L
Ljiljana Brankovic
Researcher at University of Newcastle
Publications - 84
Citations - 1465
Ljiljana Brankovic is an academic researcher from University of Newcastle. The author has contributed to research in topics: Building information modeling & Planar graph. The author has an hindex of 20, co-authored 83 publications receiving 1385 citations. Previous affiliations of Ljiljana Brankovic include University of Wollongong & University of Trier.
Papers
More filters
Book ChapterDOI
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules
TL;DR: It is argued that in data mining the major requirement of security control mechanism is not to ensure precise and bias-free statistics, but rather to preserve the high-level descriptions of knowledge constructed by artificial data mining tools.
Journal ArticleDOI
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases
TL;DR: The study showed that there are some particularly sensitive issues and there is a concern about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment, and improving privacy protection of personal information by introducing additional security measures in data publishing.
Journal ArticleDOI
Privacy preserving data mining: a noise addition framework using a novel clustering technique
Zahidul Islam,Ljiljana Brankovic +1 more
TL;DR: A framework that uses a few novel noise addition techniques for protecting individual privacy while maintaining a high data quality is presented and a security analysis is presented for measuring the security level of a data set.
Privacy issues in knowledge discovery and data mining
TL;DR: This work discusses new privacy threats posed KDDM, which includes massive data collection, data warehouses, statistical analysis and deductive learning techniques, and uses vast amounts of data to generate hypotheses and discover general patterns.
Proceedings ArticleDOI
Multi-guarded safe zone: An effective technique to monitor moving circular range queries
TL;DR: A technique based on powerful pruning rules and a unique access order is proposed which efficiently computes the safe zone and minimizes the I/O cost and is an order of magnitude faster than a naïve algorithm.