According to our database1, Hua Wang authored at least 67 papers between 2001 and 2019.
Legend:Book In proceedings Article PhD thesis Other
Security and Privacy in Big Data Environment.
Proceedings of the Encyclopedia of Big Data Technologies., 2019
Bayesian Sparse Topical Coding.
IEEE Trans. Knowl. Data Eng., 2019
A novel JSON based regular expression language for pattern matching in the internet of things.
J. Ambient Intelligence and Humanized Computing, 2019
The Devil is in the Detail: SDP-Driven Malformed Message Attacks and Mitigation in SIP Ecosystems.
IEEE Access, 2019
Cyberpulse: A Machine Learning Based Link Flooding Attack Mitigation System for Software Defined Networks.
IEEE Access, 2019
Arrhythmias Classification by Integrating Stacked Bidirectional LSTM and Two-Dimensional CNN.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019
Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016).
World Wide Web, 2018
On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Services Computing, 2018
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018
A computer aided analysis scheme for detecting epileptic seizure from EEG data.
Int. J. Comput. Intell. Syst., 2018
A novel statistical technique for intrusion detection systems.
Future Generation Comp. Syst., 2018
A Novel Incremental Dictionary Learning Method for Low Bit Rate Speech Streaming.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018
A probabilistic method for emerging topic tracking in Microblog stream.
World Wide Web, 2017
MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Communications Magazine, 2017
A Study on Securing Software Defined Networks.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017
A New Data Mining Scheme for Analysis of Big Brain Signal Data.
Proceedings of the Databases Theory and Applications, 2017
Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams.
ACM Trans. Internet Techn., 2016
On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans. Automation Science and Engineering, 2016
The Australian PCEHR System: Ensuring Privacy and Security through an Improved Access Control Mechanism.
EAI Endorsed Trans. Scalable Information Systems, 2016
When things matter: A survey on data-centric internet of things.
J. Network and Computer Applications, 2016
Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
Protecting outsourced data in cloud computing through access management.
Concurrency and Computation: Practice and Experience, 2016
Weighted Visibility Graph With Complex Network Features in the Detection of Epilepsy.
IEEE Access, 2016
Access control management with provenance in healthcare environments.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016
Analyzing EEG Signal Data for Detection of Epileptic Seizure: Introducing Weight on Visibility Graph with Complex Network Feature.
Proceedings of the Databases Theory and Applications, 2016
Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015
Exploring Sampling in the Detection of Multicategory EEG Signals.
Comp. Math. Methods in Medicine, 2015
Multi-Window Based Ensemble Learning for Classification of Imbalanced Streaming Data.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015
Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015
Securing Electronic Medical Record and Electronic Health Record Systems Through an Improved Access Control.
Proceedings of the Health Information Science - 4th International Conference, 2015
Causal dependencies of provenance data in healthcare environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015
Central Topic Model for Event-oriented Topics Mining in Microblog Stream.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015
Topic Detection from Large Scale of Microblog Stream with High Utility Pattern Clustering.
Proceedings of the 8th Workshop on Ph.D. Workshop in Information and Knowledge Management, 2015
Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014
Indexing Linked Data in a Wireless Broadcast System with 3D Hilbert Space-Filling Curves.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
Microdata Protection Method Through Microaggregation: A Systematic Approach.
A role-involved purpose-based access control model.
Information Systems Frontiers, 2012
A Conditional Role-Involved Purpose-Based Access Control Model.
J. Org. Computing and E. Commerce, 2011
Microdata Protection Method Through Microaggregation: A Median-Based Approach.
Information Security Journal: A Global Perspective, 2011
A conditional purpose-based access control model with dynamic roles.
Expert Syst. Appl., 2011
Efficient systematic clustering method for k-anonymization.
Acta Inf., 2011
Systematic Clustering-Based Microaggregation for Statistical Disclosure Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010
A Role-Involved Conditional Purpose-Based Access Control Model.
Proceedings of the E-Government, E-Services and Global Processes, 2010
A Pairwise-Systematic Microaggregation for Statistical Disclosure Control.
Proceedings of the ICDM 2010, 2010
Systematic clustering method for l-diversity model.
Proceedings of the Database Technologies 2010, 2010
Effective Collaboration with Information Sharing in Virtual Universities.
IEEE Trans. Knowl. Data Eng., 2009
Delegating revocations and authorizations in collaborative business environments.
Information Systems Frontiers, 2009
Conditional Purpose Based Access Control Model for Privacy Protection.
Proceedings of the Database Technologies 2009, 2009
Access control management for ubiquitous computing.
Future Generation Comp. Syst., 2008
Delegating Revocations and Authorizations.
Proceedings of the Business Process Management Workshops, 2007
Ubiquitous computing environments and its usage access control.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006
Role-Based Delegation with Negative Authorization.
Proceedings of the Frontiers of WWW Research and Development, 2006
A Flexible Payment Scheme and Its Role-Based Access Control.
IEEE Trans. Knowl. Data Eng., 2005
Towards Secure XML Document with Usage Control.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005
Authorization Algorithms for the Mobility of User-Role Relationship.
Proceedings of the Computer Science 2005, 2005
A Global Ticket-Based Access Scheme for Mobile Users.
Information Systems Frontiers, 2004
An Electronic Cash Scheme and its Management.
Concurrent Engineering: R&A, 2004
Specifying Role-Based Access Constraints with Object Constraint Language.
Proceedings of the Advanced Web Technologies and Applications, 2004
Anonymous Access Scheme for Electronic Services.
Proceedings of the Computer Science 2004, 2004
Achieving secure and flexible M-services through tickets.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003
Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations.
Proceedings of the Database Technologies 2003, 2003
A Flexible Payment Scheme and its Permission-Role Assignment.
Proceedings of the Computer Science 2003, 2003
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations.
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002
Building consumer self-anonymity scalable payment protocol for Internet purchase.
Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems, 2002
Ticket-Based Service Access Scheme for Mobile Users.
Proceedings of the Computer Science 2002, 2002
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control.
WISE (1), 2001