Ljiljana Brankovic
Cited by
Cited by
Data swapping: Balancing privacy against precision in mining for logic rules
V Estivill-Castro, L Brankovic
International Conference on Data Warehousing and Knowledge Discovery, 389-398, 1999
Privacy preserving data mining: A noise addition framework using a novel clustering technique
MZ Islam, L Brankovic
Knowledge-Based Systems 24 (8), 1214-1223, 2011
Privacy issues in knowledge discovery and data mining
L Brankovic, V Estivill-Castro
Australian institute of computer ethics conference, 89-99, 1999
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases
T King, L Brankovic, P Gillard
International journal of medical informatics 81 (4), 279-289, 2012
Continuous monitoring of distance-based range queries
MA Cheema, L Brankovic, X Lin, W Zhang, W Wang
IEEE Transactions on Knowledge and Data Engineering 23 (8), 1182-1199, 2010
Multi-guarded safe zone: An effective technique to monitor moving circular range queries
MA Cheema, L Brankovic, X Lin, W Zhang, W Wang
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 189-200, 2010
An overview of security issues and techniques in mobile agents
M Alfalayleh, L Brankovic
Communications and Multimedia Security: 8 th IFIP TC-6 TC-11 Conference on …, 2005
Adopting building information modeling (BIM) as collaboration platform in the design industry
N Gu, V Singh, K London, L Brankovic, C Taylor
CAADRIA 2008: Beyond Computer-Aided Design: Proceedings of the 13th …, 2008
A framework for privacy preserving classification in data mining
MZ Islam, L Brankovic
Workshop on Australasian Information Security, Data Mining and Web …, 2004
The many facets of upper domination
C Bazgan, L Brankovic, K Casel, H Fernau, K Jansen, KM Klein, ...
Theoretical Computer Science 717, 2-25, 2018
BIM adoption: expectations across disciplines
N Gu, V Singh, C Taylor, K London, L Brankovic
IGI, 2010
VICUS – A Noise Addition Technique for Categorical Data
H Giggins, L Brankovic
10th Australasian Data Mining Conference (AusDM 12), Sydney, Australia …, 2012
DETECTIVE: A decision tree based categorical value clustering and perturbation technique for preserving privacy in data mining
MZ Islam, L Brankovic
INDIN'05. 2005 3rd IEEE International Conference on Industrial Informatics …, 2005
A note on constructing large Cayley graphs of given degree and diameter by voltage assignments
L Branković, M Miller, J Plesník, J Ryan, J Širáň
the electronic journal of combinatorics, R9-R9, 1998
Labelings of plane graphs containing Hamilton path
M Bača, L Brankovic, A Semaničová-Feňovčíková
Acta Mathematica Sinica, English Series 27, 701-714, 2011
Confluence: A robust non-IoU alternative to non-maxima suppression in object detection
AJ Shepley, G Falzon, P Kwan, L Brankovic
IEEE Transactions on Pattern Analysis and Machine Intelligence, 2023
BIM: expectations and a reality check
N Gu, V Singh, K London, L Brankovic, C Taylor
Proceedings of 12th International Conference on Computing in Civil and …, 2008
Breaking the 2n-barrier for irredundance: Two lines of attack
D Binkele-Raible, L Brankovic, M Cygan, H Fernau, J Kneis, D Kratsch, ...
Journal of Discrete Algorithms 9 (3), 214-230, 2011
Building information modelling: an issue of adoption and change management
N Gu, V Singh, C Taylor, K London, L Brankovic
Privacy in data mining
V Estivill-Castro, L Brankovic, DL Dowe
Privacy-Law and Policy Reporter 6 (3), 33-35, 1999
The system can't perform the operation now. Try again later.
Articles 1–20