default search action
Ljiljana Brankovic
Person information
- affiliation: University of Newcastle, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c21]Trien Phat Tran, Fareed Ud Din, Ljiljana Brankovic, Cesar Sanín, Susan M. Hester:
A Systematic Review of Medicinal Plant Identification Using Deep Learning. ACIIDS (2) 2024: 3-14 - [c20]Amin Sakzad, David J. Paul, Judithe Sheard, Ljiljana Brankovic, Matthew P. Skerritt, Nan Li, Sepehr Minagar, Simon, William Billingsley:
Diverging assessments: What, Why, and Experiences. SIGCSE (1) 2024: 1161-1167 - 2023
- [j24]Andrew Shepley, Gregory Falzon, Paul Kwan, Ljiljana Brankovic:
Confluence: A Robust Non-IoU Alternative to Non-Maxima Suppression in Object Detection. IEEE Trans. Pattern Anal. Mach. Intell. 45(10): 11561-11574 (2023) - 2022
- [j23]Ljiljana Brankovic, Michael J. Reynolds:
Computer search for graceful labeling: a survey. Electron. J. Graph Theory Appl. 10(1): 319 (2022) - 2020
- [j22]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau:
Domination chain: Characterisation, classical complexity, parameterised complexity and approximability. Discret. Appl. Math. 280: 23-42 (2020)
2010 – 2019
- 2018
- [j21]Ljiljana Brankovic, Joe Ryan, William F. Smyth:
Editorial. J. Discrete Algorithms 52-53: 1 (2018) - [j20]Pino Caballero-Gil, Lilia Georgieva, Ljiljana Brankovic, Mike Burmester:
Ambient Assisted Living and Ambient Intelligence for Health. Mob. Inf. Syst. 2018: 7560465:1-7560465:2 (2018) - [j19]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau, Klaus Jansen, Kim-Manuel Klein, Michael Lampis, Mathieu Liedloff, Jérôme Monnot, Vangelis Th. Paschos:
The many facets of upper domination. Theor. Comput. Sci. 717: 2-25 (2018) - [e4]Ljiljana Brankovic, Joe Ryan, William F. Smyth:
Combinatorial Algorithms - 28th International Workshop, IWOCA 2017, Newcastle, NSW, Australia, July 17-21, 2017, Revised Selected Papers. Lecture Notes in Computer Science 10765, Springer 2018, ISBN 978-3-319-78824-1 [contents] - 2016
- [j18]Ljiljana Brankovic, Costas S. Iliopoulos, Ritu Kundu, Manal Mohamed, Solon P. Pissis, Fatima Vayani:
Linear-time superbubble identification algorithm for genome assembly. Theor. Comput. Sci. 609: 374-383 (2016) - [c19]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau, Klaus Jansen, Kim-Manuel Klein, Michael Lampis, Mathieu Liedloff, Jérôme Monnot, Vangelis Th. Paschos:
Algorithmic Aspects of Upper Domination: A Parameterised Perspective. AAIM 2016: 113-124 - [c18]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau:
On the Complexity Landscape of the Domination Chain. CALDAM 2016: 61-72 - [c17]Moudhi M. Aljamea, Ljiljana Brankovic, Jia Gao, Costas S. Iliopoulos, M. Samiruzzaman:
Smart Meter Data Analysis. ICC 2016 2016: 22:1-22:6 - [c16]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau, Klaus Jansen, Kim-Manuel Klein, Michael Lampis, Mathieu Liedloff, Jérôme Monnot, Vangelis Th. Paschos:
Upper Domination: Complexity and Approximation. IWOCA 2016: 241-252 - 2015
- [i5]Ljiljana Brankovic, Costas S. Iliopoulos, Ritu Kundu, Manal Mohamed, Solon P. Pissis, Fatima Vayani:
Linear-Time Superbubble Identification Algorithm. CoRR abs/1505.04019 (2015) - [i4]Cristina Bazgan, Ljiljana Brankovic, Katrin Casel, Henning Fernau, Klaus Jansen, Michael Lampis, Mathieu Liedloff, Jérôme Monnot, Vangelis Th. Paschos:
Algorithmic Aspects of Upper Domination. CoRR abs/1506.07260 (2015) - [i3]Yi Fan, Chengqian Li, Zongjie Ma, Ljiljana Brankovic, Vladimir Estivill-Castro, Abdul Sattar:
Exploiting Reduction Rules and Data Structures: Local Search for Minimum Vertex Cover in Massive Graphs. CoRR abs/1509.05870 (2015) - 2014
- [j17]Ljiljana Brankovic, Nacho López, Mirka Miller, Francesc Sebé:
Triangle randomization for social network data anonymization. Ars Math. Contemp. 7(2): 461-477 (2014) - [c15]Amal Abdullah AlMansour, Ljiljana Brankovic, Costas S. Iliopoulos:
Evaluation of credibility assessment for microblogging: models and future directions. I-KNOW 2014: 32:1-32:4 - [c14]Mousa Alfalayleh, Ljiljana Brankovic:
Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk. IWOCA 2014: 24-36 - [i2]Mousa Alfalayleh, Ljiljana Brankovic:
Quantifying Privacy: A Novel Entropy-Based Measure of Disclosure Risk. CoRR abs/1409.2112 (2014) - 2013
- [j16]Martin Baca, Ljiljana Brankovic, Marcela Lascsáková, Oudone Phanalasy, Andrea Semanicová-Fenovcíková:
On d-antimagic labelings of plane graphs. Electron. J. Graph Theory Appl. 1(1): 28-39 (2013) - [j15]Ljiljana Brankovic, Henning Fernau:
A novel parameterised approximation algorithm for minimum vertex cover. Theor. Comput. Sci. 511: 85-108 (2013) - 2012
- [j14]Tatiana King, Ljiljana Brankovic, Patricia Gillard:
Perspectives of Australian adults about protecting the privacy of their health information in statistical databases. Int. J. Medical Informatics 81(4): 279-289 (2012) - [c13]Helen Giggins, Ljiljana Brankovic:
VICUS - A Noise Addition Technique for Categorical Data. AusDM 2012: 139-148 - 2011
- [j13]Daniel Binkele-Raible, Ljiljana Brankovic, Marek Cygan, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Marcin Pilipczuk, Peter Rossmanith, Jakub Onufry Wojtaszczyk:
Breaking the 2n-barrier for Irredundance: Two lines of attack. J. Discrete Algorithms 9(3): 214-230 (2011) - [j12]Md Zahidul Islam, Ljiljana Brankovic:
Privacy preserving data mining: A noise addition framework using a novel clustering technique. Knowl. Based Syst. 24(8): 1214-1223 (2011) - [j11]Ljiljana Brankovic, Ian M. Wanless:
Graceful Labelling: State of the Art, Applications and Future Directions. Math. Comput. Sci. 5(1): 11-20 (2011) - [j10]Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin Lin, Wenjie Zhang, Wei Wang:
Continuous Monitoring of Distance-Based Range Queries. IEEE Trans. Knowl. Data Eng. 23(8): 1182-1199 (2011) - [c12]Ljiljana Brankovic, Henning Fernau:
Parameterized Approximation Algorithms for Hitting Set. WAOA 2011: 63-76 - 2010
- [c11]Daniel Binkele-Raible, Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Peter Rossmanith:
A Parameterized Route to Exact Puzzles: Breaking the 2n-Barrier for Irredundance. CIAC 2010: 311-322 - [c10]Amparo Fúster-Sabater, Oscar Delgado-Mohatar, Ljiljana Brankovic:
On the Linearity of Cryptographic Sequence Generators. ICCSA (2) 2010: 586-596 - [c9]Muhammad Aamir Cheema, Ljiljana Brankovic, Xuemin Lin, Wenjie Zhang, Wei Wang:
Multi-guarded safe zone: An effective technique to monitor moving circular range queries. ICDE 2010: 189-200 - [c8]Ljiljana Brankovic, Henning Fernau:
Combining Two Worlds: Parameterised Approximation for Vertex Cover. ISAAC (1) 2010: 390-402 - [c7]Oscar Delgado-Mohatar, José M. Sierra, Ljiljana Brankovic, Amparo Fúster-Sabater:
An Energy-Efficient Symmetric Cryptography Based Authentication Scheme for Wireless Sensor Networks. WISTP 2010: 332-339
2000 – 2009
- 2009
- [e3]Ljiljana Brankovic, Willy Susilo:
Seventh Australasian Information Security Conference, AISC 2009, Wellington, New Zealand, January 2009. CRPIT 98, Australian Computer Society 2009, ISBN 978-1-920682-79-8 [contents] - [i1]Ljiljana Brankovic, Henning Fernau, Joachim Kneis, Dieter Kratsch, Alexander Langer, Mathieu Liedloff, Daniel Raible, Peter Rossmanith:
Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles. CoRR abs/0909.4224 (2009) - 2008
- [j9]Ljiljana Brankovic, Mirka Miller, Chris Steketee:
Guest Editorial. J. Res. Pract. Inf. Technol. 40(3): 149 (2008) - [j8]Ljiljana Brankovic, Mirka Miller, Chris Steketee:
Guest Editorial. J. Res. Pract. Inf. Technol. 40(4): 229 (2008) - [e2]Ljiljana Brankovic, Mirka Miller:
Sixth Australasian Information Security Conference, AISC 2008, Wollongong, NSW, Australia, January 2008. CRPIT 81, Australian Computer Society 2008, ISBN 978-1-920682-62-0 [contents] - 2007
- [p2]Ljiljana Brankovic, Md Zahidul Islam, Helen Giggins:
Privacy-Preserving Data Mining. Security, Privacy, and Trust in Modern Data Management 2007: 151-165 - [p1]Ljiljana Brankovic, Helen Giggins:
Statistical Database Security. Security, Privacy, and Trust in Modern Data Management 2007: 167-181 - [e1]Ljiljana Brankovic, Paul D. Coddington, John F. Roddick, Chris Steketee, James R. Warren, Andrew L. Wendelborn:
ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007. CRPIT 68, Australian Computer Society 2007, ISBN 1-920-68249-X [contents] - 2004
- [c6]Md Zahidul Islam, Ljiljana Brankovic:
A Framework for Privacy Preserving Classification in Data Mining. ACSW 2004: 163-168 - [c5]Mousa Alfalayleh, Ljiljana Brankovic:
An Overview of Security Issues and Techniques in Mobile Agents. Communications and Multimedia Security 2004: 59-78 - 2002
- [j7]Ljiljana Brankovic, Peter Horák, Mirka Miller, Alexander Rosa:
Premature partial latin squares. Ars Comb. 63 (2002) - [j6]Ljiljana Brankovic, Mirka Miller, Jozef Sirán:
On Range Query Usability of Statistical Databases. Int. J. Comput. Math. 79(12): 1265-1271 (2002) - [c4]Ljiljana Brankovic, Jozef Sirán:
2-Compromise Usability in 1-Dimensional Statistical Databases. COCOON 2002: 448-455 - 2000
- [j5]Ljiljana Brankovic, Peter Horák, Mirka Miller:
An Optimization Problem in Statistical Databases. SIAM J. Discret. Math. 13(3): 346-353 (2000)
1990 – 1999
- 1999
- [j4]Ljiljana Brankovic, Paulette Lieby, Mirka Miller:
Flattening Antichains with Respect to the Volume. Electron. J. Comb. 6 (1999) - [j3]Peter Horák, Ljiljana Brankovic, Mirka Miller:
A Combinatorial Problem in Database Security. Discret. Appl. Math. 91(1-3): 119-126 (1999) - [c3]Vladimir Estivill-Castro, Ljiljana Brankovic:
Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules. DaWaK 1999: 389-398 - 1998
- [j2]Ljiljana Brankovic, Mirka Miller, Ján Plesník, Joe Ryan, Jozef Sirán:
Large graphs with small degree and diameter: a voltage assignment approach. Australas. J Comb. 18: 65-76 (1998) - [j1]Ljiljana Brankovic, Mirka Miller, Ján Plesník, Joseph F. Ryan, Jozef Sirán:
A Note on Constructing Large Cayley Graphs of Given Degree and Diameter by Voltage Assignments. Electron. J. Comb. 5 (1998) - 1997
- [c2]Ljiljana Brankovic, Peter Horák, Mirka Miller, Graham Wrightson:
Usability of Compromise-Free Statistical Databases. SSDBM 1997: 144-154 - 1996
- [c1]Ljiljana Brankovic, Mirka Miller, Jozef Sirán:
Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise. Australasian Database Conference 1996: 177-184
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:18 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint