Publications

Journal Papers

2011

Kabir Md E, Wang H: (2011) Microdata Protection Method Through Microaggregation: A Median-Based Approach. Information Security Journal: A Global Perspective 20(1): 1-8.

Kabir Md. E, Wang H, Bertino E: (2011) A Conditional Role-Involved Purpose-Based Access Control Model. J. Org. Computing and E. Commerce 21(1): 71-91.

Kabir Md. E, Wang H, Bertino E: (2011) Efficient systematic clustering method for k-anonymization. Acta Inf. 48(1): 51-66

Kabir Md. E, Wang H, Bertino E: (2011) A conditional purpose-based access control model with dynamic roles. Expert Syst. Appl. 38(3): 1482-1489.

Li M, Sun X, Wang H, Zhang Y and Zhang J. (2011) )Privacy-aware access control with trust management in web service. World Wide Web, 14 (4), pp. 407-430. ISSN 1386-145X.

Nguyen-Ky T, Peng Wen and Yan Li. (2011) “Measuring and reflecting depth of anaesthesia using wavelet and power spectral density techniques”, IEEE Transaction on Information Technology in Medicine, 15 (4), pp

Siuly and Li Y, (2011) Clustering technique-based least square support vector machine for EEG signal classification, Computer Methods and Programs in Biomedicine. 104 358-372.

Siuly, Li Y and Wen P. (2011) “EEG signal classification based on simple random sampling technique with least square support vector machine” International journal of Biomedical Engineering and Technology, 7, 390-409.

Siuly, Li Y and Wen P. (2011) “EEG signal classification based on simple random sampling technique with least square support vector machine” International journal of Biomedical Engineering and Technology. 7 390-409. 
 
Sun X, Li M and Wang H. (2011) A Family of Enhanced (L,a)- Diversity Models For Privacy Preserving Data Publishing. Future Generation Computer Systems. 27 (3) pp348-356. doi:10.1016/j.future.2010.07.007.

Sun L and Wang H: (2011) Access control and authorization for protecting disseminative information in E-learning workflow, Concurrency and Computation: Practice and Experience 23(16): 2034-2042.

Sun L, and Wang H: (2011) A purpose based access control in native XML databases, accepted by Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.1717, 2011.

Sun L, Wang H: (2011) A purpose based usage access control model for E-healthcare services. ICDKE 2011: 41-46.

Sun L, Wang H, Tao X, Zhang Y, Yang, J: (2011) Privacy reserving access control policy and algorithms for conflicting problem, pp: 250 – 257. IEEE TrustCom 2011.

Sun X, and Wang H: (2011) On the Identity Anonymization of High Dimensional Rating Data, Concurrency and Computation: Practice and Experience, DOI: 10.1002/cpe.1724.

Sun X, Wang H, and Sun L: (2011) Extended k-Anonymity Models Against Sensitive Attribute Disclosure. Computer Communication. 34(4): 526-535. Elsevier.

Sun X, Wang H, Li J, Zhang Y: (2011) Injecting purpose and trust into data anonymisation. Computers & Security 30(5): 332-345

Sun X, Wang H, Li J, Pei J: (2011) Publishing anonymous survey rating data. Data Min. Knowl. Discov. 23(3): 379-406

Walters-Williams J and Li Y. (2011) A New Approach to Denoising EEG Signals – Merger of Translation Invariant Wavelet and ICA, International Journal of Biometric and Bioinformatics, 5 pp 130 - 148.

Walters-Williams J and Li Y. (2011) Performance Comparison of Known ICA Algorithms to a Wavelet-ICA Merger, Signal Processing: An International Journal. 5 80-92.

Xu K, Yu Q, Liu Q, Zhang J and Borguettaya A. (2011) Web service management system for bioinformatics research: a case study. Service Oriented Computing and Applications, 5 1-15, ISSN 1863-2386.

Williams J and Li Y. (2011) Evaluation of an ICA-Filter-Wavelet Merger – A Case Study on Denoising EEG, International Journal of Computer Science Issues. 8.

Williams J and Li Y. (2011) Using Invariant Translation to Denoise EEG Signals, American Journal of Applied Sciences, 8, 1122-1130.
Williams J and Li Y. (2011) BMICA-Independent Component Analysis Based on B-spline Mutual Information Estimator, Signal & Image Processing: An International Journal . 5

Williams J and Li Y. (2011) Improving the Performance of Translation Wavelet Transform using BMICA, International Journal of Computer Science and Information Security. 9 48-56.

Xu K, Yu Q, Liu Q, Zhang J and Borguettaya A. (2011) Web service management system for bioinformatics research: a case study. Service Oriented Computing and Applications, 5 (1), pp. 1-15, ISSN 1863-2386.

Zhang J, Gao O, Wang H and Wang Hua. (2010) Detecting Anomalies from High-dimensional Wireless Network Data Streams: A Case Study. Soft Computing, DOI: 10.1007/s00500-010-0575-1 Published online March 2010 – 2011 publication.

Zhang J. (2011) A Subspace-based Analysis Method for Anomaly Detection in Large and High dimensional Network Connection Data Streams. Privacy, Intrusion Detection, and Response: Technologies for Protecting Networks, Peyman Kabiri (Ed.), IGI Global Publisher, USA, 2011, ISBN 9781609608361, pp. 46-59.

2010

Miller S, Hansell N, Ngo T, Liu G, Pettigrew J, Martin N, and Wright M. (2010) Genetic contribution to individual variation in binocular rivalry rate. PNAS, 107(6) 2664-2668.

Nguyen-Ky T, Wen P and Li Y (2010) Improving the Accuracy of Depth of Anaesthesia using Modified Detrended Fluctuation Analysis Method, Biomedical Signal Processing and Control, 5 (1) 59-65, doi:10.1016/j.bspc.2009.03.001,

Sun X, Li M and Wang H. (2010) A Family of Enhanced (L,a)- Diversity Models For Privacy Preserving Data Publishing. Future Generation Computer Systems. In Press.

Zhang J, Gao O, Wang H and Wang Hua. (2010) Detecting Anomalies from High-dimensional Wireless Network Data Streams: A Case Study. Soft Computing, Springer Publishing, 2010.

2009

Addie R, Neame TD and Zukerman M (2009) Performance analysis of a Poisson–Pareto queue over the full range of system parameters. Computer Networks. 53 (7) 1099-1113.

Khalil F, Li J and Wang H (2009) An integrated model for next page access prediction, Int. J. Knowledge and Web Intelligence, Vol. 2009.

Nguyen-Ky T, Wen P and Li Y (2009) Theoretical basis for identification of different anesthetic states based on routinely recorded EEG during operation, Computers in Biology and Medicine, 39, 40-45.

Nguyen-Ky T, Wen P and Li Y (2009) Improving the accuracy of depth of anaesthesia using modified detrended fluctuation analysis method, Biomedical Signal Processing and Control, 5 (1) 59-65, 2010.

Sun L, Wang H and Yong J (2009) Authorization algorithms for permission-role assignments, Journal of Universal Computer Science, 15 (9) 1782-1796.

Sun, Lili and Li, Yan (2009) Using usage control to access XML databases. International Journal of Information Systems in the Service Sector, 1 (3). pp. 32-44. ISSN 1935-5688

Wang H, Cao J and Zhang Y (2009) Delegating revocations and authorizations in collaborative business environments, Information Systems Frontiers. 11 (3) 293-305.

Wang H, Zhang Y and Cao J (2009) Effective collaboration with information sharing in virtual universities, IEEE Transactions on Knowledge and Data Engineering, 21 (6) 840-853.

Wen P and Li Y (2009) Minimum Packet Drop Sequences Based Networked Control System Model with Embedded Markov Chain, Simulation Modeling Practice and Theory, 17, 10 1635-1641.

Xiang W, Otta C & Wen P (2009) “Automated vehicle classification system for AUSTRODS standard based upon laser sensor technology”, Australian Journal of Electrical & Electronic Engineering, 5 (2) 1-12.

Zou W, Li Y, Li Z and Ding X (2009) Improvement of the Accuracy of InSAR Image Co-registration – A Review, Sensors, 9 (2), 1259-1281; doi:10.3390/s90201259. ISSN 1424-8220.

Zou W, Li Y and Tang A (2009) Effects of the Numbers of Hidden Nodes Used in a Structured-based Neural Network on the Reliability of Image Classification, Neural Computing and Applications, 18 (3) 249-260. (online version: DOI 10.1007/s00521-008-0177-3).


Conference Proceedings

2011

 
Baig M M, Li J, Liu J, Wang H: (2011) Cloning for privacy protection in multiple independent data publications. Conference on Information and Knowledge Management 2011: pp885-894

Kabir, Md E and Wang, Hua and Bertino, Elisa (2010) A role-involved conditional purpose-based access control model. E-Government and E-Services Conference (EGES) at the 2010 IFIP World Computer Conference, World Computer Congress 2010, 20-23 Sept 2010, Brisbane, Australia.

Liu Q, Zhang J, Forbes J, Xu K and Nair D. A Process Provenance Service System for Scientific Data Analysis and Sharing. 2011 International Conference on Data and Knowledge Engineering (ICDKE’11), Milan, Italy, September, 2011, pp. 25-29.

Qin Y, Wang H and Xiao J, Effective Scheduling Algorithm for On-Demand XML Data Broadcasts in Wireless Environments, The 22nd Australasian Database Conference (ADC 2011), Perth, Australia, 17-20 January, 2011.

Qin Y, Wang H, Sun L: (2011) Cluster-Based Scheduling Algorithm for Periodic XML Data Broadcast in Wireless Environments. Advanced Information Netwprlomg and Applications Workshops 2011 pp855-860.

Siuly, Li Y and Wen P. (2011) Developing a Logistic Regression Model with Cross-Correlation for Motor Imagery Signal Recognition, The Proceedings of 2011 IEEE/ICME International Conference on Complex Medical Engineering, Harbin, China, May 22-25, 2011, 502-507.

Sun L, Wang H, (2011) A purpose based usage access control model for E-healthcare services. International Conference on Data and Knowledge Engineering 6-8 September 2011, Milan, Italy.

Sun L, Wang H, Tao X, Zhang Y, Yang, J: (2011) Privacy reserving access control policy and algorithms for conflicting problem, pp: 250 – 257. IEEE International Conference on Trust, Security and Privacy in Computing. 16-18 November 2011, Changsha, China

Wang G, Wang H, Tao X, Zhang J: (2011) Positive Influence Dominating Set in E-learning Social Networks. The 10th International Conference on Web-based Learning(ICWL 2011), Hong Kong, 8-10 December 2011.

Wen P and Li Y (2011) Twin Rotor System Modelling, De-coupling and Optimal Control, The Proceedings of 2011 IEEE International Conference on Mechatronics and Automation, 8-10 Aug, 2011, Beijing China, 1839-1842.

Zhang J and Luo Y. (2011). A Novel Bit Freezing Technique to Improve Gene Specific Co-regulation Discovery from Gene Expression Databases. The 34th Australasian Computer Science Conference (ACSC'11), Perth, Australia, January, pp. 99-106.
2010

2010

Zhang J, Liu Q and Xu K. FlowRecommender: A Workflow Recommendation Technique for Process Provenance. 8th Australasian Data Mining Conference (AusDM'09), Melbourne, Australia, 2010

Abdulla S, Wen P. Depth of Anaesthesia Control using Internal Model Control Techniques. International Conference on Complex Medical Engineering. Gold Coast, Australia, 2010.

Sun X, Wang H, Li J. (2010) Satisfying Privacy Requirements: One Step Before Anonymization. to appear in PAKDD 2010. (Tier A ICT Conference)

Sun X and Wang H. Towards Identify Anonymization in Large Survey Rating Data. 4th International Conference on Network and System Security (NSS 2010), Melbourne, Australia, September, 2010.

Zhang J, Dekeyser S, Wang H and Shu Y. DISTRO: A System for Detecting Global Outliers from Distributed Data Streams with Privacy Protection. 15th International Conference on Database Systems for Advanced Applications (DASFAA'10), Tsukuba, Japan, 2010

Zhang J, Shu Y and Wang H. On Memory and I/O Efficient Duplication Detection for Multiple Self-clean Data Sources. 3rd International Workshop on Managing Data Quality in Collaborative Information Systems (MCIS2010), in conjunction with 15th International Conference on Database Systems for Advanced Applications (DASFAA'10), Tsukuba, Japan, 2010