Jianhua Shao

Orcid: 0000-0001-8461-1471

Affiliations:
  • Cardiff University, UK
  • Ulster University, UK (PhD 1990)


According to our database1, Jianhua Shao authored at least 58 papers between 1990 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Semantic Attack on Disassociated Transaction Data.
SN Comput. Sci., July, 2023

MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding.
ACM Trans. Internet Techn., 2023

2022
Utility of Anonymised Data in Decision Tree Derivation.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

2020
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol.
Concurr. Comput. Pract. Exp., 2020

2019
Classifying software issue reports through association mining.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019

2018
Mining range associations for classification and characterization.
Data Knowl. Eng., 2018

Assisting investors with collective intelligence.
Proceedings of the First International Conference on Data Science, 2018

2017
Exploiting Contextual Information in Attacking Set-Generalized Transactions.
ACM Trans. Internet Techn., 2017

2016
Semantic Attack on Anonymised Transactions.
Trans. Large Scale Data Knowl. Centered Syst., 2016

2015
A Parallel Method for Scalable Anonymization of Transaction Data.
Proceedings of the 14th International Symposium on Parallel and Distributed Computing, 2015

MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce.
Proceedings of the Data and Applications Security and Privacy XXIX, 2015

2014
De-anonymising Set-Generalised Transactions Based on Semantic Relationships.
Proceedings of the Future Data and Security Engineering - First International Conference, 2014

2013
Efficient and flexible anonymization of transaction data.
Knowl. Inf. Syst., 2013

Modelling Confidence for Quality of Service Assessment in Cloud Computing.
Proceedings of the CONF-IRM 2013, 2013

2012
Assessing Disclosure Risk and Data Utility Trade-off in Transaction Data Anonymization.
Int. J. Softw. Informatics, 2012

Improving QoS assessment over multiple attributes with asynchonous data.
Comput. Syst. Sci. Eng., 2012

2011
Preventing range disclosure in k-anonymised data.
Expert Syst. Appl., 2011

A heuristic method for deriving range-based classification rules.
Proceedings of the Eighth International Conference on Fuzzy Systems and Knowledge Discovery, 2011

2010
Handling asynchronous data in assessing QoS over multiple attributes.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

<i>DC2S</i>: a dynamic car sharing system.
Proceedings of the 2010 International Workshop on Location Based Social Networks, 2010

Anonymizing Transaction Data to Eliminate Sensitive Inferences.
Proceedings of the Database and Expert Systems Applications, 21st International Conference, 2010

QoS Assessment over Multiple Attributes.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2009
Towards Preference-Constrained <i>k</i>-Anonymisation.
Proceedings of the Database Systems for Advanced Applications, 2009

2008
An Efficient Clustering Algorithm for <i>k</i> -Anonymisation.
J. Comput. Sci. Technol., 2008

Data utility and privacy protection trade-off in k-anonymisation.
Proceedings of the 2008 International Workshop on Privacy and Anonymity in Information Society, 2008

An Empirical Study of Utility Measures for k-Anonymisation.
Proceedings of the Sharing Data, 2008

2007
Privacy and e-commerce: a consumer-centric perspective.
Electron. Commer. Res., 2007

Capturing data usefulness and privacy protection in K-anonymisation.
Proceedings of the 2007 ACM Symposium on Applied Computing (SAC), 2007

Clustering-Based K-Anonymisation Algorithms.
Proceedings of the Database and Expert Systems Applications, 18th International Conference, 2007

Speeding Up Clustering-Based <i>k</i> -Anonymisation Algorithms with Pre-partitioning.
Proceedings of the Data Management. Data, 2007

2006
Expectation-based quality of service assessment.
Int. J. Digit. Libr., 2006

Modelling Quality of Service in Service Oriented Computing.
Proceedings of the 2006 International Workshop on Service Oriented Software Engineering (IW-SOSE '06), 2006

Supporting QoS Monitoring in Virtual Organisations.
Proceedings of the Service-Oriented Computing, 2006

QoS Assessment of Providers with Complex Behaviours: An Expectation-Based Approach with Confidence.
Proceedings of the Service-Oriented Computing, 2006

CONOISE-G: agent-based virtual organisations.
Proceedings of the 5th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2006), 2006

A Multiple Quality-Space Mapping Approach to QoS Assessment.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006

2005
Agent-based virtual organisations for the Grid.
Multiagent Grid Syst., 2005

Managing Quality of Service in Virtual Organisations.
Proceedings of the iiWAS'2005, 2005

Supporting QoS Assessment and Monitoring in Virtual Organisations.
Proceedings of the 2005 IEEE International Conference on Services Computing (SCC 2005), 2005

An Approach to Tracking Data Derivation in Information Systems.
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005

2004
Agent-based formation of virtual organisations.
Knowl. Based Syst., 2004

Algorithms for analysing related constraint business rules.
Data Knowl. Eng., 2004

Incorporating QoS Specifications in Service Discovery.
Proceedings of the Web Information Systems, 2004

Program Slicing in the Presence of a Database State.
Proceedings of the 20th International Conference on Software Maintenance (ICSM 2004), 2004

2003
Preserving privacy when preference searching in e-commerce.
Proceedings of the 2003 ACM Workshop on Privacy in the Electronic Society, 2003

CONOISE: Agent-Based Formation of Virtual Organisations.
Proceedings of the Research and Development in Intelligent Systems XX, 2003

A Quality of Service Management Framework Based on User Expectations.
Proceedings of the Service-Oriented Computing, 2003

Analysing the Impact of Adding Integrity Constraints to Information Systems.
Proceedings of the Advanced Information Systems Engineering, 15th International Conference, 2003

2002
Representing Constraint Business Rules Extracted from Legacy Systems.
Proceedings of the Database and Expert Systems Applications, 13th International Conference, 2002

An Algorithm for Determining Related Constraints.
Proceedings of the Advances in Databases, 19th British National Conference on Databases, 2002

2001
Assisting the Comprehension of Legacy Transactions.
Proceedings of the Eighth Working Conference on Reverse Engineering, 2001

A Framework for Business Rule Presentation.
Proceedings of the 12th International Workshop on Database and Expert Systems Applications (DEXA 2001), 2001

Querying Data-Intensive Programs for Data Design.
Proceedings of the Advanced Information Systems Engineering, 13th International Conference, 2001

2000
Advertising Database Capabilities for Information Sharing.
Proceedings of the Advanced Information Systems Engineering, 2000

1998
Incremental Updating of Classification Rules.
Proceedings of the Database and Expert Systems Applications, 9th International Conference, 1998

1997
KRAFT: Knowledge Fusion from Distributed Databases and Knowledge Bases.
Proceedings of the Eighth International Workshop on Database and Expert Systems Applications, 1997

1990
A study of parallel deductive database systems.
PhD thesis, 1990


  Loading...