Li, Jiuyong
< Back to all AuthorsArticle
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2012) An approximate microaggregation approach for microdata protection. Expert Systems with Applications, 39 (2). pp. 2211-2219. ISSN 0957-4174 (print), 1873-6793 (online)
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2012) Satisfying privacy requirements before data anonymization. The Computer Journal, 55 (4). pp. 422-437. ISSN 0010-4620 (print) 1460-2067 (online)
Sun, Xiaoxun, Wang, Hua, Li, Jiuyong and Zhang, Yanchun (2011) Injecting purpose and trust into data anonymisation. Computers and Security, 30 (5). pp. 332-345. ISSN 0167-4048
Conference or Workshop Item
Baig, Muzammil M, Li, Jiuyong, Liu, Jixue and Wang, Hua ORCID: 0000-0002-8465-0996 (2011) Cloning for Privacy Protection in Multiple Independent Data Publications. In: Conference on Information and Knowledge Management'11, 24 October 2011-28 October 2011, Glasgow, Scotland, UK.
Ofoghi, Bahadorreza and Yearwood, John (2010) Learning parse-free event-based features for textual entailment recognition. In: 23rd Australasian Joint Conference on Artificial Intelligence, AI 2010, 7-10 Dec 2010, Adelaide.
Sun, Xiaoxun, Wang, Hua ORCID: 0000-0002-8465-0996, Li, Jiuyong and Ross, David (2009) Achieving P-Sensitive K-Anonymity via Anatomy. In: ICEBE 2009 IEEE International Conference on e-Business Engineering, 21 October 2009-23 October 2009, Macau, China.
Sun, Xiaoxun, Wang, Hua ORCID: 0000-0002-8465-0996 and Li, Jiuyong (2008) Priority driven K-Anonymisation for privacy protection. In: Seventh Australasian Data Mining Conference (AusDM'08), 27 November 2008-28 November 2008, Australian Computer Society, Inc..