Automated epilepsy detection techniques from electroencephalogram signals: a review study

S Supriya, S Siuly, H Wang, Y Zhang - Health information science and …, 2020 - Springer
Epilepsy is a serious neurological condition which contemplates as top 5 reasons for
avoidable mortality from ages 5–29 in the worldwide. The avoidable deaths due to epilepsy …

Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning

J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin - World Wide Web, 2022 - Springer
Exploitation time is an essential factor for vulnerability assessment in cybersecurity
management. In this work, we propose an integrated consecutive batch learning framework …

Spectral clustering via half-quadratic optimization

X Zhu, J Gan, G Lu, J Li, S Zhang - World Wide Web, 2020 - Springer
Spectral clustering has been demonstrated to often outperform K-means clustering in real
applications because it improves the similarity measurement of K-means clustering …

Neural attention with character embeddings for hay fever detection from twitter

J Du, S Michalska, S Subramani, H Wang… - … information science and …, 2019 - Springer
The paper aims to leverage the highly unstructured user-generated content in the context of
pollen allergy surveillance using neural networks with character embeddings and the …

Improving accessibility of the Australian My Health Records while preserving privacy and security of the system

P Vimalachandran, H Liu, Y Lin, K Ji, H Wang… - … Information Science and …, 2020 - Springer
Abstract Australian My Health Record (MyHR) is a significant development in empowering
patients, allowing them to access their summarised health information themselves and to …

Special issue on security and privacy in network computing

H Wang, Y Wang, T Taleb, X Jiang - World Wide Web, 2020 - Springer
Computer networks have revolutionized traditional computing architectures and created a
wide range of network computing paradigms, including blockchain [1], distributed computing …

Personalized app recommendation based on app permissions

M Peng, G Zeng, Z Sun, J Huang, H Wang, G Tian - World Wide Web, 2018 - Springer
With the development of science and technology, the popularity of smart phones has made
exponential growth in mobile phone application market. How to help users to select …

[HTML][HTML] Interesting association rule mining with consistent and inconsistent rule detection from big sales data in distributed environment

DJ Prajapati, S Garg, NC Chauhan - Future Computing and Informatics …, 2017 - Elsevier
Nowadays, there is an increasing demand in mining interesting patterns from the big data.
The process of analyzing such a huge amount of data is really computationally complex task …

A PUF-based unified identity verification framework for secure IoT hardware via device authentication

Z Huang, Q Wang - World Wide Web, 2020 - Springer
In the era of Internet-of-Things (IoTs), millions of smart devices are interconnected and
communicated through networks. To guarantee the security and reliability of data …

Set-based adaptive distributed differential evolution for anonymity-driven database fragmentation

YF Ge, J Cao, H Wang, Z Chen, Y Zhang - Data Science and Engineering, 2021 - Springer
By breaking sensitive associations between attributes, database fragmentation can protect
the privacy of outsourced data storage. Database fragmentation algorithms need prior …