2009 | ||
---|---|---|
48 | Xiaoxun Sun, Hua Wang, Jiuyong Li: Microdata Protection Through Approximate Microaggregation. ACSC 2009: 149-156 | |
47 | Junhu Wang, Kewen Wang, Jiuyong Li: Finding Irredundant Contained Rewritings of Tree Pattern Queries Using Views. APWeb/WAIM 2009: 113-125 | |
46 | Xiaoxun Sun, Hua Wang, Jiuyong Li: Injecting purpose and trust into data anonymisation. CIKM 2009: 1541-1544 | |
45 | Xiaoxun Sun, Hua Wang, Jiuyong Li, David Ross: Achieving P-Sensitive K-Anonymity via Anatomy. ICEBE 2009: 199-205 | |
44 | Jiuyong Li, Ada Wai-Chee Fu, Paul Fahey: Efficient discovery of risk patterns in medical data. Artificial Intelligence in Medicine 45(1): 77-89 (2009) | |
43 | Faten Khalil, Jiuyong Li, Hua Wang: An integrated model for next page access prediction. I. J. Knowledge and Web Intelligence 1(1/2): 48-80 (2009) | |
42 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymous data publishing. J. Intell. Inf. Syst. 33(2): 209-234 (2009) | |
41 | Bing Liu, Jiuyong Li, Anna Tsykin: Discovery of functional miRNA-mRNA regulatory modules with computational methods. Journal of Biomedical Informatics 42(4): 685-691 (2009) | |
2008 | ||
40 | John F. Roddick, Jiuyong Li, Peter Christen, Paul J. Kennedy: Data Mining and Analytics 2008, Proceedings of the Seventh Australasian Data Mining Conference (AusDM 2008). Glenelg/Adelaide, SA, Australia, 27-28 November 2008, Proceedings Australian Computer Society 2008 | |
39 | Faten Khalil, Jiuyong Li, Hua Wang: Integrating recommendation models for improved web page prediction accuracy. ACSC 2008: 91-100 | |
38 | Xiaoxun Sun, Hua Wang, Jiuyong Li: On the Complexity of Restricted k-anonymity Problem. APWeb 2008: 287-296 | |
37 | Xiaoxun Sun, Hua Wang, Jiuyong Li: Priority Driven K-Anonymisation for Privacy Protection. AusDM 2008: 73-78 | |
36 | Xiaoxun Sun, Hua Wang, Jiuyong Li: L-Diversity Based Dynamic Update for Large Time-Evolving Microdata. Australasian Conference on Artificial Intelligence 2008: 461-469 | |
35 | Jianming Yong, Jiuyong Li, Hua Wang: Portable devices of security and privacy preservation for e-learning. CSCWD 2008: 1029-1034 | |
34 | Hua Wang, Jianming Yong, Jiuyong Li, Min Peng: Authorization approaches for advanced permission-role assignments. CSCWD 2008: 277-282 | |
33 | Jinsong Leng, Jiuyong Li, Lakhmi C. Jain: A Role-Based Framework for Multi-agent Teaming. KES (3) 2008: 642-649 | |
32 | Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei: Anonymization by Local Recoding in Data with Attribute Hierarchical Taxonomies. IEEE Trans. Knowl. Data Eng. 20(9): 1181-1194 (2008) | |
31 | Jinsong Leng, Jiuyong Li, Lakhmi C. Jain: A role-oriented BDI framework for real-time multiagent teaming. Intelligent Decision Technologies 2(4): 205-217 (2008) | |
30 | Yingyi Bu, Ada Wai-Chee Fu, Raymond Chi-Wing Wong, Lei Chen, Jiuyong Li: Privacy preserving serial data publishing by role composition. PVLDB 1(1): 845-856 (2008) | |
29 | Xiaoxun Sun, Hua Wang, Jiuyong Li, Traian Marius Truta: Enhanced P-Sensitive K-Anonymity Models for Privacy Preserving Data Publishing. Transactions on Data Privacy 1(2): 53-66 (2008) | |
2007 | ||
28 | Peter Christen, Paul J. Kennedy, Jiuyong Li, Inna Kolyshkina, Graham J. Williams: Data Mining and Analytics 2007, Proceedings of the Sixth Australasian Data Mining Conference (AusDM 2007), Gold Coast, Queensland, Australia, December 3-4, 2007, Proceedings Australian Computer Society 2007 | |
27 | Jiuyong Li, Xiaodi Huang, Clinton Selke, Jianming Yong: A Fast Algorithm for Finding Correlation Clusters in Noise Data. PAKDD 2007: 639-647 | |
2006 | ||
26 | Peter Christen, Paul J. Kennedy, Jiuyong Li, Simeon J. Simoff, Graham J. Williams: Data Mining and Analytics 2006, Proceedings of the Fifth Australasian Data Mining Conference (AusDM2006), Sydney, NSW, Australia, 29-30 November, 2006, Proceedings Australian Computer Society 2006 | |
25 | Hua Wang, Jiuyong Li, Ron Addie, Stijn Dekeyser, Richard Watson: A framework for role-based group deligation in distributed environments. ACSC 2006: 321-328 | |
24 | Faten Khalil, Jiuyong Li, Hua Wang: A Framework of Combining Markov Model With Association Rules for Predicting Web Page Accesses. AusDM 2006: 177-184 | |
23 | Hong Hu, Jiuyong Li, Ashley W. Plank, Hua Wang, Grant Daggard: A Comparative Study of Classification Methods For Microarray Data Analysis. AusDM 2006: 33-37 | |
22 | Hongxing He, Huidong Jin, Jie Chen, Damien McAullay, Jiuyong Li, Tony Fallon: Analysis of Breast Feeding Data Using Data Mining Methods. AusDM 2006: 47-52 | |
21 | Jiuyong Li, Raymond Chi-Wing Wong, Ada Wai-Chee Fu, Jian Pei: Achieving k-Anonymity by Clustering in Attribute Hierarchical Structures. DaWaK 2006: 405-416 | |
20 | Raymond Chi-Wing Wong, Jiuyong Li, Ada Wai-Chee Fu, Ke Wang: (alpha, k)-anonymity: an enhanced k-anonymity model for privacy preserving data publishing. KDD 2006: 754-759 | |
19 | Jiuyong Li, Jason Jones: Classification Using Multiple and Negative Target Rules. KES (1) 2006: 212-219 | |
18 | Hong Hu, Jiuyong Li, Hua Wang, Grant Daggard: Combined Gene Selection Methods for Microarray Data Analysis. KES (1) 2006: 976-983 | |
17 | Jiuyong Li: On Optimal Rule Discovery. IEEE Trans. Knowl. Data Eng. 18(4): 460-471 (2006) | |
16 | Jiuyong Li: Robust Rule-Based Prediction. IEEE Trans. Knowl. Data Eng. 18(8): 1043-1054 (2006) | |
15 | Jiuyong Li, Jason Jones: Using multiple and negative target rules to make classifiers more understandable. Knowl.-Based Syst. 19(6): 438-444 (2006) | |
2005 | ||
14 | Hong Hu, Jiuyong Li: Using Association Rules to Make Rule-based Classifiers Robust. ADC 2005: 47-54 | |
13 | Xiangsheng Chen, Jiuyong Li, Grant Daggard, Xiaodi Huang: Finding Similar Patterns in Microarray Data. Australian Conference on Artificial Intelligence 2005: 1272-1276 | |
12 | Jiuyong Li, Ada Wai-Chee Fu, Hongxing He, Jie Chen, Huidong Jin, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman: Mining risk patterns in medical data. KDD 2005: 770-775 | |
11 | Jie Chen, Hongxing He, Jiuyong Li, Huidong Jin, Damien McAullay, Graham J. Williams, Ross Sparks, Chris Kelman: Representing Association Classification Rules Mined from Health Data. KES (3) 2005: 1225-1231 | |
2004 | ||
10 | Jiuyong Li, Hong Shen, Rodney W. Topor: Mining Informative Rule Set for Prediction. J. Intell. Inf. Syst. 22(2): 155-174 (2004) | |
2003 | ||
9 | Lifang Gu, Jiuyong Li, Hongxing He, Graham J. Williams, Simon Hawkins, Chris Kelman: Association Rule Discovery with Unbalanced Class Distributions. Australian Conference on Artificial Intelligence 2003: 221-232 | |
8 | Jiuyong Li, Yanchun Zhang: Direct Interesting Rule Generation. ICDM 2003: 155-162 | |
2002 | ||
7 | Jiuyong Li, Rodney W. Topor, Hong Shen: Construct robust rule sets for classification. KDD 2002: 564-569 | |
6 | Jiuyong Li, Hong Shen, Rodney W. Topor: Mining the optimal class association rule set. Knowl.-Based Syst. 15(7): 399-405 (2002) | |
2001 | ||
5 | Jiuyong Li, Hong Shen, Rodney W. Topor: Mining the Smallest Association Rule Set for Predictions. ICDM 2001: 361-368 | |
4 | Jiuyong Li, Hong Shen, Rodney W. Topor: Mining Optimal Class Association Rule Set. PAKDD 2001: 364-375 | |
1999 | ||
3 | Jiuyong Li, Hong Shen, Rodney W. Topor: An Adaptive Method of Numerical Attribute Merging for Quantitative Association Rule Mining. ICSC 1999: 41-50 | |
2 | Jiuyong Li, Hong Shen, Paul Pritchard: Mining Significant Association Rules (Short Version). PDPTA 1999: 1458-1461 | |
1 | Jiuyong Li, Hong Shen, Paul Pritchard: Knowledge Network Based Association Discovery (Preliminary Version). PDPTA 1999: 1558-1563 |