Ljiljana Brankovic

Orcid: 0000-0002-5056-4627

Affiliations:
  • University of Newcastle, NSW, Australia


According to our database1, Ljiljana Brankovic authored at least 49 papers between 1996 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Diverging assessments: What, Why, and Experiences.
Proceedings of the 55th ACM Technical Symposium on Computer Science Education, 2024

2023
Confluence: A Robust Non-IoU Alternative to Non-Maxima Suppression in Object Detection.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

2022
Computer search for graceful labeling: a survey.
Electron. J. Graph Theory Appl., 2022

2020
Domination chain: Characterisation, classical complexity, parameterised complexity and approximability.
Discret. Appl. Math., 2020

2018
The many facets of upper domination.
Theor. Comput. Sci., 2018

Ambient Assisted Living and Ambient Intelligence for Health.
Mob. Inf. Syst., 2018

Editorial.
J. Discrete Algorithms, 2018

2016
Linear-time superbubble identification algorithm for genome assembly.
Theor. Comput. Sci., 2016

Upper Domination: Complexity and Approximation.
Proceedings of the Combinatorial Algorithms - 27th International Workshop, 2016

Smart Meter Data Analysis.
Proceedings of the International Conference on Internet of Things and Cloud Computing, 2016

On the Complexity Landscape of the Domination Chain.
Proceedings of the Algorithms and Discrete Applied Mathematics, 2016

Algorithmic Aspects of Upper Domination: A Parameterised Perspective.
Proceedings of the Algorithmic Aspects in Information and Management, 2016

2015
Exploiting Reduction Rules and Data Structures: Local Search for Minimum Vertex Cover in Massive Graphs.
CoRR, 2015

Linear-Time Superbubble Identification Algorithm.
CoRR, 2015

Algorithmic Aspects of Upper Domination.
CoRR, 2015

2014
Triangle randomization for social network data anonymization.
Ars Math. Contemp., 2014

Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk.
Proceedings of the Combinatorial Algorithms - 25th International Workshop, 2014

Evaluation of credibility assessment for microblogging: models and future directions.
Proceedings of the 14th International Conference on Knowledge Management and Data-driven Business, 2014

2013
A novel parameterised approximation algorithm for minimum vertex cover.
Theor. Comput. Sci., 2013

On d-antimagic labelings of plane graphs.
Electron. J. Graph Theory Appl., 2013

2012
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases.
Int. J. Medical Informatics, 2012

VICUS - A Noise Addition Technique for Categorical Data.
Proceedings of the Tenth Australasian Data Mining Conference, AusDM 2012, Sydney, 2012

2011
Continuous Monitoring of Distance-Based Range Queries.
IEEE Trans. Knowl. Data Eng., 2011

Graceful Labelling: State of the Art, Applications and Future Directions.
Math. Comput. Sci., 2011

Privacy preserving data mining: A noise addition framework using a novel clustering technique.
Knowl. Based Syst., 2011

Breaking the 2<sup>n</sup>-barrier for Irredundance: Two lines of attack.
J. Discrete Algorithms, 2011

Parameterized Approximation Algorithms for Hitting Set.
Proceedings of the Approximation and Online Algorithms - 9th International Workshop, 2011

2010
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

Combining Two Worlds: Parameterised Approximation for Vertex Cover.
Proceedings of the Algorithms and Computation - 21st International Symposium, 2010

Multi-guarded safe zone: An effective technique to monitor moving circular range queries.
Proceedings of the 26th International Conference on Data Engineering, 2010

On the Linearity of Cryptographic Sequence Generators.
Proceedings of the Computational Science and Its Applications, 2010

A Parameterized Route to Exact Puzzles: Breaking the 2<sup><i>n</i></sup>-Barrier for Irredundance.
Proceedings of the Algorithms and Complexity, 7th International Conference, 2010

2009
Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles
CoRR, 2009

2008
Guest Editorial.
J. Res. Pract. Inf. Technol., 2008

2007
Privacy-Preserving Data Mining.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

Statistical Database Security.
Proceedings of the Security, Privacy, and Trust in Modern Data Management, 2007

2004
An Overview of Security Issues and Techniques in Mobile Agents.
Proceedings of the Communications and Multimedia Security, 2004

A Framework for Privacy Preserving Classification in Data Mining.
Proceedings of the ACSW Frontiers 2004, 2004 ACSW Workshops, 2004

2002
On Range Query Usability of Statistical Databases.
Int. J. Comput. Math., 2002

Premature partial latin squares.
Ars Comb., 2002

2-Compromise Usability in 1-Dimensional Statistical Databases.
Proceedings of the Computing and Combinatorics, 8th Annual International Conference, 2002

2000
An Optimization Problem in Statistical Databases.
SIAM J. Discret. Math., 2000

1999
A Combinatorial Problem in Database Security.
Discret. Appl. Math., 1999

Flattening Antichains with Respect to the Volume.
Electron. J. Comb., 1999

Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules.
Proceedings of the Data Warehousing and Knowledge Discovery, 1999

1998
A Note on Constructing Large Cayley Graphs of Given Degree and Diameter by Voltage Assignments.
Electron. J. Comb., 1998

Large graphs with small degree and diameter: a voltage assignment approach.
Australas. J Comb., 1998

1997
Usability of Compromise-Free Statistical Databases
Proceedings of the Ninth International Conference on Scientific and Statistical Database Management, 1997

1996
Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise.
Proceedings of the Proceeding Seventh Australasian Database Conference, 1996


  Loading...