default search action
Jianhua Shao 0001
Person information
- affiliation: Cardiff University, UK
- affiliation (PhD 1990): Ulster University, UK
Other persons with the same name
- Jianhua Shao — disambiguation page
- Jianhua Shao 0002 — University of Nottingham, UK
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [i3]Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder, Yongluan Zhou:
A Study on Asynchronous Vote-based Blockchains. CoRR abs/2409.08161 (2024) - 2023
- [j16]Asma AlShuhail, Jianhua Shao:
Semantic Attack on Disassociated Transaction Data. SN Comput. Sci. 4(4): 344 (2023) - [j15]Yibin Xu, Jianhua Shao, Tijs Slaats, Boris Düdder:
MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain Sharding. ACM Trans. Internet Techn. 23(2): 34:1-34:27 (2023) - 2022
- [c42]Jack R. Davies, Jianhua Shao:
Utility of Anonymised Data in Decision Tree Derivation. ICISSP 2022: 273-280 - 2020
- [j14]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurr. Comput. Pract. Exp. 32(19) (2020) - [i2]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. CoRR abs/2003.06990 (2020) - [i1]Yibin Xu, Yangyu Huang, Jianhua Shao, George Theodorakopoulos:
A Flexible n/2 Adversary Node Resistant and Halting Recoverable Blockchain Sharding Protocol. IACR Cryptol. ePrint Arch. 2020: 323 (2020)
2010 – 2019
- 2019
- [c41]Mohd Syafiq Zolkeply, Jianhua Shao:
Classifying software issue reports through association mining. SAC 2019: 1860-1863 - 2018
- [j13]Jianhua Shao, Achilleas Tziatzios:
Mining range associations for classification and characterization. Data Knowl. Eng. 118: 92-106 (2018) - [c40]Daniela K. Tsaneva, Jianhua Shao:
Assisting investors with collective intelligence. DATA 2018: 34:1-34:6 - 2017
- [j12]Jianhua Shao, Hoang Ong:
Exploiting Contextual Information in Attacking Set-Generalized Transactions. ACM Trans. Internet Techn. 17(4): 40:1-40:20 (2017) - 2016
- [j11]Jianhua Shao, Hoang Ong:
Semantic Attack on Anonymised Transactions. Trans. Large Scale Data Knowl. Centered Syst. 23: 75-99 (2016) - 2015
- [c39]Neelam Memon, Jianhua Shao:
MR-RBAT: Anonymizing Large Transaction Datasets Using MapReduce. DBSec 2015: 3-18 - [c38]Neelam Memon, Grigorios Loukides, Jianhua Shao:
A Parallel Method for Scalable Anonymization of Transaction Data. ISPDC 2015: 235-241 - 2014
- [c37]Hoang Ong, Jianhua Shao:
De-anonymising Set-Generalised Transactions Based on Semantic Relationships. FDSE 2014: 107-121 - 2013
- [j10]Grigorios Loukides, Aris Gkoulalas-Divanis, Jianhua Shao:
Efficient and flexible anonymization of transaction data. Knowl. Inf. Syst. 36(1): 153-210 (2013) - [c36]Hmood Al-Dossari, Jianhua Shao:
Modelling Confidence for Quality of Service Assessment in Cloud Computing. CONF-IRM 2013: 48 - 2012
- [j9]Hmood Al-Dossari, Jianhua Shao, Alun D. Preece:
Improving QoS assessment over multiple attributes with asynchonous data. Comput. Syst. Sci. Eng. 27(2) (2012) - [j8]Grigorios Loukides, Aris Gkoulalas-Divanis, Jianhua Shao:
Assessing Disclosure Risk and Data Utility Trade-off in Transaction Data Anonymization. Int. J. Softw. Informatics 6(3): 399-417 (2012) - 2011
- [j7]Grigorios Loukides, Jianhua Shao:
Preventing range disclosure in k-anonymised data. Expert Syst. Appl. 38(4): 4559-4574 (2011) - [c35]Achilles Tziatzios, Jianhua Shao, Grigorios Loukides:
A heuristic method for deriving range-based classification rules. FSKD 2011: 925-929 - 2010
- [c34]Hmood Al-Dossari, Jianhua Shao, Alun D. Preece:
QoS Assessment over Multiple Attributes. CIT 2010: 1456-1461 - [c33]Grigorios Loukides, Aris Gkoulalas-Divanis, Jianhua Shao:
Anonymizing Transaction Data to Eliminate Sensitive Inferences. DEXA (1) 2010: 400-415 - [c32]Jianhua Shao, Chris Greenhalgh:
DC2S: a dynamic car sharing system. GIS-LBSN 2010: 51-59 - [c31]Hmood Al-Dossari, Jianhua Shao, Alun D. Preece:
Handling asynchronous data in assessing QoS over multiple attributes. SOCA 2010: 1-8
2000 – 2009
- 2009
- [c30]Grigorios Loukides, Achilles Tziatzios, Jianhua Shao:
Towards Preference-Constrained k-Anonymisation. DASFAA Workshops 2009: 231-245 - 2008
- [j6]Grigorios Loukides, Jianhua Shao:
An Efficient Clustering Algorithm for k -Anonymisation. J. Comput. Sci. Technol. 23(2): 188-202 (2008) - [c29]Grigorios Loukides, Jianhua Shao:
An Empirical Study of Utility Measures for k-Anonymisation. BNCOD 2008: 15-27 - [c28]Grigorios Loukides, Jianhua Shao:
Data utility and privacy protection trade-off in k-anonymisation. PAIS 2008: 36-45 - [e2]W. Alex Gray, Keith G. Jeffery, Jianhua Shao:
Sharing Data, Information and Knowledge, 25th British National Conference on Databases, BNCOD 25, Cardiff, UK, July 7-10, 2008. Proceedings. Lecture Notes in Computer Science 5071, Springer 2008, ISBN 978-3-540-70503-1 [contents] - 2007
- [j5]Rhys Smith, Jianhua Shao:
Privacy and e-commerce: a consumer-centric perspective. Electron. Commer. Res. 7(2): 89-116 (2007) - [c27]Grigorios Loukides, Jianhua Shao:
Speeding Up Clustering-Based k -Anonymisation Algorithms with Pre-partitioning. BNCOD 2007: 203-214 - [c26]Grigorios Loukides, Jianhua Shao:
Clustering-Based K-Anonymisation Algorithms. DEXA 2007: 761-771 - [c25]Grigorios Loukides, Jianhua Shao:
Capturing data usefulness and privacy protection in K-anonymisation. SAC 2007: 370-374 - 2006
- [j4]Vikas Deora, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
Expectation-based quality of service assessment. Int. J. Digit. Libr. 6(3): 260-269 (2006) - [c24]Grigorios Loukides, Jianhua Shao:
Towards Balancing Data Usefulness and Privacy Protection in K-Anonymisation. CIT 2006: 15 - [c23]Gareth Shercliff, Jianhua Shao, W. Alex Gray, Nick J. Fiddian:
A Multiple Quality-Space Mapping Approach to QoS Assessment. CIT 2006: 26 - [c22]Jigar Patel, W. T. Luke Teacy, Nicholas R. Jennings, Michael Luck, Stuart W. Chalmers, Nir Oren, Timothy J. Norman, Alun D. Preece, Peter M. D. Gray, Gareth Shercliff, Patrick J. Stockreisser, Jianhua Shao, W. Alex Gray, Nick J. Fiddian, Simon G. Thompson:
CONOISE-G: agent-based virtual organisations. AAMAS 2006: 1459-1460 - [c21]Gareth Shercliff, Jianhua Shao, W. Alex Gray, Nick J. Fiddian:
QoS Assessment of Providers with Complex Behaviours: An Expectation-Based Approach with Confidence. ICSOC 2006: 378-389 - [c20]Patrick J. Stockreisser, Jianhua Shao, W. Alex Gray, Nick J. Fiddian:
Supporting QoS Monitoring in Virtual Organisations. ICSOC 2006: 447-452 - [c19]Vikas Deora, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
Modelling Quality of Service in Service Oriented Computing. SOSE 2006: 95-101 - 2005
- [j3]Jigar Patel, W. T. Luke Teacy, Nicholas R. Jennings, Michael Luck, Stuart W. Chalmers, Nir Oren, Timothy J. Norman, Alun D. Preece, Peter M. D. Gray, Gareth Shercliff, Patrick J. Stockreisser, Jianhua Shao, W. Alex Gray, Nick J. Fiddian, Simon G. Thompson:
Agent-based virtual organisations for the Grid. Multiagent Grid Syst. 1(4): 237-249 (2005) - [c18]Jianhua Shao, Yahya Ibrahim, Suzanne M. Embury:
An Approach to Tracking Data Derivation in Information Systems. CIT 2005: 65-69 - [c17]Gareth Shercliff, Patrick J. Stockreisser, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
Supporting QoS Assessment and Monitoring in Virtual Organisations. IEEE SCC 2005: 249-250 - [c16]Jigar Patel, W. T. Luke Teacy, Nicholas R. Jennings, Michael Luck, Stuart W. Chalmers, Nir Oren, Timothy J. Norman, Alun D. Preece, Peter M. D. Gray, Gareth Shercliff, Patrick J. Stockreisser, Jianhua Shao, W. A. Gray, Nick J. Fiddian, Simon G. Thompson:
Agent-based virtual organisations for the Grid. AAMAS 2005: 1151-1152 - [c15]Patrick J. Stockreisser, Gareth Shercliff, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
Managing Quality of Service in Virtual Organisations. iiWAS 2005: 413-424 - 2004
- [j2]Gaihua Fu, Jianhua Shao, Suzanne M. Embury, W. A. Gray:
Algorithms for analysing related constraint business rules. Data Knowl. Eng. 50(2): 215-240 (2004) - [j1]Timothy J. Norman, Alun D. Preece, Stuart W. Chalmers, Nicholas R. Jennings, Michael Luck, Viet Dung Dang, Thuc Duong Nguyen, Vikas Deora, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
Agent-based formation of virtual organisations. Knowl. Based Syst. 17(2-4): 103-111 (2004) - [c14]David Willmor, Suzanne M. Embury, Jianhua Shao:
Program Slicing in the Presence of a Database State. ICSM 2004: 448-452 - [c13]Vikas Deora, Jianhua Shao, Gareth Shercliff, Patrick J. Stockreisser, W. A. Gray, Nick J. Fiddian:
Incorporating QoS Specifications in Service Discovery. WISE Workshops 2004: 252-263 - 2003
- [c12]Suzanne M. Embury, Jianhua Shao:
Analysing the Impact of Adding Integrity Constraints to Information Systems. CAiSE 2003: 175-192 - [c11]Vikas Deora, Jianhua Shao, W. A. Gray, Nick J. Fiddian:
A Quality of Service Management Framework Based on User Expectations. ICSOC 2003: 104-114 - [c10]Timothy J. Norman, Alun D. Preece, Stuart W. Chalmers, Nicholas R. Jennings, Michael Luck, Viet Dung Dang, Thuc Duong Nguyen, Vikas Deora, Jianhua Shao, W. Alex Gray, Nick J. Fiddian:
CONOISE: Agent-Based Formation of Virtual Organisations. SGAI Conf. 2003: 353-366 - [c9]Rhys Smith, Jianhua Shao:
Preserving privacy when preference searching in e-commerce. WPES 2003: 101-110 - 2002
- [c8]Gaihua Fu, Jianhua Shao, Suzanne M. Embury, W. A. Gray:
An Algorithm for Determining Related Constraints. BNCOD 2002: 134-149 - [c7]Gaihua Fu, Jianhua Shao, Suzanne M. Embury, W. A. Gray:
Representing Constraint Business Rules Extracted from Legacy Systems. DEXA 2002: 464-473 - 2001
- [c6]Jianhua Shao, Xingkun Liu, Gaihua Fu, Suzanne M. Embury, W. A. Gray:
Querying Data-Intensive Programs for Data Design. CAiSE 2001: 203-218 - [c5]Gaihua Fu, Jianhua Shao, Suzanne M. Embury, W. A. Gray, Xingkun Liu:
A Framework for Business Rule Presentation. DEXA Workshop 2001: 922-926 - [c4]Suzanne M. Embury, Jianhua Shao:
Assisting the Comprehension of Legacy Transactions. WCRE 2001: 345- - 2000
- [c3]Suzanne M. Embury, Jianhua Shao, W. A. Gray, Nigel Fishlock:
Advertising Database Capabilities for Information Sharing. CAiSE 2000: 47-63
1990 – 1999
- 1998
- [c2]Jianhua Shao:
Incremental Updating of Classification Rules. DEXA 1998: 861-870 - [e1]Barry Eaglestone, Bipin C. Desai, Jianhua Shao:
Proceedings of the 1998 International Database Engineering and Applications Symposium, IDEAS 1998, Cardiff, Wales, UK, July 8-10, 1998. IEEE Computer Society 1998, ISBN 0-8186-8307-4 [contents] - 1997
- [c1]Peter M. D. Gray, Alun D. Preece, Nick J. Fiddian, W. A. Gray, Trevor J. M. Bench-Capon, Michael J. R. Shave, Nader Azarmi, M. Wiegand, M. Ashwell, Martin D. Beer, Zhan Cui, B. M. Diaz, Suzanne M. Embury, Kit-Ying Hui, Andrew C. Jones, Dean M. Jones, Graham J. L. Kemp, E. W. Lawson, K. Lunn, Philippe Marti, Jianhua Shao, Pepijn R. S. Visser:
KRAFT: Knowledge Fusion from Distributed Databases and Knowledge Bases. DEXA Workshop 1997: 682-691 - 1990
- [b1]Jianhua Shao:
A study of parallel deductive database systems. Ulster University, UK, 1990
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-15 00:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint