Hua Wang
Hua Wang
Verified email at
Cited by
Cited by
When things matter: A survey on data-centric internet of things
Y Qin, QZ Sheng, NJG Falkner, S Dustdar, H Wang, AV Vasilakos
Journal of Network and Computer Applications 64, 137-153, 2016
A flexible payment scheme and its role-based access control
H Wang, J Cao, Y Zhang
IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005
A probabilistic method for emerging topic tracking in microblog stream
J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang
World Wide Web 20 (2), 325-350, 2017
A novel statistical technique for intrusion detection systems
HWGZ E.Kabira, J. Hu
Future Generation Computer Systems 1 (1), …, 2017
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
X Sun, H Wang, J Li, TM Truta
Transactions on Data Privacy 1 (2), 53-66, 2008
Privacy-aware access control with trust management in web service
M Li, X Sun, H Wang, Y Zhang, J Zhang
World Wide Web 14 (4), 407-430, 2011
On Secure Wireless Communications for IoT under Eavesdropper Collusion
XJ Y. Zhang, Y. Shen, H. Wang, J. Yong
IEEE Transactions on Automation Science and Engineering, 2015
Weighted visibility graph with complex network features in the detection of epilepsy
S Supriya, S Siuly, H Wang, J Cao, Y Zhang
IEEE access 4, 6554-6566, 2016
Detection of motor imagery EEG signals employing Naļve Bayes based learning process
S Siuly, H Wang, Y Zhang
Measurement 86, 148-158, 2016
Extended k-anonymity models against sensitive attribute disclosure
X Sun, L Sun, H Wang
Computer Communications 34 (4), 526-535, 2011
Efficient systematic clustering method for k-anonymization
ME Kabir, H Wang, E Bertino
Acta Informatica 48 (1), 51-66, 2011
Effective collaboration with information sharing in virtual universities
H Wang, Y Zhang, J Cao
IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008
Special issue on security and privacy of IoT
H Wang, Z Zhang, T Taleb
World Wide Web 21 (1), 1-6, 2018
Privacy-preserving task recommendation services for crowdsourcing
J Shu, X Jia, K Yang, H Wang
IEEE Transactions on Services Computing, 2018
Integrating recommendation models for improved web page prediction accuracy
F Khalil, J Li, H Wang
Proceedings of the thirty-first Australasian conference on Computer science …, 2008
A comparative study of classification methods for microarray data analysis
H Hu, J Li, A Plank, H Wang, G Daggard
Proceedings of the 5th Australasian Data Mining Conference (AusDM 2006 …, 2006
Supervised anomaly detection in uncertain pseudoperiodic data streams
J Ma, L Sun, H Wang, Y Zhang, U Aickelin
ACM Transactions on Internet Technology (TOIT) 16 (1), 1-20, 2016
Untraceable off-line electronic cash flow in e-commerce
H Wang, Y Zhang
Proceedings 24th Australian Computer Science Conference. ACSC 2001, 191-198, 2001
A conditional purpose-based access control model with dynamic roles
ME Kabir, H Wang, E Bertino
Expert Systems with Applications 38 (3), 1482-1489, 2011
Ubiquitous computing environments and its usage access control
H Wang, Y Zhang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20