scispace - formally typeset
L

Ljiljana Brankovic

Researcher at University of Newcastle

Publications -  84
Citations -  1465

Ljiljana Brankovic is an academic researcher from University of Newcastle. The author has contributed to research in topics: Building information modeling & Planar graph. The author has an hindex of 20, co-authored 83 publications receiving 1385 citations. Previous affiliations of Ljiljana Brankovic include University of Wollongong & University of Trier.

Papers
More filters
Book ChapterDOI

Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules

TL;DR: It is argued that in data mining the major requirement of security control mechanism is not to ensure precise and bias-free statistics, but rather to preserve the high-level descriptions of knowledge constructed by artificial data mining tools.
Journal ArticleDOI

Perspectives of Australian adults about protecting the privacy of their health information in statistical databases

TL;DR: The study showed that there are some particularly sensitive issues and there is a concern about any possibility of linking these kinds of data to the patient's name in a situation that is not related to medical treatment, and improving privacy protection of personal information by introducing additional security measures in data publishing.
Journal ArticleDOI

Privacy preserving data mining: a noise addition framework using a novel clustering technique

TL;DR: A framework that uses a few novel noise addition techniques for protecting individual privacy while maintaining a high data quality is presented and a security analysis is presented for measuring the security level of a data set.

Privacy issues in knowledge discovery and data mining

TL;DR: This work discusses new privacy threats posed KDDM, which includes massive data collection, data warehouses, statistical analysis and deductive learning techniques, and uses vast amounts of data to generate hypotheses and discover general patterns.
Proceedings ArticleDOI

Multi-guarded safe zone: An effective technique to monitor moving circular range queries

TL;DR: A technique based on powerful pruning rules and a unique access order is proposed which efficiently computes the safe zone and minimizes the I/O cost and is an order of magnitude faster than a naïve algorithm.