ORCID Profile
0000-0002-1680-2521
Current Organisations
City University of Macau
,
University of Technology Sydney
Does something not look right? The information on this page has been harvested from data sources that may not be up to date. We continue to work with information providers to improve coverage and quality. To report an issue, use the Feedback Form.
In Research Link Australia (RLA), "Research Topics" refer to ANZSRC FOR and SEO codes. These topics are either sourced from ANZSRC FOR and SEO codes listed in researchers' related grants or generated by a large language model (LLM) based on their publications.
Information Systems | Computer System Security | Global Information Systems | Computer Software | Information Systems Management | Global Information Systems | Networking and Communications | Information Systems Management | Web Technologies (excl. Web Search) | Interfaces And Presentation (Excl. Computer-Human Interaction) | Computer Communications Networks | Distributed Computing | Database Management | Interorganisational Information Systems and Web Services | Mobile Technologies
Application Tools and System Utilities | Information processing services | Application tools and system utilities | Application Software Packages (excl. Computer Games) | Information Processing Services (incl. Data Entry and Capture) | Fixed Line Data Networks and Services | Publishing and Print Services (incl. Internet Publishing) |
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11599371_26
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2015
Publisher: Elsevier BV
Date: 07-1997
Publisher: Emerald
Date: 20-12-2007
Publisher: Elsevier BV
Date: 09-2001
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11576235_42
Publisher: Springer Science and Business Media LLC
Date: 27-11-2018
Publisher: IEEE
Date: 12-2018
Publisher: IEEE
Date: 06-2012
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.69
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2013
DOI: 10.1109/TC.2012.65
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2012
Publisher: Inderscience Publishers
Date: 2020
Publisher: Oxford University Press (OUP)
Date: 19-08-2011
Publisher: IEEE
Date: 04-2015
Publisher: Association for Computing Machinery (ACM)
Date: 19-11-2019
DOI: 10.1145/3241737
Abstract: The Cloud computing paradigm has revolutionised the computer science horizon during the past decade and has enabled the emergence of computing as the fifth utility. It has captured significant attention of academia, industries, and government bodies. Now, it has emerged as the backbone of modern economy by offering subscription-based services anytime, anywhere following a pay-as-you-go model. This has instigated (1) shorter establishment times for start-ups, (2) creation of scalable global enterprise applications, (3) better cost-to-value associativity for scientific and high-performance computing applications, and (4) different invocation/execution models for pervasive and ubiquitous applications. The recent technological developments and paradigms such as serverless computing, software-defined networking, Internet of Things, and processing at network edge are creating new opportunities for Cloud computing. However, they are also posing several new challenges and creating the need for new approaches and research strategies, as well as the re-evaluation of the models that were developed to address issues such as scalability, elasticity, reliability, security, sustainability, and application models. The proposed manifesto addresses them by identifying the major open challenges in Cloud computing, emerging trends, and impact areas. It then offers research directions for the next decade, thus helping in the realisation of Future Generation Cloud Computing.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2011
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer International Publishing
Date: 2017
Publisher: IEEE
Date: 1990
Publisher: IEEE
Date: 06-2015
Publisher: IEEE
Date: 08-2015
Publisher: Springer International Publishing
Date: 2016
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2009
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2015
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2012
Publisher: Springer International Publishing
Date: 2013
Publisher: IEEE
Date: 12-2012
Publisher: IEEE
Date: 12-2018
Publisher: Hindawi Limited
Date: 31-08-2022
DOI: 10.1002/INT.22648
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11564621_4
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11564621_6
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: ACM
Date: 04-01-2016
Publisher: Springer Science and Business Media LLC
Date: 25-04-2013
Publisher: Elsevier BV
Date: 1994
Publisher: Wiley
Date: 28-04-2011
DOI: 10.1002/CPE.1747
Publisher: Springer International Publishing
Date: 2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2015
Publisher: IEEE
Date: 06-2012
Publisher: IEEE
Date: 2005
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 11-2011
Publisher: Wiley
Date: 04-2009
DOI: 10.1002/CPE.1431
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2013
Publisher: Elsevier BV
Date: 08-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: Wiley
Date: 24-04-2009
DOI: 10.1002/CPE.1435
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11576235_92
Publisher: Springer Berlin Heidelberg
Date: 1991
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2021
Publisher: Springer Berlin Heidelberg
Date: 1990
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Springer Science and Business Media LLC
Date: 20-05-2009
Publisher: Institution of Engineering and Technology (IET)
Date: 2009
Publisher: IEEE
Date: 07-2013
Publisher: IEEE
Date: 2009
DOI: 10.1109/NSS.2009.29
Publisher: IEEE
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: Elsevier BV
Date: 08-2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2021
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2019
Publisher: ACM
Date: 25-08-2013
Publisher: Springer International Publishing
Date: 2018
Publisher: Springer Berlin Heidelberg
Date: 2007
Publisher: IEEE
Date: 2009
DOI: 10.1109/NSS.2009.35
Publisher: Elsevier BV
Date: 06-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.36
Publisher: IEEE
Date: 2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2016
Publisher: IEEE
Date: 10-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 16-11-2020
Publisher: Oxford University Press (OUP)
Date: 07-08-2011
Publisher: Association for Computing Machinery (ACM)
Date: 23-12-2022
DOI: 10.1145/3547330
Abstract: The outstanding performance of deep neural networks has promoted deep learning applications in a broad set of domains. However, the potential risks caused by adversarial s les have hindered the large-scale deployment of deep learning. In these scenarios, adversarial perturbations, imperceptible to human eyes, significantly decrease the model’s final performance. Many papers have been published on adversarial attacks and their countermeasures in the realm of deep learning. Most focus on evasion attacks, where the adversarial ex les are found at test time, as opposed to poisoning attacks where poisoned data is inserted into the training data. Further, it is difficult to evaluate the real threat of adversarial attacks or the robustness of a deep learning model, as there are no standard evaluation methods. Hence, with this article, we review the literature to date. Additionally, we attempt to offer the first analysis framework for a systematic understanding of adversarial attacks. The framework is built from the perspective of cybersecurity to provide a lifecycle for adversarial attacks and defenses.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2013
Publisher: Springer Science and Business Media LLC
Date: 07-02-2009
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IEEE
Date: 06-2013
Publisher: Wiley
Date: 21-05-2009
DOI: 10.1002/CPE.1421
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2016
DOI: 10.1109/MITP.2016.36
Publisher: IEEE
Date: 08-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: Springer International Publishing
Date: 2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2022
Publisher: IEEE
Date: 05-2008
DOI: 10.1109/ICIS.2008.96
Publisher: IEEE
Date: 04-2011
Publisher: Elsevier BV
Date: 05-2019
Publisher: IEEE
Date: 2004
Publisher: Inderscience Publishers
Date: 2006
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2019
Publisher: Oxford University Press (OUP)
Date: 18-07-2011
Publisher: IEEE
Date: 2009
Publisher: IEEE
Date: 12-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Elsevier BV
Date: 07-2012
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11564621_44
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2020
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11564621_41
Publisher: Springer Science and Business Media LLC
Date: 06-2014
Publisher: Springer Singapore
Date: 07-12-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2008
Publisher: Springer International Publishing
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2012
Publisher: IEEE
Date: 2007
DOI: 10.1109/ICIS.2007.92
Publisher: Springer Berlin Heidelberg
Date: 2001
Publisher: Elsevier BV
Date: 2015
Publisher: IEEE
Date: 12-2013
Publisher: ACM
Date: 29-10-2012
Publisher: IEEE
Date: 2005
Publisher: IEEE
Date: 12-2019
Publisher: IEEE
Date: 12-2017
Publisher: Elsevier BV
Date: 08-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2017
Publisher: IEEE
Date: 11-2009
Publisher: Inderscience Publishers
Date: 2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2014
DOI: 10.1109/TDSC.2013.49
Publisher: Elsevier BV
Date: 09-2014
Publisher: Oxford University Press (OUP)
Date: 02-12-2011
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2020
Publisher: Springer Science and Business Media LLC
Date: 25-03-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2014
DOI: 10.1109/TDSC.2013.40
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2023
Publisher: IEEE
Date: 07-2013
Publisher: Springer International Publishing
Date: 14-10-2016
Publisher: IEEE
Date: 07-2008
Publisher: IEEE
Date: 12-2010
DOI: 10.1109/EUC.2010.128
Publisher: IEEE Comput. Soc
Date: 2001
Publisher: IEEE
Date: 06-2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2012
Publisher: Springer International Publishing
Date: 2020
Publisher: Springer Berlin Heidelberg
Date: 2002
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2020
Publisher: Elsevier BV
Date: 10-2018
Publisher: Elsevier BV
Date: 05-2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2023
Publisher: IEEE
Date: 1
Publisher: Hindawi Limited
Date: 2014
DOI: 10.1155/2014/362141
Abstract: Background . Breast cancer is the most common type of cancer among females with a high mortality rate. It is essential to classify the estrogen receptor based breast cancer subtypes into correct subclasses, so that the right treatments can be applied to lower the mortality rate. Using gene signatures derived from gene interaction networks to classify breast cancers has proven to be more reproducible and can achieve higher classification performance. However, the interactions in the gene interaction network usually contain many false-positive interactions that do not have any biological meanings. Therefore, it is a challenge to incorporate the reliability assessment of interactions when deriving gene signatures from gene interaction networks. How to effectively extract gene signatures from available resources is critical to the success of cancer classification. Methods . We propose a novel method to measure and extract the reliable (biologically true or valid) interactions from gene interaction networks and incorporate the extracted reliable gene interactions into our proposed RRHGE algorithm to identify significant gene signatures from microarray gene expression data for classifying ER+ and ER− breast cancer s les. Results . The evaluation on real breast cancer s les showed that our RRHGE algorithm achieved higher classification accuracy than the existing approaches.
Publisher: IEEE
Date: 09-2013
Publisher: Springer Science and Business Media LLC
Date: 10-2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2016
Publisher: IEEE
Date: 07-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2018
Publisher: IEEE
Date: 08-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-03-2052
Publisher: IEEE
Date: 12-2016
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2015
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Springer International Publishing
Date: 2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 07-2008
Publisher: Springer Science and Business Media LLC
Date: 27-02-2013
Publisher: IEEE
Date: 12-2010
DOI: 10.1109/EUC.2010.116
Publisher: IEEE
Date: 05-2019
Publisher: Elsevier BV
Date: 10-2012
Publisher: IEEE
Date: 05-2018
Publisher: IEEE
Date: 06-2012
Publisher: IEEE
Date: 2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer Science and Business Media LLC
Date: 04-06-2014
Publisher: Springer International Publishing
Date: 2014
Publisher: IEEE
Date: 06-2006
Publisher: IEEE
Date: 2007
DOI: 10.1109/ICIS.2007.51
Publisher: Springer Berlin Heidelberg
Date: 2010
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2015
Publisher: IEEE
Date: 10-2018
Publisher: Springer Science and Business Media LLC
Date: 07-2003
DOI: 10.1007/BF02948917
Publisher: IEEE
Date: 09-2008
Publisher: Springer International Publishing
Date: 2014
Publisher: Institution of Engineering and Technology (IET)
Date: 2001
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2016
Publisher: IEEE
Date: 07-2020
Publisher: ACM
Date: 08-05-2013
Publisher: Inderscience Publishers
Date: 2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2022
Publisher: Springer Science and Business Media LLC
Date: 31-01-2022
Publisher: IEEE
Date: 10-2008
DOI: 10.1109/NPC.2008.71
Publisher: IEEE
Date: 06-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2011
Publisher: IEEE
Date: 03-2008
Publisher: IEEE
Date: 07-2008
Publisher: IEEE
Date: 06-2013
Publisher: Wiley
Date: 23-09-2009
DOI: 10.1002/CPE.1499
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2020
Publisher: Elsevier BV
Date: 07-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2017
Publisher: Springer Science and Business Media LLC
Date: 18-06-2014
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer International Publishing
Date: 2017
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Elsevier BV
Date: 03-2009
Publisher: ACM
Date: 29-05-2018
Publisher: IEEE
Date: 10-2009
DOI: 10.1109/NPC.2009.17
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 08-2017
Publisher: IEEE
Date: 11-2013
Publisher: IEEE
Date: 12-2016
DOI: 10.1109/CIT.2016.15
Publisher: Elsevier BV
Date: 06-1996
Publisher: IEEE
Date: 03-2009
Publisher: MDPI AG
Date: 13-09-2016
DOI: 10.3390/E18090334
Publisher: IGI Global
Date: 2007
DOI: 10.4018/978-1-59140-987-8.CH019
Abstract: Recently the notorious Distributed Denial of Service (DDoS) attacks made people aware of the importance of providing available data and services securely to users. A DDoS attack is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resource (CERT, 2006). For ex le, in February 2000, many Web sites such as Yahoo, Amazon.com, eBuy, CNN.com, Buy. com, ZDNet, E*Trade, and Excite.com were all subject to total or regional outages by DDoS attacks. In 2002, a massive DDoS attack briefly interrupted Web traffic on nine of the 13 DNS “root” servers that control the Internet (Naraine, 2002). In 2004, a number of DDoS attacks assaulted the credit card processor Authorize. net, the Web infrastructure provider Akamai Systems, the interactive advertising company DoubleClick (left that company’s servers temporarily unable to deliver ads to thousands of popular Web sites), and many online gambling sites (Arnfield, 2004). Nowadays, Internet applications face serious security problems caused by DDoS attacks. For ex le, according to CERT/CC Statistics 1998-2005 (CERT, 2006), computer-based vulnerabilities reported have increased exponentially since 1998. Effective approaches to defeat DDoS attacks are desperately demanded (Cisco, 2001 Gibson, 2002).
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2017
Publisher: IEEE
Date: 2007
DOI: 10.1109/ICIS.2007.13
Publisher: Springer Science and Business Media LLC
Date: 18-10-2007
DOI: 10.1007/S11517-007-0271-1
Abstract: Clustering is widely used in bioinformatics to find gene correlation patterns. Although many algorithms have been proposed, these are usually confronted with difficulties in meeting the requirements of both automation and high quality. In this paper, we propose a novel algorithm for clustering genes from their expression profiles. The unique features of the proposed algorithm are twofold: it takes into consideration global, rather than local, gene correlation information in clustering processes and it incorporates clustering quality measurement into the clustering processes to implement non-parametric, automatic and global optimal gene clustering. The evaluation on simulated and real gene data sets demonstrates the effectiveness of the algorithm.
Publisher: IEEE
Date: 12-2008
Publisher: IEEE
Date: 05-2018
Publisher: Elsevier BV
Date: 07-2011
Publisher: Wiley
Date: 15-12-2015
DOI: 10.1002/SEC.1180
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Elsevier BV
Date: 08-2013
Publisher: Informa UK Limited
Date: 11-2009
Publisher: Elsevier BV
Date: 05-2018
Publisher: IEEE
Date: 10-2008
DOI: 10.1109/CSA.2008.75
Publisher: Wiley
Date: 09-09-2014
DOI: 10.1002/CPE.3370
Publisher: IEEE
Date: 12-2007
DOI: 10.1109/PRDC.2007.48
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2014
Publisher: Emerald
Date: 02-2006
DOI: 10.1108/17440080680000099
Abstract: In the last a few years a number of highly publicized incidents of Distributed Denial of Service (DDoS) attacks against high‐profile government and commercial websites have made people aware of the importance of providing data and services security to users. A DDoS attack is an availability attack, which is characterized by an explicit attempt from an attacker to prevent legitimate users of a service from using the desired resources. This paper introduces the vulnerability of web applications to DDoS attacks, and presents an active distributed defense system that has a deployment mixture of sub‐systems to protect web applications from DDoS attacks. According to the simulation experiments, this system is effective in that it is able to defend web applications against attacks. It can avoid overall network congestion and provide more resources to legitimate web users.
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: IEEE
Date: 06-2015
DOI: 10.1109/SCC.2015.43
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2016
Publisher: IEEE
Date: 2006
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2020
Publisher: IEEE
Date: 09-2012
Publisher: IEEE
Date: 12-2015
DOI: 10.1109/CSE.2014.13
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: ACM Press
Date: 1996
Publisher: Springer International Publishing
Date: 21-11-2019
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Springer International Publishing
Date: 21-11-2019
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: IEEE
Date: 10-05-2021
Publisher: Springer International Publishing
Date: 21-11-2019
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Elsevier BV
Date: 08-1996
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: IEEE
Date: 05-2006
Publisher: ACM
Date: 10-01-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2015
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer Berlin Heidelberg
Date: 2013
Publisher: Springer International Publishing
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2014
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2023
Publisher: Springer International Publishing
Date: 2015
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/NSS.2010.4
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer International Publishing
Date: 2015
Publisher: Springer International Publishing
Date: 2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2014
Publisher: IEEE
Date: 03-2008
Publisher: Wiley
Date: 16-04-2019
DOI: 10.1002/CPE.5234
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2014
Publisher: Springer Berlin Heidelberg
Date: 2005
DOI: 10.1007/11576235_4
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: IGI Global
Date: 2009
DOI: 10.4018/978-1-60566-272-5.CH015
Abstract: This chapter introduces the concept of virtual learning communities and discusses and further enhances the theory and definitions presented in related literature. A model comprising four criteria essential to virtual learning communities is presented and discussed in detail. Theory and case studies relating to the impact of virtual learning communities on distance education and students from erse cultural groups are also examined. In addition, this chapter investigates the enabling technologies and facilitation that is required to build virtual learning communities. Other case studies are used to illustrate the process of building virtual learning communities. Emerging technologies such as Wikis and video lectures are also analysed to determine the effects they have on building and sustaining effective virtual learning communities.
Publisher: Springer International Publishing
Date: 2018
Publisher: IEEE
Date: 10-2011
DOI: 10.1109/EUC.2011.48
Publisher: IEEE
Date: 08-2006
DOI: 10.1109/ICCGI.2006.7
Publisher: Association for Computing Machinery (ACM)
Date: 28-08-2023
DOI: 10.1145/3603620
Abstract: Machine learning has attracted widespread attention and evolved into an enabling technology for a wide range of highly successful applications, such as intelligent computer vision, speech recognition, medical diagnosis, and more. Yet, a special need has arisen where, due to privacy, usability, and/or the right to be forgotten , information about some specific s les needs to be removed from a model, called machine unlearning. This emerging technology has drawn significant interest from both academics and industry due to its innovation and practicality. At the same time, this ambitious problem has led to numerous research efforts aimed at confronting its challenges. To the best of our knowledge, no study has analyzed this complex topic or compared the feasibility of existing unlearning solutions in different kinds of scenarios. Accordingly, with this survey, we aim to capture the key concepts of unlearning techniques. The existing solutions are classified and summarized based on their characteristics within an up-to-date and comprehensive review of each category’s advantages and limitations. The survey concludes by highlighting some of the outstanding issues with unlearning techniques, along with some feasible directions for new research opportunities.
Publisher: Elsevier BV
Date: 05-2012
Publisher: Springer Berlin Heidelberg
Date: 2012
Publisher: Elsevier BV
Date: 07-1999
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2013
DOI: 10.1109/TMC.2012.188
Publisher: Inderscience Publishers
Date: 2006
Publisher: Elsevier BV
Date: 02-2020
Publisher: Elsevier BV
Date: 08-2020
Publisher: Hindawi Limited
Date: 2014
DOI: 10.1155/2014/459203
Abstract: Background . Novel prognostic markers are needed so newly diagnosed breast cancer patients do not undergo any unnecessary therapy. Various microarray gene expression datasets based studies have generated gene signatures to predict the prognosis outcomes, while ignoring the large amount of information contained in established clinical markers. Nevertheless, small s le sizes in in idual microarray datasets remain a bottleneck in generating robust gene signatures that show limited predictive power. The aim of this study is to achieve high classification accuracy for the good prognosis group and then achieve high classification accuracy for the poor prognosis group. Methods . We propose a novel algorithm called the IPRE (integrated prognosis risk estimation) algorithm. We used integrated microarray datasets from multiple studies to increase the s le sizes (∼2,700 s les). The IPRE algorithm consists of a virtual chromosome for the extraction of the prognostic gene signature that has 79 genes, and a multivariate logistic regression model that incorporates clinical data along with expression data to generate the risk score formula that accurately categorizes breast cancer patients into two prognosis groups. Results . The evaluation on two testing datasets showed that the IPRE algorithm achieved high classification accuracies of 82% and 87%, which was far greater than any existing algorithms.
Publisher: Wiley
Date: 25-09-2009
DOI: 10.1002/SEC.151
Publisher: Elsevier BV
Date: 06-2016
Publisher: Elsevier BV
Date: 05-2012
Publisher: IEEE
Date: 2008
Publisher: Elsevier BV
Date: 07-1993
Publisher: Wiley
Date: 09-08-2022
DOI: 10.1002/CPE.6548
Abstract: The explosive growth of various computer vision technologies generates a tremendous amount of visual data online every day. In addition to bringing convenience and revolutionizing our daily life, image data also reveal a wide range of sensitive information and pose unprecedented privacy leakage risks. Particularly, in the case of photos contain human faces, people can easily access those face images on social media without any consent, and the misuse of personal information could cause serious privacy violation to in iduals. Therefore, it is essential to consider sanitizing people's identity information when using images containing human faces. As a result, there has been rapid development in the area of facial anonymization, also called image de‐identification. However, due to the emergence of numerous deep‐learning based attacks, traditional anonymization methods such as blurring and mosaic are weak and ineffective to protect in idual's privacy in face images. To respond to this challenge, this article proposes a novel de‐identification method that utilizes a deep neural network. The proposed framework encompasses two modules: encoder network and generator network. The encoder transforms a face image into a high‐semantic latent vector of codes, which will be de‐identified according to the differential privacy criterion. The generator leverages the unconditional generative adversarial network to synthesize high‐quality images based on the modified latent codes from the encoder. Extensive experimental results indicate that our proposed model can protect image privacy while keeping the processed image visual realistic.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Elsevier BV
Date: 07-2018
Publisher: Springer Science and Business Media LLC
Date: 08-2004
Publisher: Elsevier BV
Date: 07-2011
Publisher: IEEE Comput. Soc
Date: 2002
Publisher: IEEE
Date: 12-2013
DOI: 10.1109/CSE.2013.91
Publisher: World Scientific
Date: 1997
Publisher: Inderscience Publishers
Date: 2012
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2013
Publisher: Wiley
Date: 14-12-2019
DOI: 10.1002/CPE.5102
Publisher: IEEE
Date: 10-2013
Publisher: American Physiological Society
Date: 11-2007
DOI: 10.1152/PHYSIOLGENOMICS.00085.2006
Abstract: Discovery of cis-regulatory elements in gene promoters is a highly challenging research issue in computational molecular biology. This paper presents a novel approach to searching putative cis-regulatory elements in human promoters by first finding 8-mer sequences of high statistical significance from gene promoters of humans, mice, and Drosophila melanogaster, respectively, and then identifying the most conserved ones across the three species (phylogenetic footprinting). In this study, a conservation analysis on both closely related species (humans and mice) and distantly related species (humans/mice and Drosophila) is conducted not only to examine more candidates but also to improve the prediction accuracy. We have found 124 putative cis-regulatory elements and grouped these into 20 clusters. The investigation on the coexistence of these clusters in human gene promoters reveals that SP1, EGR, and NRF-1 are the dominant clusters appearing in the combinatorial combination of up to five clusters. Gene Ontology (GO) analysis also shows that many GO categories of transcription factors binding to these cis-regulatory elements match the GO categories of genes whose promoters contain these elements. Compared with previous research, the contribution of this study lies not only in the finding of new cis-regulatory elements, but also in its pioneering exploration on the coexistence of discovered elements and the GO relationship between transcription factors and regulated genes. This exploration verifies the putative cis-regulatory elements that have been found from this study and also gives new insight on the regulation mechanisms of gene expression.
Publisher: Springer Berlin Heidelberg
Date: 2011
Publisher: IEEE
Date: 2006
Publisher: IEEE
Date: 12-2011
Publisher: IEEE
Date: 2008
Publisher: Elsevier BV
Date: 07-2020
Publisher: Springer Science and Business Media LLC
Date: 25-10-2012
Publisher: IEEE
Date: 04-2012
Publisher: IEEE
Date: 11-2015
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2021
Publisher: IEEE
Date: 09-2010
Publisher: IEEE
Date: 07-2013
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2022
Publisher: Elsevier BV
Date: 05-2011
Publisher: Elsevier BV
Date: 2017
Publisher: IEEE
Date: 07-2013
Publisher: Wiley
Date: 23-09-2020
DOI: 10.1002/CPE.6002
Abstract: Federated learning is an improved version of distributed machine learning that further offloads operations which would usually be performed by a central server. The server becomes more like an assistant coordinating clients to work together rather than micromanaging the workforce as in traditional DML. One of the greatest advantages of federated learning is the additional privacy and security guarantees it affords. Federated learning architecture relies on smart devices, such as smartphones and IoT sensors, that collect and process their own data, so sensitive information never has to leave the client device. Rather, clients train a submodel locally and send an encrypted update to the central server for aggregation into the global model. These strong privacy guarantees make federated learning an attractive choice in a world where data breaches and information theft are common and serious threats. This survey outlines the landscape and latest developments in data privacy and security for federated learning. We identify the different mechanisms used to provide privacy and security, such as differential privacy, secure multiparty computation and secure aggregation. We also survey the current attack models, identifying the areas of vulnerability and the strategies adversaries use to penetrate federated systems. The survey concludes with a discussion on the open challenges and potential directions of future work in this increasingly popular learning paradigm.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2015
Publisher: IEEE
Date: 2000
Publisher: Springer Science and Business Media LLC
Date: 19-02-2018
DOI: 10.1038/S41598-018-21286-0
Abstract: The multiple relationships among objects in complex systems can be described well by multiplex networks, which contain rich information of the connections between objects. The null model of networks, which can be used to quantify the specific nature of a network, is a powerful tool for analysing the structural characteristics of complex systems. However, the null model for multiplex networks remains largely unexplored. In this paper, we propose a null model for multiplex networks based on the node redundancy degree, which is a natural measure for describing the multiple relationships in multiplex networks. Based on this model, we define the modularity of multiplex networks to study the community structures in multiplex networks and demonstrate our theory in practice through community detection in four real-world networks. The results show that our model can reveal the community structures in multiplex networks and indicate that our null model is a useful approach for providing new insights into the specific nature of multiplex networks, which are difficult to quantify.
Publisher: ACM
Date: 25-08-2013
Publisher: Elsevier BV
Date: 06-1997
Publisher: Springer Berlin Heidelberg
Date: 2003
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: Association for Computing Machinery (ACM)
Date: 15-09-2023
DOI: 10.1145/3606017
Abstract: Federated learning (FL) has been a hot topic in recent years. Ever since it was introduced, researchers have endeavored to devise FL systems that protect privacy or ensure fair results, with most research focusing on one or the other. As two crucial ethical notions, the interactions between privacy and fairness are comparatively less studied. However, since privacy and fairness compete, considering each in isolation will inevitably come at the cost of the other. To provide a broad view of these two critical topics, we presented a detailed literature review of privacy and fairness issues, highlighting unique challenges posed by FL and solutions in federated settings. We further systematically surveyed different interactions between privacy and fairness, trying to reveal how privacy and fairness could affect each other and point out new research directions in fair and private FL.
Publisher: Springer Science and Business Media LLC
Date: 03-08-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2019
Publisher: Elsevier BV
Date: 07-2017
Publisher: IEEE
Date: 2008
DOI: 10.1109/EUC.2008.202
Publisher: Wiley
Date: 19-09-2020
DOI: 10.1002/CPE.6015
Abstract: Differential privacy is a rigorous mathematical framework for evaluating and protecting data privacy. In most existing studies, there is a vulnerable assumption that records in a dataset are independent when differential privacy is applied. However, in real‐world datasets, records are likely to be correlated, which may lead to unexpected data leakage. In this survey, we investigate the issue of privacy loss due to data correlation under differential privacy models. Roughly, we classify existing literature into three lines: (1) using parameters to describe data correlation in differential privacy, (2) using models to describe data correlation in differential privacy, and (3) describing data correlation based on the framework of Pufferfish. First, a detailed ex le is given to illustrate the issue of privacy leakage on correlated data in real scenes. Then our main work is to analyze and compare these methods, and evaluate situations that these erse studies are applied. Finally, we propose some future challenges on correlated differential privacy.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 06-2013
Publisher: Springer Berlin Heidelberg
Date: 2009
Publisher: Springer Science and Business Media LLC
Date: 26-04-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 10-2020
Publisher: IEEE
Date: 02-2007
Publisher: Elsevier BV
Date: 11-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-2023
Publisher: Wiley
Date: 04-11-2016
DOI: 10.1002/CPE.4040
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2009
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2021
Publisher: Springer Berlin Heidelberg
Date: 2005
Publisher: WORLD SCIENTIFIC
Date: 04-2003
Publisher: Springer International Publishing
Date: 2017
Publisher: ACM
Date: 12-11-2019
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2018
Publisher: Springer Science and Business Media LLC
Date: 12-2006
Publisher: IEEE
Date: 08-2012
Publisher: Association for Computing Machinery (ACM)
Date: 18-07-2021
DOI: 10.1145/3460771
Abstract: The vast majority of artificial intelligence solutions are founded on game theory, and differential privacy is emerging as perhaps the most rigorous and widely adopted privacy paradigm in the field. However, alongside all the advancements made in both these fields, there is not a single application that is not still vulnerable to privacy violations, security breaches, or manipulation by adversaries. Our understanding of the interactions between differential privacy and game theoretic solutions is limited. Hence, we undertook a comprehensive review of literature in the field, finding that differential privacy has several advantageous properties that can make more of a contribution to game theory than just privacy protection. It can also be used to build heuristic models for game-theoretic solutions, to avert strategic manipulations, and to quantify the cost of privacy protection. With a focus on mechanism design, the aim of this article is to provide a new perspective on the currently held impossibilities in game theory, potential avenues to circumvent those impossibilities, and opportunities to improve the performance of game-theoretic solutions with differentially private techniques.
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 12-2016
Publisher: IEEE
Date: 06-2012
Publisher: IEEE
Date: 10-2016
Publisher: IEEE
Date: 12-2017
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2013
DOI: 10.1109/TPDS.2012.98
Publisher: IEEE
Date: 07-2013
Publisher: Springer International Publishing
Date: 21-11-2019
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Springer International Publishing
Date: 21-11-2018
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 11-2018
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 09-2014
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 05-2022
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 02-2013
Publisher: Springer Science and Business Media LLC
Date: 12-06-2021
Publisher: IEEE
Date: 04-2010
Publisher: IEEE
Date: 10-2013
DOI: 10.1109/SKG.2013.23
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2015
Publisher: Informa UK Limited
Date: 17-02-2016
Publisher: IEEE
Date: 12-2013
Publisher: IEEE
Date: 2006
DOI: 10.1109/ISCC.2006.93
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 07-0005
Publisher: Wiley
Date: 23-06-2014
DOI: 10.1002/SEC.1037
Publisher: Wiley
Date: 29-02-2012
DOI: 10.1002/CPE.2810
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: Elsevier BV
Date: 05-2004
Publisher: ACTA Press
Date: 2010
Publisher: Elsevier BV
Date: 06-2020
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 03-2012
DOI: 10.1109/TPDS.2010.97
Publisher: Springer Berlin Heidelberg
Date: 2004
Publisher: IEEE
Date: 09-2010
DOI: 10.1109/HPCC.2010.17
Publisher: IEEE
Date: 2008
Publisher: Springer-Verlag
Date: 2005
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 04-2023
Publisher: Association for Computing Machinery (ACM)
Date: 23-12-2022
DOI: 10.1145/3547299
Abstract: Image sharing on online social networks (OSNs) has become an indispensable part of daily social activities, but it has also increased the risk of privacy invasion. An online image can reveal various types of sensitive information, prompting the public to rethink in idual privacy needs in OSN image sharing critically. However, the interaction of images and OSN makes the privacy issues significantly complicated. The current real-world solutions for privacy management fail to provide adequate personalized, accurate, and flexible privacy protection. Constructing a more intelligent environment for privacy-friendly OSN image sharing is urgent in the near future. Meanwhile, given the dynamics in both users’ privacy needs and OSN context, a comprehensive understanding of OSN image privacy throughout the entire sharing process is preferable to any views from a single side, dimension, or level. To fill this gap, we contribute a survey of “privacy intelligence” that targets modern privacy issues in dynamic OSN image sharing from a user-centric perspective. Specifically, we present the important properties and a taxonomy of OSN image privacy, along with a high-level privacy analysis framework based on the lifecycle of OSN image sharing. The framework consists of three stages with different principles of privacy by design. At each stage, we identify typical user behaviors in OSN image sharing and their associated privacy issues. Then a systematic review of representative intelligent solutions to those privacy issues is conducted, also in a stage-based manner. The analysis results in an intelligent “privacy firewall” for closed-loop privacy management. Challenges and future directions in this area are also discussed.
Publisher: Oxford University Press (OUP)
Date: 07-1999
Publisher: IEEE
Date: 2005
Publisher: Springer Berlin Heidelberg
Date: 2008
Publisher: IEEE
Date: 2008
Publisher: Institute of Electrical and Electronics Engineers (IEEE)
Date: 2020
Publisher: IGI Global
Date: 2006
DOI: 10.4018/978-1-59140-729-4.CH004
Abstract: This chapter introduces the concept of virtual learning communities and discusses and further enhances the theory and definitions presented in related literature. A model comprising four criteria essential to virtual learning communities is presented and discussed in detail. Theory and case studies relating to the impact of virtual learning communities on distance education and students from erse cultural groups are also examined. In addition, this chapter investigates the enabling technologies and facilitation that is required to build virtual learning communities. Other case studies are used to illustrate the process of building virtual learning communities. Emerging technologies such as wikis and video lectures are also analysed to determine the effects they have on building and sustaining effective virtual learning communities.
Publisher: Elsevier BV
Date: 03-2009
Publisher: Elsevier BV
Date: 2013
Publisher: Elsevier BV
Date: 04-2011
Publisher: Wiley
Date: 08-03-2011
DOI: 10.1002/CPE.1703
Publisher: Elsevier BV
Date: 12-2023
Publisher: IEEE
Date: 12-2018
Publisher: Springer International Publishing
Date: 2017
Start Date: 07-2018
End Date: 05-2022
Amount: $310,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2007
End Date: 06-2010
Amount: $222,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 12-2012
End Date: 12-2016
Amount: $240,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 07-2010
End Date: 12-2013
Amount: $220,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2014
End Date: 12-2017
Amount: $330,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 03-2010
End Date: 12-2014
Amount: $159,106.00
Funder: Australian Research Council
View Funded ActivityStart Date: 12-2005
End Date: 06-2009
Amount: $72,444.00
Funder: Australian Research Council
View Funded ActivityStart Date: 08-2010
End Date: 12-2014
Amount: $159,106.00
Funder: Australian Research Council
View Funded ActivityStart Date: 01-2019
End Date: 01-2023
Amount: $450,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 09-2018
End Date: 09-2021
Amount: $372,725.00
Funder: Australian Research Council
View Funded ActivityStart Date: 02-2020
End Date: 12-2023
Amount: $320,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 2018
End Date: 06-2021
Amount: $300,000.00
Funder: Australian Research Council
View Funded ActivityStart Date: 08-2019
End Date: 08-2022
Amount: $314,000.00
Funder: Australian Research Council
View Funded Activity