Skip to main content

Research Repository

Advanced Search

All Outputs (6)

Time-aware distributed service recommendation with privacy-preservation (2018)
Journal Article
Xu, X., He, Q., Qi, L., Wang, R., Hu, C., & Li, S. (2019). Time-aware distributed service recommendation with privacy-preservation. Information Sciences, 480, 354-364. https://doi.org/10.1016/j.ins.2018.11.030

© 2018 As a promising way to extract insightful information from massive data, service recommendation has gained ever-increasing attentions in both academic and industrial areas. Recently, the Locality-Sensitive Hashing (LSH) technique is introduced... Read More about Time-aware distributed service recommendation with privacy-preservation.

Behavior rhythm: A new model for behavior visualization and its application in system security management (2018)
Journal Article
He, C., Liu, Z., Guan, X., Li, S., & Qin, T. (2018). Behavior rhythm: A new model for behavior visualization and its application in system security management. IEEE Access, 6, 73940-73951. https://doi.org/10.1109/ACCESS.2018.2882812

© 2018 IEEE. The widespread use of social media, cloud computing, and Internet of Things generates massive behavior data recorded by system logs, and how to utilize these data to improve the stability and security of these systems becomes more and mo... Read More about Behavior rhythm: A new model for behavior visualization and its application in system security management.

An IoT-oriented data placement method with privacy preservation in cloud environment (2018)
Journal Article
Xu, X., Fu, S., Qi, L., Zhang, X., Liu, Q., He, Q., & Li, S. (2018). An IoT-oriented data placement method with privacy preservation in cloud environment. Journal of Network and Computer Applications, 124, 148-157. https://doi.org/10.1016/j.jnca.2018.09.006

© 2018 Elsevier Ltd IoT (Internet of Things) devices generate huge amount of data which require rich resources for data storage and processing. Cloud computing is one of the most popular paradigms to accommodate such IoT data. However, the privacy co... Read More about An IoT-oriented data placement method with privacy preservation in cloud environment.

Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems (2018)
Journal Article
Li, S., Zhao, S., Yuan, Y., Sun, Q., & Zhang, K. (2018). Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. IEEE Transactions on Computational Social Systems, 5(4), 1133-1141. https://doi.org/10.1109/TCSS.2018.2858440

© 2014 IEEE. Cyber-physical social system (CPSS) plays an important role in both the modern lifestyle and business models, which significantly changes the way we interact with the physical world. The increasing influence of cyber systems and social n... Read More about Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems.

Local spatial obesity analysis and estimation using online social network sensors (2018)
Journal Article
Sun, Q., Wang, N., Li, S., & Zhou, H. (2018). Local spatial obesity analysis and estimation using online social network sensors. Journal of Biomedical Informatics, 83, 54-62. https://doi.org/10.1016/j.jbi.2018.03.010

© 2018 Elsevier Inc. Recently, the online social networks (OSNs) have received considerable attentions as a revolutionary platform to offer users massive social interaction among users that enables users to be more involved in their own healthcare. T... Read More about Local spatial obesity analysis and estimation using online social network sensors.

MIAEC: Missing data imputation based on the evidence Chain (2018)
Journal Article
Xu, X., Chong, W., Li, S., & Arabo, A. (2018). MIAEC: Missing data imputation based on the evidence Chain. IEEE Access, 6, 12983-12992. https://doi.org/10.1109/ACCESS.2018.2803755

© 2013 IEEE. Missing or incorrect data caused by improper operations can seriously compromise security investigation. Missing data can not only damage the integrity of the information but also lead to the deviation of the data mining and analysis. Th... Read More about MIAEC: Missing data imputation based on the evidence Chain.