Research - Selected Journal Articles

2011

  • Antoniou, Giannakis and Batten, Lynn (2011) E-commerce : protecting purchaser privacy to enforce trust, Electronic commerce research, vol. 11, no. 4, pp. 421-456, Springer New York LLC, New York, N. Y.
  • Beliakov, G., Bustince, H., Goswami, D.P., Mukherjee, U.K. and Pal, N.R. (2011) On averaging operators for Atanassov's intuitionistic fuzzy sets, Information Sciences, vol. 181, no. 6, pp. 1116-1124, Elsevier Ltd, Philadelphia, PA.
  • Beliakov, G., James, S. and Li, G. (2011) Learning choquet-integral-based metrics for semisupervised clustering, IEEE Transactions on Fuzzy Systems, vol. 19, no. 3, pp. 562-574, IEEE, Piscataway, NJ.
  • Beliakov, Gleb (2011) Fast computation of trimmed means, in Jan, de, Leeuw and Achim, Zeileis (eds), Journal of statistical software, vol. 39, no. 2, pp. 1-6, American Statistical Association, Alexandria, Va.
  • Beliakov, Gleb and James, Simon (2011) Citation-based journal ranks : The use of fuzzy measures, Fuzzy Sets and Systems, vol. 167, no. 1, pp. 101-119, Elsevier BV, North-Holland, Netherlands.
  • Beliakov, Gleb, Bustince, Humberto and Fernandez, Javier (2011) The median and its extensions, Fuzzy sets and systems, vol. 175, no. 1, pp. 36-47, Elsevier BV, Amsterdam, Netherlands.
  • Chen, Qingfeng, Li, Gang and Chen, Yi-Ping Phoebe (2011) Interval-based distance function for identifying RNA structure candidates, Journal of theoretical biology, vol. 269, no. 1, pp. 280-286, Academic Press, London, England.
  • Chi, Xiaoxiao and Hou, Jingyu (2011) An iterative approach of protein function prediction, BMC bioinformatics, vol. 12, pp. 1-9, BioMed Central Ltd, London, England.
  • Chonka, Ashley, Xiang, Yang, Zhou, Wanlei and Bonti, Alessio (2011) Cloud security defence to protect cloud computing against HTTP-DoS and XML-DoS attacks, Journal of network and computer applications, vol. 34, no. 4, pp. 1097-1107, Academic Press, London, U. K.
  • Dong, Yucheng, Hong, Wei-Chiang, Xu, Yinfeng and Yu, Shui (2011) Selecting the individual numerical scale and prioritization method in the analytic hierarchy process : a 2-tuple fuzzy linguistic approach, IEEE transactions on fuzzy systems, vol. 19, no. 1, pp. 13-25, IEEE, Piscataway, N. J.
  • Fudzee, Mohd Farhan Md and Abawajy, Jemal H. (2011) QoS-based adaptation service selection broker, Future generation computer systems, vol. 27, no. 3, pp. 256-264, Elsever BV, Amsterdam, Netherlands.
  • Galar, Mikel, Fernandez, Javier, Beliakov, Gleb and Bustince, Humberto (2011) Interval-valued fuzzy sets applied to stereo matching of color images, IEEE Transactions on Image Processing, vol. 20, no. 7, pp. 1949-1961, IEEE, United States.
  • Huang, Xinyi, Mu, Yi, Susilo, Willy, Wu, Wei and Xiang, Yang (2011) Optimistic fair exchange with strong resolution-ambiguity, IEEE journal on selected areas in communications, vol. 29, no. 7, pp. 1491-1502, IEEE, Piscataway, N. J.
  • Huang, Xinyi, Xiang, Yang, Chonka, Ashley, Zhou, Jianying and Deng, Robert H. (2011) A generic framework for three-factor authentication : preserving security and privacy in distributed systems, IEEE transactions on parallel and distributed systems, vol. 22, no. 8, pp. 1390-1397, IEEE, Piscataway, N. J.
  • Iqbal, Muhammad Azhar, Dai, Bin, Huang, Benxiong, Hassan, A. and Yu, S. (2011) Survey of network coding-aware routing protocols in wireless networks, Journal of network and computer applications, vol. 34, no. 6, pp. 1956-1970, Academic Press, London.
  • Jurio, Aranzazu, Pagola, Miguel, Mesiar, Radko, Beliakov, Gleb and Bustince, Humberto (2011) Image magnification using interval information, IEEE transactions on image processing, vol. 20, no. 11, pp. 3112-3123, IEEE, Piscataway, N. J.
  • Khayyam, Hamid, Nahavandi, Saeid, Hu, Eric, Kouzani, Abbas, Chonka, Ashley, Abawajy, Jemal, Marano, Vincenzo and Davis, Sam (2011) Intelligent energy management control of vehicle air conditioning via look-ahead system, Applied thermal engineering, vol. 31, no. 16, pp. 3147-3160, Pergamon, Oxford, U. K.
  • Law, Rob, Rong, Jia, Vu, Huy Quan, Li, Gang and Lee, Hee Andy (2011) Identifying changes and trends in Hong Kong outbound tourism, Tourism management, vol. 32, no. 5, pp. 1106-1114, Pergamon, Oxford, England.
  • Liu, Qi, Yang, Yi, Li, Yixue and Zhang, Zili (2011) Global and threshold-free transcriptional regulatory networks reconstruction through integrating ChIP-Chip and expression data, Current protein and peptide science, vol. 12, no. 7, pp. 631-642, Bentham Science Publishers, Hilversum, Netherlands.
  • Mahdin, Hairulnizam and Abawajy, Jemal (2011) An approach for removing redundant data from RFID data streams, Sensors, vol. 11, no. 10, pp. 9863-9877, Molecular Diversity Preservation International (M D P I) AG., Lausanne, Switzerland.
  • Nahar, Jesmin, Tickle, Kevin S., Ali, A.B.M. and Chen, Yi-Ping Phoebe (2011) Significant cancer prevention factor extraction : An association rule discovery approach, Journal of Medical Systems, vol. 35, no. 3, pp. 353-367, Springer New York LLC, New York, NY.
  • Nimmo, Dale G., James, Simon G., Kelly, Luke T., Watson, Simon J. and Bennett, Andrew F. (2011) The decoupling of abundance and species richness in lizard communities, Journal of animal ecology, vol. 80, no. 3, pp. 650-656, Wiley - Blackwell Publishing, Oxford, United Kingdom.
  • Niu, Wenjia, Li, Gang, Tang, Hui, Zhou, Xu and Shi, Zhongzhi (2011) CARSA : A context-aware reasoning-based service agent model for AI planning of web service composition, Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1757-1770, Academic Press, London.
  • Niu, Wenjia, Li, Gang, Zhao, Zhijun, Tang, Hui and Shi, Zhongzhi (2011) Multi-granularity context model for dynamic web service composition, Journal of network and computer applications, vol. 34, no. 1, pp. 312-326, Academic Press, London, England.
  • Peng, Dezhong, Xiang, Yong, Yi, Zhang and Yu, Shui (2011) CM-based blind equalization of time-varying SIMO-FIR channel with single pulsation estimation, in Weihua, Zhuang (eds), IEEE transactions on vehicular technology, vol. 60, no. 5, pp. 2410-2415, IEEE, Piscataway, N. J.
  • Rong, Yue and Xiang, Yong (2011) Multiuser multi-hop MIMO relay systems with correlated fading channels, IEEE transactions on wireless communications, vol. 10, no. 9, pp. 2835-2840, IEEE, Piscataway, N. J.
  • Townsend, Ben, Abawajy, Jemal and Kim, Tai-Hoon (2011) SMS-based medical diagnostic telemetry data transmission protocol for medical sensors, Sensors, vol. 11, no. 4, pp. 4231-4243, M D P I AG, Basel, Switzerland.
  • Wang, Xiaofeng, Li, Gang, Jiang, Guang and Shi, Zhongzhi (2011) Semantic trajectory based event detection and event pattern mining, Knowledge and information systems, pp. 1-25, Springer UK, London, England.
  • Wang, Yini, Wen, Sheng, Cesare, Silvio, Zhou, Wanlei and Xiang, Yang (2011) Eliminating errors in worm propagation models, IEEE Communications Letters, vol. 15, no. 9, pp. 1022-1024, IEEE, United States.
  • Wang, Yini, Wen, Sheng, Cesare, Silvio, Zhou, Wanlei and Xiang, Yang (2011) The microcosmic model of worm propagation, The Computer Journal, vol. 54, no. 10, pp. 1700-1720, Oxford University Press, Oxford, England.
  • Xiang, Yang, Li, Ke and Zhou, Wanlei (2011) Low-rate DDoS attacks detection and traceback by using new information metrics, IEEE Transactions on Information Forensics and Security, vol. 6, no. 2, pp. 426-437, IEEE, Piscataway, NJ.
  • Xiang, Yong, Peng, Dezhong, Natgunanathan, Iynkaran and Zhou, Wanlei (2011) Effective pseudonoise sequence and decoding function for imperceptibility and robustness enhancement in time-spread echo-based audio watermarking, IEEE transactions on multimedia, vol. 13, no. 1, pp. 2-13, IEEE, Piscataway, N.J.
  • Yang, Jun, Dai, Bin, Huang, Benxiong and Yu, Shui (2011) Orthogonal feedback scheme for network coding, Journal of Network and Computer Applications, vol. 34, no. 5, pp. 1623-1633, Academic Press, United Kingdom.
  • Yang, Zuyuan, Xiang, Yong and Xie, Shengli (2011) Maximum contrast analysis for nonnegative blind source separation, Computers and mathematics with applications, vol. 62, no. 11, pp. 3997-4006, Elsevier, Amsterdam, The Netherlands.
  • Ye, Yangdong, Ren, Yongli and Li, Gang (2011) Using local density information to improve IB algorithms, Pattern recognition letters, vol. 32, no. 2, pp. 310-320, Elsevier BV, Amsterdam, Netherlands.
  • Yu, Shui, Zhou, Wanlei, Doss, Robin and Jia, Weijia (2011) Traceback of DDoS attacks using entropy variations, IEEE transactions on parallel and distributed systems, vol. 22, no. 3, pp. 412-425, Piscataway, NJ, United States.
  • Zhang, Jun, Xiang, Yang, Zhou, Wanlei, Ye, Lei and Mu, Yi (2011) Secure image retrieval based on visual content and watermarking protocol, Computer journal, vol. 54, no. 10, pp. 1661-1674, Oxford University Press, Oxford, U. K.
  • Zhu, Wen Tao, Gao, Fei and Xiang, Yang (2011) A secure and efficient data aggregation scheme for wireless sensor networks, Concurrency Computation Practice and Experience, vol. 23, no. 12, pp. 1414-1430, John Wiley & Sons Ltd, United Kingdom.
  • Zhu, Xiaofeng, Zhang, Shichao, Jin, Zhi, Zhang, Zili and Xu, Zhuoming (2011) Missing value estimation for mixed-attribute data sets, IEEE transactions on knowledge and data engineering, vol. 23, no. 1, pp. 110-121, IEEE, Piscataway, NJ.


Return to top


Back to top