Jianming Yong

Orcid: 0000-0003-4111-1076

According to our database1, Jianming Yong authored at least 110 papers between 2001 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Clustered FedStack: Intermediate Global Models with Bayesian Information Criterion.
Pattern Recognit. Lett., January, 2024

Towards Causal Classification: A Comprehensive Study on Graph Neural Networks.
CoRR, 2024

2023
Topic Integrated Opinion-Based Drug Recommendation With Transformers.
IEEE Trans. Emerg. Top. Comput. Intell., December, 2023

Interrelated feature selection from health surveys using domain knowledge graph.
Health Inf. Sci. Syst., December, 2023

Exploring Causal Learning through Graph Neural Networks: An In-depth Review.
CoRR, 2023

AI-Driven Patient Monitoring with Multi-Agent Deep Reinforcement Learning.
CoRR, 2023

Graph-enabled Reinforcement Learning for Time Series Forecasting with Adaptive Intelligence.
CoRR, 2023

The Impact on Employability by COVID-19 Pandemic - AI Case Studies.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Knowledge-Based Nonlinear to Linear Dataset Transformation for Chronic Illness Classification.
Proceedings of the Health Information Science - 12th International Conference, 2023

2022
Graph-based multi-label disease prediction model learning from medical data and domain knowledge.
Knowl. Based Syst., 2022

Automated Knowledge Graph Construction for Healthcare Domain.
Proceedings of the Health Information Science - 11th International Conference, 2022

The Threat of Distributed Denial-of-Service Attack for User Equipment in 5G Networks.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

Decentralized Blockchain Network.
Proceedings of the Tenth International Conference on Advanced Cloud and Big Data, 2022

A Secured Movie Recommendation System using Decentralized Blockchain Network.
Proceedings of the 9th International Conference on Behavioural and Social Computing, 2022

2021
Security aspects in modern service component-oriented application logic for social e-commerce systems.
Soc. Netw. Anal. Min., 2021

Classification of Logical Vulnerability Based on Group Attack Method.
J. Ubiquitous Syst. Pervasive Networks, 2021

Mobile-based learning of drug prescription for medical education using artificial intelligence techniques.
Int. J. Mob. Learn. Organisation, 2021

Towards a User-Level Self-management of COVID-19 Using Mobile Devices Supported by Artificial Intelligence, 5G and the Cloud.
Proceedings of the Health Information Science - 10th International Conference, 2021

Challenges and Mitigation for Application Deployment over SaaS Platform in Banking and Financial Services Industry.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

Regulatory Challenges and Mitigation for Account Services Offered by FinTech.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
Mining health knowledge graph for health risk prediction.
World Wide Web, 2020

ITIL process management to mitigate operations risk in cloud architecture infrastructure for banking and financial services industry.
Web Intell., 2020

Feature-Based Learning in Drug Prescription System for Medical Clinics.
Neural Process. Lett., 2020

A Security Review of Event-Based Application Function and Service Component Architecture.
Int. J. Syst. Softw. Secur. Prot., 2020

A Novel Approach for Component based Application Logic Event Attack Modeling.
Int. J. Netw. Secur., 2020

Constructing a knowledge-based heterogeneous information graph for medical health status classification.
Health Inf. Sci. Syst., 2020

Emerging intelligent big data analytics for cloud and edge computing.
Concurr. Comput. Pract. Exp., 2020

IT Investment Governance and Corporate Governance: Perspective and Approach.
Proceedings of the 7th International Conference on Behavioural and Social Computing, 2020

Classification of Logical Vulnerability Based on Group Attacking Method.
Proceedings of the 11th International Conference on Ambient Systems, 2020

2019
Personalised Drug Prescription for Dental Clinics Using Word Embedding.
Proceedings of the Web Information Systems Engineering, 2019

Ethics of IT Security Team for Cloud Architecture Infrastructure in Banking and Financial Services Industry.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

Insider Threat and Mitigation for Cloud Architecture Infrastructure in Banking and Financial Services Industry.
Proceedings of the 23rd IEEE International Conference on Computer Supported Cooperative Work in Design, 2019

MeKG: Building a Medical Knowledge Graph by Data Mining from MEDLINE.
Proceedings of the Brain Informatics - 12th International Conference, 2019

A Preliminary Study for The Risk of Probabilistic Blockchain Protocols.
Proceedings of the 6th International Conference on Behavioral, 2019

Protecting Privacy in Digital Era on Cloud Architecture for Banking and Financial Services Industry.
Proceedings of the 6th International Conference on Behavioral, 2019

2018
Trustworthy service composition with secure data transmission in sensor networks.
World Wide Web, 2018

Special Issue on Service-Oriented Collaborative Computing and Applications.
IEEE Trans. Serv. Comput., 2018

Cloud Service Description Model: An Extension of USDL for Cloud Services.
IEEE Trans. Serv. Comput., 2018

MLaaS: A Cloud-Based System for Delivering Adaptive Micro Learning in Mobile MOOC Learning.
IEEE Trans. Serv. Comput., 2018

Drug prescription support in dental clinics through drug corpus mining.
Int. J. Data Sci. Anal., 2018

Preserving Data Privacy and Security in Australian My Health Record System: A Quality Health Care Implication.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Data Fusion for MaaS: Opportunities and Challenges.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Block Bayesian Sparse Topical Coding.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Emerging Topic Detection from Microblog Streams Based on Emerging Pattern Mining.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Data Privacy and System Security for Banking and Financial Services Industry based on Cloud Computing Infrastructure.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Mining Heterogeneous Information Graph for Health Status Classification.
Proceedings of the 5th International Conference on Behavioral, 2018

ITIL Processes to Control Operational Risk in Cloud Architecture Infrastructure for Banking and Financial Services Industry.
Proceedings of the 5th International Conference on Behavioral, 2018

Exploring the Use of a Network Model in Drug Prescription Support for Dental Clinics.
Proceedings of the 5th International Conference on Behavioral, 2018

2017
A Study on Securing Software Defined Networks.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Mining Drug Properties for Decision Support in Dental Clinics.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

Challenges and issues that are perceived to influence cloud computing adoption in local government councils.
Proceedings of the 21st IEEE International Conference on Computer Supported Cooperative Work in Design, 2017

2016
Factors to be considered in cloud computing adoption.
Web Intell., 2016

On Secure Wireless Communications for IoT Under Eavesdropper Collusion.
IEEE Trans Autom. Sci. Eng., 2016

A Local Field Correlated and Monte Carlo Based Shallow Neural Network Model for Nonlinear Time Series Prediction.
EAI Endorsed Trans. Scalable Inf. Syst., 2016

Decision support systems for adoption in dental clinics: A survey.
Knowl. Based Syst., 2016

An investigation of the challenges and issues influencing the adoption of cloud computing in Australian regional municipal governments.
J. Inf. Secur. Appl., 2016

A High Availability Application Service Platform for nuclear power enterprises.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Access control management with provenance in healthcare environments.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

NSSSD: A new semantic hierarchical storage for sensor data.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Improved media management through cloud computing technology.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Sentiment Analysis for Depression Detection on Social Networks.
Proceedings of the Advanced Data Mining and Applications - 12th International Conference, 2016

2015
A Study of Drug Interaction for Personalised Decision Support in Dental Clinics.
Proceedings of the IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology, 2015

Anticipated Benefits of Cloud Computing Adoption in Australian Regional Municipal Governments: An Exploratory Study.
Proceedings of the 19th Pacific Asia Conference on Information Systems, 2015

Drawing micro learning into MOOC: Using fragmented pieces of time to enable effective entire course learning experiences.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

Causal dependencies of provenance data in healthcare environment.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

Collaborative cloud computing adoption in Australian regional municipal government: An exploratory study.
Proceedings of the 19th IEEE International Conference on Computer Supported Cooperative Work in Design, 2015

2014
Access control management for e-Healthcare in cloud environment.
EAI Endorsed Trans. Scalable Inf. Syst., 2014

Impact of Cloud Computing Technology on E-Government.
Proceedings of the Information and Software Technologies - 20th International Conference, 2014

Extended economic models for information systems balance theory.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

Positive Influence Dominating Set Games.
Proceedings of the IEEE 18th International Conference on Computer Supported Cooperative Work in Design, 2014

2013
Collaborative computing technologies and systems.
J. Syst. Softw., 2013

A novel approach to data deduplication over the engineering-oriented cloud systems.
Integr. Comput. Aided Eng., 2013

Effective Pruning for the Discovery of Conditional Functional Dependencies.
Comput. J., 2013

Sentiment analysis on tweets for social events.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

Evaluations of heuristic algorithms for teamwork-enhanced task allocation in mobile cloud-based learning.
Proceedings of the 2013 IEEE 17th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2013

Mapping Semantic Knowledge for Unsupervised Text Categorisation.
Proceedings of the Twenty-Fourth Australasian Database Conference, 2013

2012
Using automated individual white-list to protect web digital identities.
Expert Syst. Appl., 2012

A survey on bio-inspired algorithms for web service composition.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

Semantic access control for cloud computing based on e-Healthcare.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

Cloud Computing for Higher Education: A roadmap.
Proceedings of the IEEE 16th International Conference on Computer Supported Cooperative Work in Design, 2012

2011
Security and Privacy Preservation for Mobile E-Learning via Digital Identity Attributes.
J. Univers. Comput. Sci., 2011

Generating associative ripples of relevant information from a variety of data streams by throwing a heuristic stone.
Proceedings of the 5th International Conference on Ubiquitous Information Management and Communication, 2011

Constructing robust digital identity infrastructure for future networked society.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

DeDu: Building a deduplication storage system over cloud computing.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

A light weight approach for ontology generation and change synchronization between ontologies and source relational databases.
Proceedings of the 2011 15th International Conference on Computer Supported Cooperative Work in Design, 2011

2010
Digital identity enrolment and assurance support for VeryIDX.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

Specify and enforce the policies of quantified risk adaptive access control.
Proceedings of the 2010 14th International Conference on Computer Supported Cooperative Work in Design, 2010

2009
CSCWD Technologies, Applications and Challenges.
J. Univers. Comput. Sci., 2009

Authorization Algorithms for Permission-Role Assignments.
J. Univers. Comput. Sci., 2009

Special Issue on Computer-Supported Cooperative Work: Techniques and applications.
Inf. Sci., 2009

A trust degree based access control in grid environments.
Inf. Sci., 2009

Privacy preserving on Radio Frequency Identification systems.
Proceedings of the 13th International Conference on Computers Supported Cooperative Work in Design, 2009

2008
Portable devices of security and privacy preservation for e-learning.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Authorization approaches for advanced permission-role assignments.
Proceedings of the 12th International Conference on CSCW in Design, 2008

Advanced Permission-Role Relationship in Role-Based Access Control.
Proceedings of the Information Security and Privacy, 13th Australasian Conference, 2008

2007
Replacing Lost or Stolen E-Passports.
Computer, 2007

A Fast Algorithm for Finding Correlation Clusters in Noise Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2007

An agent-based decentralised process management framework for web service composition.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Enhancing the Privacy of e-Learning Systems with Alias and Anonymity.
Proceedings of the Computer Supported Cooperative Work in Design IV, 2007

Digital Identity Design and Privacy Preservation for e-Learning.
Proceedings of the 11th International Conference on Computer Supported Cooperative Work in Design, 2007

2006
Extended RBAC with Role Attributes.
Proceedings of the Pacific Asia Conference on Information Systems, 2006

WFMS-based Data Integration for e-Learning.
Proceedings of the 10th International Conference on CSCW in Design, 2006

Neighbourhood-Trust Dependency Access Control for WFMS.
Proceedings of the 10th International Conference on CSCW in Design, 2006

New Data Integration Workflow Design for e-Learning.
Proceedings of the Computer Supported Cooperative Work in Design III, 2006

2005
Workflow-based e-learning platform.
Proceedings of the Ninth International Conference on Computer Supported Cooperative Work in Design, 2005

Internet-Based E-Learning Workflow Process.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

2004
Security Modelling for Integrated Information Systems over the Internet.
Proceedings of the Pacific Asia Conference on Information Systems, 2004

A New Approach to Multimedia Information Filtering Based on its Structure.
Proceedings of the 7th Eurographics Multimedia Workshop 2004, 2004

2003
A Framework of Tool Integration for Internet-Based E-commerce.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

2001
Modeling and Integration for Internet-based Workflow Systems.
Proceedings of the Fifth IASTED International Conference Internet and Multimedia Systems and Applications (IMSA 2001), 2001


  Loading...