Hua Wang
Hua Wang
Verified email at
Cited by
Cited by
When things matter: A survey on data-centric internet of things
Y Qin, QZ Sheng, NJG Falkner, S Dustdar, H Wang, AV Vasilakos
Journal of Network and Computer Applications 64, 137-153, 2016
A flexible payment scheme and its role-based access control
H Wang, J Cao, Y Zhang
IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005
A novel statistical technique for intrusion detection systems
HWGZ E.Kabira, J. Hu
Future Generation Computer Systems 1 (1), …, 2017
A probabilistic method for emerging topic tracking in microblog stream
J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang
World Wide Web 20 (2), 325-350, 2017
Weighted visibility graph with complex network features in the detection of epilepsy
S Supriya, S Siuly, H Wang, J Cao, Y Zhang
IEEE access 4, 6554-6566, 2016
Privacy-aware access control with trust management in web service
M Li, X Sun, H Wang, Y Zhang, J Zhang
World Wide Web 14 (4), 407-430, 2011
Enhanced p-sensitive k-anonymity models for privacy preserving data publishing
X Sun, H Wang, J Li, TM Truta
Transactions on Data Privacy 1 (2), 53-66, 2008
On Secure Wireless Communications for IoT under Eavesdropper Collusion
XJ Y. Zhang, Y. Shen, H. Wang, J. Yong
IEEE Transactions on Automation Science and Engineering, 2015
Detection of motor imagery EEG signals employing Naļve Bayes based learning process
S Siuly, H Wang, Y Zhang
Measurement 86, 148-158, 2016
Extended k-anonymity models against sensitive attribute disclosure
X Sun, L Sun, H Wang
Computer Communications 34 (4), 526-535, 2011
Efficient systematic clustering method for k-anonymization
ME Kabir, H Wang, E Bertino
Acta Informatica 48 (1), 51-66, 2011
Special issue on security and privacy of IoT
H Wang, Z Zhang, T Taleb
World Wide Web 21 (1), 1-6, 2018
Effective collaboration with information sharing in virtual universities
H Wang, Y Zhang, J Cao
IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008
Privacy-preserving task recommendation services for crowdsourcing
J Shu, X Jia, K Yang, H Wang
IEEE Transactions on Services Computing, 2018
Integrating recommendation models for improved web page prediction accuracy
F Khalil, J Li, H Wang
Conferences in Research and Practice in Information Technology (CRPIT) 74 …, 2008
A comparative study of classification methods for microarray data analysis
H Hu, J Li, A Plank, H Wang, G Daggard
Proceedings of the 5th Australasian Data Mining Conference (AusDM 2006 …, 2006
Supervised anomaly detection in uncertain pseudoperiodic data streams
J Ma, L Sun, H Wang, Y Zhang, U Aickelin
ACM Transactions on Internet Technology (TOIT) 16 (1), 1-20, 2016
Untraceable off-line electronic cash flow in e-commerce
H Wang, Y Zhang
Proceedings 24th Australian Computer Science Conference. ACSC 2001, 191-198, 2001
Access control management for ubiquitous computing
H Wang, Y Zhang, J Cao
Future Generation Computer Systems 24 (8), 870-878, 2008
Ubiquitous computing environments and its usage access control
H Wang, Y Zhang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
The system can't perform the operation now. Try again later.
Articles 1–20