Hua Wang

According to our database1, Hua Wang authored at least 59 papers between 2001 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepages:

On csauthors.net:

Bibliography

2018
Guest Editorial: WWWJ Special Issue of the 17th International Conference on Web Information Systems Engineering (WISE 2016).
World Wide Web, 2018

On Secure Wireless Communications for Service Oriented Computing.
IEEE Trans. Services Computing, 2018

MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

A computer aided analysis scheme for detecting epileptic seizure from EEG data.
Int. J. Comput. Intell. Syst., 2018

A novel statistical technique for intrusion detection systems.
Future Generation Comp. Syst., 2018

2017
A probabilistic method for emerging topic tracking in Microblog stream.
World Wide Web, 2017

MicroThings: A Generic IoT Architecture for Flexible Data Aggregation and Scalable Service Cooperation.
IEEE Communications Magazine, 2017

A Study on Securing Software Defined Networks.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

A New Data Mining Scheme for Analysis of Big Brain Signal Data.
Proceedings of the Databases Theory and Applications, 2017

2016
Supervised Anomaly Detection in Uncertain Pseudoperiodic Data Streams.
ACM Trans. Internet Techn., 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans. Automation Science and Engineering, 2016

When things matter: A survey on data-centric internet of things.
J. Network and Computer Applications, 2016

Friendship-based Cooperative Jamming for Secure Communication in Poisson Networks.
CoRR, 2016

Protecting outsourced data in cloud computing through access management.
Concurrency and Computation: Practice and Experience, 2016

Weighted Visibility Graph With Complex Network Features in the Detection of Epilepsy.
IEEE Access, 2016

Access control management with provenance in healthcare environments.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Analyzing EEG Signal Data for Detection of Epileptic Seizure: Introducing Weight on Visibility Graph with Complex Network Feature.
Proceedings of the Databases Theory and Applications, 2016

2015
Special issue on Security, Privacy and Trust in network-based Big Data.
Inf. Sci., 2015

Exploring Sampling in the Detection of Multicategory EEG Signals.
Comp. Math. Methods in Medicine, 2015

Multi-Window Based Ensemble Learning for Classification of Imbalanced Streaming Data.
Proceedings of the Web Information Systems Engineering - WISE 2015, 2015

Efficient Algorithms for Scheduling XML Data in a Mobile Wireless Broadcast Environment.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Securing Electronic Medical Record and Electronic Health Record Systems Through an Improved Access Control.
Proceedings of the Health Information Science - 4th International Conference, 2015

Causal dependencies of provenance data in healthcare environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

Central Topic Model for Event-oriented Topics Mining in Microblog Stream.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Topic Detection from Large Scale of Microblog Stream with High Utility Pattern Clustering.
Proceedings of the 8th Workshop on Ph.D. Workshop in Information and Knowledge Management, 2015

2014
Building access control policy model for privacy preserving and testing policy conflicting problems.
J. Comput. Syst. Sci., 2014

Indexing Linked Data in a Wireless Broadcast System with 3D Hilbert Space-Filling Curves.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

2013
On Eavesdropper-Tolerance Capability of Two-Hop Wireless Networks.
CoRR, 2013

2012
Microdata Protection Method Through Microaggregation: A Systematic Approach.
JSW, 2012

A role-involved purpose-based access control model.
Information Systems Frontiers, 2012

2011
A Conditional Role-Involved Purpose-Based Access Control Model.
J. Org. Computing and E. Commerce, 2011

Microdata Protection Method Through Microaggregation: A Median-Based Approach.
Information Security Journal: A Global Perspective, 2011

A conditional purpose-based access control model with dynamic roles.
Expert Syst. Appl., 2011

Efficient systematic clustering method for k-anonymization.
Acta Inf., 2011

2010
Systematic Clustering-Based Microaggregation for Statistical Disclosure Control.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Role-Involved Conditional Purpose-Based Access Control Model.
Proceedings of the E-Government, E-Services and Global Processes, 2010

A Pairwise-Systematic Microaggregation for Statistical Disclosure Control.
Proceedings of the ICDM 2010, 2010

Systematic clustering method for l-diversity model.
Proceedings of the Database Technologies 2010, 2010

2009
Effective Collaboration with Information Sharing in Virtual Universities.
IEEE Trans. Knowl. Data Eng., 2009

Delegating revocations and authorizations in collaborative business environments.
Information Systems Frontiers, 2009

Conditional Purpose Based Access Control Model for Privacy Protection.
Proceedings of the Database Technologies 2009, 2009

2008
Access control management for ubiquitous computing.
Future Generation Comp. Syst., 2008

2007
Delegating Revocations and Authorizations.
Proceedings of the Business Process Management Workshops, 2007

2006
Ubiquitous computing environments and its usage access control.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Role-Based Delegation with Negative Authorization.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
A Flexible Payment Scheme and Its Role-Based Access Control.
IEEE Trans. Knowl. Data Eng., 2005

Towards Secure XML Document with Usage Control.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Authorization Algorithms for the Mobility of User-Role Relationship.
Proceedings of the Computer Science 2005, 2005

2004
A Global Ticket-Based Access Scheme for Mobile Users.
Information Systems Frontiers, 2004

An Electronic Cash Scheme and its Management.
Concurrent Engineering: R&A, 2004

Specifying Role-Based Access Constraints with Object Constraint Language.
Proceedings of the Advanced Web Technologies and Applications, 2004

Anonymous Access Scheme for Electronic Services.
Proceedings of the Computer Science 2004, 2004

2003
Achieving secure and flexible M-services through tickets.
IEEE Trans. Systems, Man, and Cybernetics, Part A, 2003

Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations.
Proceedings of the Database Technologies 2003, 2003

A Flexible Payment Scheme and its Permission-Role Assignment.
Proceedings of the Computer Science 2003, 2003

2002
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations.
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002

Building consumer self-anonymity scalable payment protocol for Internet purchase.
Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems, 2002

Ticket-Based Service Access Scheme for Mobile Users.
Proceedings of the Computer Science 2002, 2002

2001
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control.
WISE (1), 2001


  Loading...