Li, Jiuyong

< Back to all Authors
Group by: Item type | Date
Number of items: 7.

2008

Sun, Xiaoxun, Wang, Hua ORCID: 0000-0002-8465-0996 and Li, Jiuyong (2008) Priority driven K-Anonymisation for privacy protection. In: Seventh Australasian Data Mining Conference (AusDM'08), 27 November 2008-28 November 2008, Australian Computer Society, Inc..

2009

Sun, Xiaoxun, Wang, Hua ORCID: 0000-0002-8465-0996, Li, Jiuyong and Ross, David (2009) Achieving P-Sensitive K-Anonymity via Anatomy. In: ICEBE 2009 IEEE International Conference on e-Business Engineering, 21 October 2009-23 October 2009, Macau, China.

2010

Ofoghi, Bahadorreza and Yearwood, John (2010) Learning parse-free event-based features for textual entailment recognition. In: 23rd Australasian Joint Conference on Artificial Intelligence, AI 2010, 7-10 Dec 2010, Adelaide.

2011

Baig, Muzammil M, Li, Jiuyong, Liu, Jixue and Wang, Hua ORCID: 0000-0002-8465-0996 (2011) Cloning for Privacy Protection in Multiple Independent Data Publications. In: Conference on Information and Knowledge Management'11, 24 October 2011-28 October 2011, Glasgow, Scotland, UK.

July 2011

Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048

2012

Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2012) Satisfying privacy requirements before data anonymization. The Computer Journal, 55 (4). pp. 422-437. ISSN 0010-4620 (print) 1460-2067 (online)

February 2012

Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2012) An approximate microaggregation approach for microdata protection. Expert Systems with Applications, 39 (2). pp. 2211-2219. ISSN 0957-4174 (print), 1873-6793 (online)