Research Repository

Items where Subject is "FOR Classification > 0804 Data Format"

Up a level
Export as [feed] RSS
Group by: Item Type | Creators
Number of items at this level: 48.


ALWADAIN, A and FIELT, E and KORTHAUS, Axel and ROSEMANN, M (2015) Empirical Insights into the Development of a Service-oriented Enterprise Architecture. Data and Knowledge Engineering. ISSN 1872-6933

Duong, Maggie and Zhang, Yanchun (2008) An integrated access control for securely querying and updating XML data. Conferences in Research and Practice in Information Technology, 75. pp. 75-83. ISSN 1445-1336

Kabir, E and Mahmood, A and Wang, Hua and Mustafa, A (2015) Microaggregation Sorting Framework for K-Anonymity Statistical Disclosure Control in Cloud Computing. IEEE Transactions on Cloud Computing. ISSN 2168-7161

Kaosar, Md. Golam and Yi, Xun (2009) Privacy Preserving Association Rule Mining in Ubiquitous Computing Environment. Ubiquitous Computing and Communication Journal, 6 (3). pp. 925-933. ISSN 1994-4608 (print) 1992-8424 (online)

Li, J and Liu, C and Zhou, Rui and Yu, JX (2015) Query-Driven Frequent Co-Occurring Term Computation over Relational Data Using MapReduce. Computer Journal, 58 (3). 497 - 513. ISSN 0010-4620

Liang, Chunquan and Zhang, Yanchun and Shi, Peng and Hu, Zhengguo (2012) Learning very fast decision tree from uncertain data streams with positive and unlabeled samples. Information Sciences, 213. pp. 50-67. ISSN 0020-0255 (print), 1872-6291 (online)

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong and Zhang, Yanchun (2012) An approximate microaggregation approach for microdata protection. Expert Systems with Applications, 39 (2). pp. 2211-2219. ISSN 0957-4174 (print), 1873-6793 (online)

Wu, ZongDa and Xu, Guandong and Yu, Zong and Yi, Xun and Cheng, EnHong and Zhang, Yanchun (2012) Executing SQL queries over encrypted character strings in the Database-As-Service model. Knowledge-Based Systems, 35. pp. 332-348. ISSN 0950-7051 (print) 1872-7409 (on-line)

Yang, Yang and Yang, Yi and Shen, HT and Zhang, Yanchun and Du, X and Zhou, X (2013) Discriminative nonnegative spectral clustering with out-of-sample extension. IEEE Transactions on Knowledge and Data Engineering, 25 (8). 1760 - 1771. ISSN 1041-4347

Yi, Xun and Zhang, Yanchun (2009) Privacy-preserving naive Bayes classification on distributed data via semi-trusted mixers. Information systems, 34 (3). pp. 371-380. ISSN 0306-4379

Yi, Xun and Tso, Raylin and Okamoto, Eiji (2009) ID-Based Group Password-Authenticated Key Exchange. Lecture Notes in Computer Science, 5824. pp. 192-211. ISSN 0302-9743

Yi, Xun and Zhang, Yanchun (2012) Equally contributory privacy-preserving k-means clustering over vertically partitioned data. Information systems, 38 (1). pp. 97-107. ISSN 0306-4379 (print), 1873-6076 (online)

Zhang, Yanchun (2008) Book Review: H. Zhuge, The Web Resource Space Model, Springer (2007). The journal of systems and software, 81 (6). pp. 1063-1064. ISSN 0164-1212

Zhang, J and Li, H and Liu, X and Luo, Y and Chen, F and Wang, Hua and Chang, L (2015) On Efficient and Robust Anonymization for Privacy Protection on Massive Streaming Categorical Information. IEEE Transactions on Dependable and Secure Computing. ISSN 1545-5971

Book Section

Ahmed, Khandakar and Alexandrov, V (2011) Identity and Access Management in Cloud Computing. In: Cloud Computing for Enterprise Architectures. -, , ed. Computer Communications and Networks . Springer, London, pp. 115-133.

Armatas, Christine and Colbert, Bernard (2009) Ensuring security and integrity of data for online assessment. In: E-Learning Technologies and Evidence-Based Assessment Approaches. Spratt, Christine and Lajbcygier, Paul, eds. IGI Global, Hershey, Pennsylvania, pp. 97-116.

Baig, MM and Li, J and Liu, J and Wang, Hua and Wang, J (2010) Privacy Protection for Genomic Data: Current Techniques and Challenges. In: Advances in Intelligent Information Systems. Ras, Z and Tsay, L, eds. Studies in Computational Intelligence, 265 . Springer Berlin Heidelberg, Berlin, pp. 175-193.

Ding, Dawei and Yang, Jun and Liang, Qing Quan and Wang, Liping and Wenyin, Liu (2004) Automatic detection of Flash movie genre using Bayesian approach. In: 2004 International Conference on Multimedia and Expo (ICME) : June 27-30, 2004, Taipei, Taiwan. IEEE, Piscataway, N. J., pp. 603-606.

Duong, Maggie and Zhang, Yanchun (2008) Dynamic Labelling Scheme for XML Data Processing. In: On the Move to Meaningful Internet Systems : OTM 2008 : OTM 2008 Confederated International Conferences, CoopIS, DOA, GADA, IS, and ODBASE 2008, Monterrey, Mexico, November 9-14, 2008, proceedings. Meersman, Robert and Tari, Zahir, eds. Lecture notes in computer science, 2 (5332). Springer, Berlin, pp. 1183-1199.

Kabir, M and Wang, Hua and Zhang, Yanchun (2010) A Pairwise-Systematic Microaggregation for Statistical Disclosure Control. In: 2010 IEEE International Conference on Data Mining. Webb, Geoffrey I and Liu, Bing and Zhang, Chengqi and Gunopulos, Dimitrios and Wu, Xindong, eds. IEEE, Los Alamitos, California, pp. 266-273.

Marsh, S and Dwyer, Natasha and Basu, A and Storer, T and Renaud, K and El-Khatib, K and Esfandiari, B and Noël, S and Bicakci, MV (2014) Foreground Trust as a Security Paradigm: Turning Users into Strong Links. In: Information Security in Diverse Computing Environments. Kayem, A and Meinel, C, eds. IGI Global, Hershey, Pennsylvania, pp. 8-23.

Moinuddin, Khalid A. M (2009) A Sensitivity study of grid sizes for FDS5 Fire Modelling. In: FSE09: Fire Safety Engineering International Conference: Charting the Course. Society of Fire Safety, Melbourne, Australia.

Sun, Lili and Yan, Li and Wang, Hua (2011) Access Control Method with XML Databases. In: Information Systems and New Applications in the Service Sector: Models and Methods. Wang, John, ed. IGI Global, Hershey, PA, USA, pp. 227-239.

Tso, Raylin and Yi, Xun (2010) Certificateless proxy signature and its extension to blind signature. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : Melbourne, Australia, 1 - 3 September 2010, proceedings. Xiang, Yang and Samarati, Pierangela and Hu, Jiankun and Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, N.J., pp. 542-547.

Tso, Raylin and Yi, Xun and Ito, Tadahiko and Okamoto, Takeshi and Okamoto, Eiji (2010) Design and analysis of "flexible" k-out-of-n signatures. In: Autonomic and trusted computing : 7th international conference, ATC 2010, Xi'an, China, October 26-29, 2010 : proceedings. Xie, Bing and Branke, Juergen and Sadjadi, S Masoud and Zhang, Darqing and Zhou, Xingshe, eds. Lecture notes in computer science (6407). Springer, Boca Raton, Florida, pp. 255-267.

Venables, Anne and Tan, Grace and Lister, Raymond (2009) A closer look at tracing, explaining and code writing skills in the novice programmer. In: Proceedings of the Fifth International Computing Education Research Workshop (ICER '09). Association for Computing Machinery, New York, pp. 117-128.

Wu, Zongda and Xu, Guandong and Pan, Rong and Zhang, Yanchun and Hu, Zhiwen and Lu, Jianfeng (2011) Leveraging Wikipedia concept and category information to enhance contextual advertising. In: CIKM '11 : proceedings of the 20th ACM international conference on Information and knowledge management. Berendt, Bettina and de Vries, Arjen and Fan, Wenfei and Macdonald, Craig and Ounis, Iadh and Ruthven, Ian, eds. Association for Computing Machinery, New York, pp. 2105-2108.

Xu, Guandong and Gu, Yanhui and Dolog, Peter and Zhang, Yanchun and Kitsuregawa, Masaru (2011) SemRec: a semantic enhancement framework for tag based recommendation. In: Proceedings of the Twenty-Fifth AAAI Conference on Artificial Intelligence and the Twenty-Third Innovative Applications of Artificial Intelligence Conference, 7-11 August 2011, San Francisco, California, USA. Association for the Advancement of Artificial Intelligence Press, pp. 1267-1272.

Xu, Guandong and Gu, Yanhui and Zhang, Yanchun and Kitsuregawa, Masaru (2011) Toast: a topic-oriented tag based recommender system. In: Web information system engineering - WISE 2011 : 12th International Conference, Sydney, Australia, October 13-14, 2011, proceedings. Bouguettaya, Athman and Hauswirth, Manfred and Liu, Ling, eds. Lecture Notes in Computer Science (6997). Springer Press, Heidelburg, Germany, pp. 158-171.

Xu, Zhuojia and Yi, Xun (2011) Classification of privacy-preserving distributed data mining protocols. In: 2011 Sixth International Conference on Digital Information Management (ICDIM). IEEE, Piscataway, N.J., pp. 337-342.

Yi, Xun (2010) Security Analysis of Yang et al.s' Practical Password-Based Two-Server Authentication and Key Exchange Systems. In: 2010 Fourth International Conference on Network and System Security (NSS 2010) : 1-3 September 2010, Melbourne, Australia, proceedings. Xiang, Yang and Samarati, Pierangela and Hu, Jiankun and Zhou, Wanlei and Sadeghi, Ahmad-Reza, eds. IEEE, Piscataway, NJ, pp. 574-578.

Yi, Xun and Bertino, Elisa (2011) Private searching for single and conjunctive keywords on streaming data. In: Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society. Association for Computing Machinery, New York, pp. 153-158.

Yi, Xun and Okamoto, Eiji (2011) Practical mobile electronic election. In: System Integration (SII), 2011 IEEE/SICE International Syposium. IEEE, Piscataway, N.J., pp. 1119-1124.

Yi, Xun and Okamoto, Eiji (2011) Practical remote end-to-end voting scheme. In: Electronic Government and the Information Systems Perspective : Second International Conference, EGOVIS 2011 : Toulouse, France, August 29 - September 2, 2011 : proceedings. Andersen, Kim Normann and Francesconi, Enrico and Gronlund, Ake and van Engers, Tom M, eds. Lecture notes in computer science (6866). Springer, Heidelberg, Germany, pp. 386-400.

Yi, Xun and Tso, Raylin and Okamoto, Eiji (2011) Three-Party Password-Authenticated Key Exchange without Random Oracles. In: SECRYPT 2011 : Proceedings of the International Conference on Security and Cryptography, Seville, Spain, 18 - 21 July, 2011. Lopez, Javier and Samarati, Pierangela, eds. SciTePress, pp. 15-24.

Conference or Workshop Item

Huang, Z and Wang, Liping and Shen, HT and Shao, J and Zhou, X (2009) Online near-duplicate video clip detection and retrieval: An accurate and fast system. In: ICDE'09: 25th International Conference on Data Engineering, 29 March 2009-02 April 2009, Shanghai, China.

Lou, Xiaocui (2010) Reducing PAPR with Novel Precoding Method in OFDM System. In: 2009 Second International Symposium on Information Science and Engineering (ISISE), 26 December 2009-28 December 2009, Shanghai.

Ma, T and Wang, Hua and Cao, J and Yong, J and Zhao, Y (2016) Access control management with provenance in healthcare environments. In: 2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD 2016), 04 May 2016-06 May 2016, Nanchang, China.

Paulet, R and Kaosar, G and Yi, Xun (2011) K-Anonymous Private Query Based on Blind Signature and Oblivious Transfer. In: International Cyber Resilience Conference, 01 August 2011-02 August 2011, Perth, Australia.

Qiao, Z and Huang, Guangyan and He, Jing and Zhang, P and Guo, L and Cao, Jing and Zhang, Yanchun (2013) Discovering semantics from multiple correlated time series stream. In: Pacific-Asia Conference on Knowledge Discovery and Data Mining, 14 April 2013-17 April 2013, Gold Coast.

Singh, K and Rong, Jia and Batten, L (2015) Sharing sensitive medical data sets for research purposes - A case study. In: 2014 IEEE International Conference on Data Science & Advanced Analytics (DSAA 2014), 30 October 2014-01 November 2014, Shanghai.

Sun, L and Wang, Hua and Tao, X and Zhang, Yanchun and Yang, J (2011) Privacy Preserving Access Control Policy and Algorithms for Conflicting Problems. In: The 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom-11), 16 November 2011-18 November 2011, Changsha, Hunan, P. R. China.

Sun, Xiaoxun and Wang, Hua and Li, Jiuyong (2008) Priority driven K-Anonymisation for privacy protection. In: Seventh Australasian Data Mining Conference (AusDM'08), 27 November 2008-28 November 2008, Australian Computer Society, Inc..

Wang, Hua and Cao, J and Kambayashi, Y and Shan, MC (2002) Building a consumer scalable anonymity payment protocol for Internet purchases. In: 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE-2EC 2002), 24 February 2002-25 February 2002, San Jose, USA.


Duong, Maggie (2010) Access control model and labelling scheme for efficient querying and updating XML data. PhD thesis, Victoria University.

Paulet, Russell (2013) Design and analysis of privacy-preserving protocols. PhD thesis, Victoria University.

Taniar, David Randy (1997) Query optimization for parallel object-oriented database systems. PhD thesis, Victoria University of Technology.

Xu, Zhuojia (2011) Analysis of privacy preserving distributed data mining protocols. Research Master thesis, Victoria University.