary Vascular Segmentation Algorithm of Chest CT Images Based on Fast Marching Method.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018

An Efficient Framework for the Analysis of Big Brain Signals Data.
Proceedings of the Databases Theory and Applications, 2018

Child Abuse and Domestic Abuse: Content and Feature Analysis from Social Media Disclosures.
Proceedings of the Databases Theory and Applications, 2018

Exploring Human Mobility Patterns in Melbourne Using Social Media Data.
Proceedings of the Databases Theory and Applications, 2018

Neural Sparse Topical Coding.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Multi-window based ensemble learning for classification of imbalanced streaming data.
World Wide Web, 2017

A probabilistic method for emerging topic tracking in Microblog stream.
World Wide Web, 2017

Parallelization of Massive Textstream Compression Based on Compressed Sensing.
ACM Trans. Inf. Syst., 2017

On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information.
IEEE Trans. Dependable Secur. Comput., 2017

Accurate vessel segmentation using maximum entropy incorporating line detection and phase-preserving denoising.
Comput. Vis. Image Underst., 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Commun. Mag., 2017

Item Group Recommendation: A Method Based on Game Theory.
Proceedings of the 26th International Conference on World Wide Web Companion, 2017

Cryptographic Access Control in Electronic Health Record Systems: A Security Implication.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

A Study on Securing Software Defined Networks.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

A Topic Model Based on Poisson Decomposition.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Scalable Architecture for Personalized Healthcare Service Recommendation Using Big Data Lake.
Proceedings of the Service Research and Innovation - 5th and 6th Australasian Symposium, 2017

A New Data Mining Scheme for Analysis of Big Brain Signal Data.
Proceedings of the Databases Theory and Applications, 2017

2016
Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams.
ACM Trans. Internet Techn., 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans Autom. Sci. Eng., 2016

The Australian PCEHR System: Ensuring Privacy and Security through an Improved Access Control Mechanism.
EAI Endorsed Trans. Scalable Inf. Syst., 2016

When things matter: A survey on data-centric internet of things.
J. Netw. Comput. Appl., 2016

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
CoRR, 2016

Protecting outsourced data in cloud computing through access management.
Concurr. Comput. Pract. Exp., 2016

Weighted Visibility Graph With Complex Network Features in the Detection of Epilepsy.
IEEE Access, 2016

Mining Actionable Knowledge Using Reordering Based Diversified Actionable Decision Trees.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Improving Distant Supervision of Relation Extraction with Unsupervised Methods.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Access control management with provenance in healthcare environments.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Analyzing EEG Signal Data for Detection of Epileptic Seizure: Introducing Weight on Visibility Graph with Complex Network Feature.
Proceedings of the Databases Theory and Applications, 2016

Exploring Data Mining Techniques in Medical Data Streams.
Proceedings of the Databases Theory and Applications, 2016

2015
Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015

Exploring Sampling in the Detection of Multicategory EEG Signals.
Comput. Math. Methods Medicine, 2015

Multi-Window Based Ensemble Learning for Classification of Imbalanced Streaming Data.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Securing Electronic Medical Record and Electronic Health Record Systems Through an Improved Access Control.
Proceedings of the Health Information Science - 4th International Conference, 2015

Causal dependencies of provenance data in healthcare environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

Central Topic Model for Event-oriented Topics Mining in Microblog Stream.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Topic Detection from Large Scale of Microblog Stream with High Utility Pattern Clustering.
Proceedings of the 8th Workshop on Ph.D. Workshop in Information and Knowledge Management, 2015

Collaborative Topic Ranking: Leveraging Item Meta-Data for Sparsity Reduction.
Proceedings of the Twenty-Ninth AAAI Conference on Artificial Intelligence, 2015

2014
Outlier detection from large distributed databases.
World Wide Web, 2014

Welcome message from the Editor-in-Chief and Co- Editor-in-Chief.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014

When Things Matter: A Data-Centric View of the Internet of Things.
CoRR, 2014

Positive Influence Dominating Set Games.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Indexing Linked Data in a Wireless Broadcast System with 3D Hilbert Space-Filling Curves.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
CoRR, 2013

SIMS: Self-adaptive Intelligent Monitoring System for Supporting Home-Based Heart Failure Patients.
Proceedings of the Inclusive Society: Health and Wellbeing in the Community, and Care at Home, 2013

SODIT: An innovative system for outlier detection using multiple localized thresholding and interactive feedback.
Proceedings of the 29th IEEE International Conference on Data Engineering, 2013

Effectively Delivering XML Information in Periodic Broadcast Environments.
Proceedings of the Database and Expert Systems Applications, 2013

A self-stabilizing protocol for minimal weighted dominating sets in arbitrary networks.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

Telemedicine and Telemonitoring in Healthcare.
Proceedings of the Brain and Health Informatics - International Conference, 2013

Minimising K-Dominating Set in Arbitrary Network Graphs.
Proceedings of the Advanced Data Mining and Applications - 9th International Conference, 2013

A Self-Stabilizing Algorithm for Finding a Minimal Positive Influence Dominating Set in Social Networks.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

Role-based access control to outsourced data in could computing.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Guest Editorial.
J. Softw., 2012

Purpose Based Access Control for Privacy Protection in E-Healthcare Services.
J. Softw., 2012

Microdata Protection Method Through Microaggregation: A Systematic Approach.
J. Softw., 2012

Multi-level delegations with trust management in access control systems.
J. Intell. Inf. Syst., 2012

A role-involved purpose-based access control model.
Inf. Syst. Frontiers, 2012

An approximate microaggregation approach for microdata protection.
Expert Syst. Appl., 2012

On the identity anonymization of high-dimensional rating data.
Concurr. Comput. Pract. Exp., 2012

A purpose-based access control in native XML databases.
Concurr. Comput. Pract. Exp., 2012

Satisfying Privacy Requirements Before Data Anonymization.
Comput. J., 2012

Unsupervised Multi-label Text Classification Using a World Knowledge Ontology.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2012

A Self-stabilizing Algorithm for Finding a Minimal K-Dominating Set in General Networks.
Proceedings of the Data and Knowledge Engineering - Third International Conference, 2012

Data Privacy against Composition Attack.
Proceedings of the Database Systems for Advanced Applications, 2012

Semantic access control for cloud computing based on e-Healthcare.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
Validating Privacy Requirements in Large Survey Rating Data.
Proceedings of the Next Generation Data Technologies for Collective Computational Intelligence, 2011

Privacy-aware access control with trust management in web service.
World Wide Web, 2011

Detecting anomalies from high-dimensional wireless network data streams: a case study.
Soft Comput., 2011

A Conditional Role-Involved Purpose-Based Access Control Model.
J. Organ. Comput. Electron. Commer., 2011

Microdata Protection Method Through Microaggregation: A Median-Based Approach.
Inf. Secur. J. A Glob. Perspect., 2011

A family of enhanced (L, alpha)-diversity models for privacy preserving data publishing.
Future Gener. Comput. Syst., 2011

A conditional purpose-based access control model with dynamic roles.
Expert Syst. Appl., 2011

Publishing anonymous survey rating data.
Data Min. Knowl. Discov., 2011

Access control and authorization for protecting disseminative information in E-learning workflow.
Concurr. Comput. Pract. Exp., 2011

Injecting purpose and trust into data anonymisation.
Comput. Secur., 2011

Extended k-anonymity models against sensitive attribute disclosure.
Comput. Commun., 2011

Efficient systematic clustering method for <i>k</i>-anonymization.
Acta Informatica, 2011

Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems.
Proceedings of the IEEE 10th International Conference on Trust, 2011

A purpose based usage access control model for E-healthcare services.
Proceedings of the 2011 International Conference on Data and Knowledge Engineering, 2011

Positive Influence Dominating Set in E-Learning Social Networks.
Proceedings of the Advances in Web-Based Learning - ICWL 2011, 2011

Cloning for privacy protection in multiple independent data publications.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless Environments.
Proceedings of the 25th IEEE International Conference on Advanced Information Networking and Applications Workshops, 2011

Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

2010
Privacy Protection for Genomic Data: Current Techniques and Challenges.
Proceedings of the Advances in Intelligent Information Systems, 2010

Purpose-Based Access Control Policies and Conflicting Analysis.
Proceedings of the Security and Privacy - Silver Linings in the Cloud, 2010

Satisfying Privacy Requirements: One Step before Anonymization.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2010

Trust-Involved Access Control in Collaborative Open Social Networks.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Purpose Based Access Control in XML Databases System.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Towards Identify Anonymization in Large Survey Rating Data.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Specifying Usage Control Model with Object Constraint Language.
Proceedings of the Fourth International Conference on Network and System Security, 2010

Systematic Clustering-Based Microaggregation for Statistical Disclosure Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Role-Involved Conditional Purpose-Based Access Control Model.
Proceedings of the E-Government, E-Services and Global Processes, 2010

A Pairwise-Systematic Microaggregation for Statistical Disclosure Control.
Proceedings of the ICDM 2010, 2010

On Memory and I/O Efficient Duplication Detection for Multiple Self-clean Data Sources.
Proceedings of the Database Systems for Advanced Applications, 2010

DISTRO: A System for Detecting Global Outliers from Distributed Data Streams with Privacy Protection.
Proceedings of the Database Systems for Advanced Applications, 2010

Systematic clustering method for <i>l</i>-diversity model.
Proceedings of the Database Technologies 2010, 2010

2009
Effective Collaboration with Information Sharing in Virtual Universities.
IEEE Trans. Knowl. Data Eng., 2009

Authorization Algorithms for Permission-Role Assignments.
J. Univers. Comput. Sci., 2009

Delegating revocations and authorizations in collaborative business environments.
Inf. Syst. Frontiers, 2009

An integrated model for next page access prediction.
Int. J. Knowl. Web Intell., 2009

Extended K-Anonymity Models Against Attribute Disclosure.
Proceedings of the Third International Conference on Network and System Security, 2009

Achieving P-Sensitive K-Anonymity via Anatomy.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Trust-Based Access Control for Privacy Protection in Collaborative Environment.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

Optimal Privacy-Aware Path in Hippocratic Databases.
Proceedings of the Database Systems for Advanced Applications, 2009

Privacy preserving on Radio Frequency Identification systems.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

Injecting purpose and trust into data anonymisation.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Studying Genotype-Phenotype Attack on k-anonymised Medical and Genomic Data.
Proceedings of the Eighth Australasian Data Mining Conference, AusDM 2009, Melbourne, 2009

Conditional Purpose Based Access Control Model for Privacy Protection.
Proceedings of the Database Technologies 2009, 2009

Microdata Protection Through Approximate Microaggregation.
Proceedings of the Computer Science 2009, 2009

Privacy-aware Access Control with Generalization Boundaries.
Proceedings of the Computer Science 2009, 2009

2008
Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing.
Trans. Data Priv., 2008

Access control management for ubiquitous computing.
Future Gener. Comput. Syst., 2008

Portable devices of security and privacy preservation for e-learning.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Authorization approaches for advanced permission-role assignments.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Priority Driven K-Anonymisation for Privacy Protection.
Proceedings of the Data Mining and Analytics 2008, 2008

L-Diversity Based Dynamic Update for Large Time-Evolving Microdata.
Proceedings of the AI 2008: Advances in Artificial Intelligence, 2008

On the Complexity of Restricted k-anonymity Problem.
Proceedings of the Progress in WWW Research and Development, 2008

Protecting Information Sharing in Distributed Collaborative Environment.
Proceedings of the Advanced Web and NetworkTechnologies, and Applications, 2008

An efficient hash-based algorithm for minimal <i>k</i>-anonymity.
Proceedings of the Computer Science 2008, 2008

Integrating recommendation models for improved web page prediction accuracy.
Proceedings of the Computer Science 2008, 2008

Advanced Permission-Role Relationship in Role-Based Access Control.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

(p<sup>+</sup>, α)-sensitive k-anonymity: A new enhanced privacy protection model.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

ABDM: An extended flexible delegation model in RBAC.
Proceedings of 8th IEEE International Conference on Computer and Information Technology, 2008

2007
Secure and Efficient Information Sharing in Multi-university E-Learning Environments.
Proceedings of the Advances in Web Based Learning, 2007

Protecting Disseminative Information in E-Learning.
Proceedings of the Advances in Web Based Learning, 2007

Delegating Revocations and Authorizations.
Proceedings of the Business Process Management Workshops, 2007

2006
Ticket-based mobile commerce system and its implementation.
Proceedings of the Q2SWinet'06, 2006

Combined Gene Selection Methods for Microarray Data Analysis.
Proceedings of the Knowledge-Based Intelligent Information and Engineering Systems, 2006

Ubiquitous computing environments and its usage access control.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses.
Proceedings of the Data Mining and Analytics 2006, 2006

A Comparative Study of Classification Methods For Microarray Data Analysis.
Proceedings of the Data Mining and Analytics 2006, 2006

Role-Based Delegation with Negative Authorization.
Proceedings of the Frontiers of WWW Research and Development, 2006

A framework for role-based group deligation in distributed environments.
Proceedings of the Computer Science 2006, 2006

2005
A Flexible Payment Scheme and Its Role-Based Access Control.
IEEE Trans. Knowl. Data Eng., 2005

Towards Secure XML Document with Usage Control.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Authorization Algorithms for the Mobility of User-Role Relationship.
Proceedings of the Computer Science 2005, 2005

2004
A Global Ticket-Based Access Scheme for Mobile Users.
Inf. Syst. Frontiers, 2004

An Electronic Cash Scheme and its Management.
Concurr. Eng. Res. Appl., 2004

Specifying Role-Based Access Constraints with Object Constraint Language.
Proceedings of the Advanced Web Technologies and Applications, 2004

Anonymous Access Scheme for Electronic Services.
Proceedings of the Computer Science 2004, 2004

2003
Achieving secure and flexible M-services through tickets.
IEEE Trans. Syst. Man Cybern. Part A, 2003

Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations.
Proceedings of the Database Technologies 2003, 2003

A Flexible Payment Scheme and its Permission-Role Assignment.
Proceedings of the Computer Science 2003, 2003

2002
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations.
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002

Building consumer self-anonymity scalable payment protocol for Internet purchase.
Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems, 2002

Ticket-Based Service Access Scheme for Mobile Users.
Proceedings of the Computer Science 2002, 2002

2001
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001

2000
A Protocol for Untraceable Electronic Cash.
Proceedings of the Web-Age Information Management, First International Conference, 2000


  Loading...