Performance Comparison and Current Challenges of Using Machine Learning Techniques in Cybersecurity K Shaukat, S Luo, V Varadharajan, IA Hameed, S Chen, D Liu, J Li Enegies 13 (10), 2509, 2020 | 266 | 2020 |
Cyber threat detection using machine learning techniques: A performance evaluation perspective K Shaukat, S Luo, S Chen, D Liu 2020 international conference on cyber warfare and security (ICCWS), 1-6, 2020 | 137 | 2020 |
Privacy in social networks: A comparative study S Chen, MA Williams | 30 | 2009 |
Towards a comprehensive requirements architecture for privacy-aware social recommender systems S Chen, MA Williams Conferences in Research and Practice in Information Technology Series, 2010 | 28 | 2010 |
Background knowledge driven ontology discovery S Chen, D Alahakoon, M Indrawan 2005 IEEE International Conference on e-Technology, e-Commerce and e-Service …, 2005 | 14 | 2005 |
Privacy: An ontological problem S Chen, MA Williams | 12 | 2010 |
Learning personalized ontologies from text: A review on an inherently transdisciplinary area S Chen, MA Williams Personalized Information Retrieval and Access: Concepts, Methods and …, 2008 | 10 | 2008 |
Grounding Privacy-by-Design for information systems S Chen, MA Williams | 9 | 2013 |
Cloud ERP Implementation Using Edge Computing S Chand, S Lal, S Chen, A Devi 2018 5th Asia-Pacific World Congress on Computer Science and Engineering …, 2018 | 6 | 2018 |
Information makes a difference for privacy design S Chen, MA Williams | 4 | 2012 |
Building an adaptive hierarchy of clusters for text data S Chen, D Alahakoon, M Indrawan International Conference on Computational Intelligence for Modelling …, 2005 | 3 | 2005 |
An ontological study of data purpose for privacy policy enforcement S Chen, MA Williams 2011 IEEE Third International Conference on Privacy, Security, Risk and …, 2011 | 2 | 2011 |
Grounding data purpose and data usage for better privacy requirements development: an information system perspective S Chen, MA Williams | 2 | 2011 |
Modeling privacy requirements for quality manipulation of information on social networking sites S Chen, MA Williams 2010 AAAI Spring Symposium Series, 2010 | 2 | 2010 |
Efficient Crowd Anomaly Detection Using Sparse Feature Tracking and Neural Network S Altowairqi, S Luo, P Greer, S Chen Applied Sciences 14 (9), 3928, 2024 | 1 | 2024 |
Integrating an alert technology into PIC social context: An earthquake-induced tsunami alert for Pacific Island Communities B Itibita, S Chen 2017 4th Asia-Pacific World Congress on Computer Science and Engineering …, 2017 | 1 | 2017 |
Grounding data purpose and data usage for better privacy requirements: An information system perspective S Chen, MA Williams PACIS 2011-15th Pacific Asia Conference on Information Systems: Quality …, 2011 | 1 | 2011 |
An unsupervised neural network approach for ontology discovery from text S Chen, D Alahakoon, MT Indrawan International Workshop on Semantic Web Mining and Reasoning (SWMR), 5-12, 2004 | 1 | 2004 |
Information Systems Design for Expansive Learning: A Novel Approach for Mobile Collaborative Problem Solving M Francisco, R., Tiilikainen, S., Chen, S. and Söllner International Conference in Information Systems 2018, 2018 | | 2018 |
Diagrammatically Formalising Constraints of a Privacy Ontology S Chen, A Delaney Diagrammatic Representation and Inference: 10th International Conference …, 2018 | | 2018 |