Overview
I am a member of the Data and Knowledge Engineering research group within the School. My research interest is broadly in the area of data analysis including more recently privacy protection, and I welcome the opportunity to work with PhD students and industrial partners to develop privacy protection solutions.
Publication
2023
- Xu, Y., Shao, J., Slaats, T. and Düdder, B. 2023. MWPoW+: a strong consensus protocol for intra-shard consensus in blockchain sharding. ACM Transactions on Internet Technology 23(2), article number: 34. (10.1145/3584020)
- AlShuhail, A. and Shao, J. 2023. Semantic attack on disassociated transaction data. Springer Nature 4, article number: 344. (10.1007/s42979-023-01781-6)
2022
- Alsulami, A. and Shao, J. 2022. Extracting attributes for twitter hashtag communities. International Journal of Humanities and Social Sciences 16(3), pp. 171-178.
- Davies, J. R. and Shao, J. 2022. Utility of anonymised data in decision tree derivation. Presented at: ICISSP 2022 : 8th International Conference on Information Systems Security and Privacy, 9 - 11 February 2022.
2021
- AlShuhail, A. and Shao, J. 2021. Semantic attack on disassociated transactions. Presented at: 8th International Conference on Information Systems Security and Privacy (ICISSP 2022), Virtual, 9-11 February 2022.
2020
- Xu, Y., Huang, Y., Shao, J. and Theodorakopoulos, G. 2020. A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurrency and Computation: Practice and Experience 32(19), article number: e5773. (10.1002/cpe.5773)
- Xu, Y., Huang, Y. and Shao, J. 2020. Anchoring the value of cryptocurrency. Presented at: IWBOSE 2020: 3rd International Workshop on Blockchain Oriented Software Engineering, London, Canada, 18 February 20202020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE pp. 30-36., (10.1109/IWBOSE50093.2020.9050264)
2019
- Zolkeply, M. S. and Shao, J. 2019. Classifying software issue reports through association mining. Presented at: 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8-12 Apr 2019SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. ACM pp. 1860-1863., (10.1145/3297280.3297608)
2018
- Shao, J. and Tziatzios, A. 2018. Mining range associations for classification and characterization. Data and Knowledge Engineering 118, pp. 92-106. (10.1016/j.datak.2018.10.001)
- Tsaneva, D. and Shao, J. 2018. Assisting investors with collective intelligence. Presented at: International Conference on Data Science, E-learning and Information Systems, Madrid, 01-02 October 2018DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. New York, NY: ACM, (10.1145/3279996.3280030)
2017
- Shao, J. and Ong, H. 2017. Exploiting contextual information in attacking set-generalized transactions. ACM Transactions on Internet Technology 17(4), article number: 40. (10.1145/3106165)
- Shao, J. and Beckford, J. 2017. Learning decision trees from anonymized data. Presented at: 8th Annual International Conf on ICT: Big Data, Cloud and Security, Singapore, 21-22 August 2017.
2016
- Shao, J. and Ong, H. 2016. Semantic attack on anonymised transactions. Presented at: FDSE 2014: 1st International Conference on Future Data and Security Engineering 2014, Ho Chi Minh City, Vietnam, 19-21 November 2014 Presented at Hameurlain, A. et al. eds.Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII: Selected Papers from FDSE 2014, Vol. 9480. Lecture Notes in Computer Science Springer pp. 75-99., (10.1007/978-3-662-49175-1_4)
2015
- Memon, N. and Shao, J. 2015. MR-RBAT: Anonymizing large transaction datasets using MapReduce. Presented at: Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, 13-15 July 2015.
- Memon, N., Loukides, G. and Shao, J. 2015. A parallel method for scalable anonymization of transaction data. Presented at: 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015, Limassol, Cyprus, 29 June - 2 July 20152015 14th International Symposium on Parallel and Distributed Computing (ISPDC). IEEE pp. 235-241., (10.1109/ISPDC.2015.34)
- Ong, H. and Shao, J. 2015. De-anonymising set-generalised transactions based on semantic relationships. Presented at: Future Data and Security Engineering - First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, 19-21 November, 2014.
2013
- Loukides, G., Gkoulalas-Divanis, A. and Shao, J. 2013. Efficient and flexible anonymization of transaction data. Knowledge and Information Systems 36(1), pp. 153-210. (10.1007/s10115-012-0544-3)
2012
- Al-Dossari, H., Shao, J. and Preece, A. D. 2012. Improving QoS assessment over multiple attributes with asynchronous data. Computer Systems Science and Engineering 27(2), pp. 133-147.
2011
- Loukides, G. and Shao, J. 2011. Preventing range disclosure in k-anonymised data. Expert Systems with Applications 38(4), pp. 4559-4574. (10.1016/j.eswa.2010.09.130)
- Tziatzios, A., Shao, J. and Loukides, G. 2011. A heuristic method for deriving range-based classification rules. Presented at: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Shanghai, China, 26-28 July 2011 Presented at Ding, Y. et al. eds.Proceedings: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Vol. 2. Los Alamitos, CA: IEEE pp. 925-929., (10.1109/FSKD.2011.6019723)
2010
- Al-Dossari, H., Shao, J. and Preece, A. D. 2010. QoS assessment over multiple attributes. Presented at: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK2010 IEEE 10th International Conference on Computer and Information Technology (CIT). pp. 1456-1461., (10.1109/CIT.2010.260)
- Al-Dossari, H., Shao, J. and Preece, A. D. 2010. Handling asynchronous data in assessing QoS over multiple attributes. Presented at: IEEE International Conference on Service-Oriented Computing and Applications, Perth, Australia, 13-15 December 2010IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2010 Perth, WA, 13-15 Dec. 2010. Piscataway, NJ: IEEE, (10.1109/SOCA.2010.5707145)
- Loukides, G., Gkoulalas-Divanis, A. and Shao, J. 2010. Anonymizing transaction data to eliminate sensitive inferences. Presented at: DEXA 2010: International Conference on Database and Expert Systems Applications, Bilbao, Spain, 30 August - 3 September 2010 Presented at Garcia Bringas, P., Hameurlain, A. and Quirchmayr, G. eds.Database and Expert Systems Applications: 21st International Conference, DEXA 2010, Bilbao, Spain, August 30 - September 3, 2010, Proceedings, Part I, Vol. 6261. Springer Verlag pp. 400-415., (10.1007/978-3-642-15364-8_34)
2009
- Loukides, G., Tziatzios, A. and Shao, J. 2009. Towards preference-constrained k-anonymisation. Lecture Notes in Computer Science 5667, pp. 231-245. (10.1007/978-3-642-04205-8_20)
2008
- Loukides, G. and Shao, J. 2008. An efficient clustering algorithm for k-anonymisation. Journal of Computer Science and Technology 23(2), pp. 188-202. (10.1007/s11390-008-9121-3)
2007
- Smith, R. and Shao, J. 2007. Privacy and e-Commerce: a Consumer-Centric Perspective. Electronic Commerce Research 7(2), pp. 89-116. (10.1007/s10660-007-9002-9)
- Loukidis, G. and Shao, J. 2007. Capturing Data Usefulness and Privacy Protection in K-Anonymisation. Presented at: Proceedings of the 2007 ACM Symposium on Applied Computing. pp. 370-374., (10.1145/1244002.1244091)
- Loukides, G. and Shao, J. 2007. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. Lecture Notes in Computer Science 4587, pp. 203-214. (10.1007/978-3-540-73390-4_23)
- Loukides, G. and Shao, J. 2007. Greedy clustering with sample-based heuristics for k-anonymisation. Presented at: The First International Symposium on Data, Privacy, and E-Commerce, 2007, Chengdu, Sichuan, 1-3 November 2007Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, 2007. Los Alamitos, CA: IEEE pp. 191-196., (10.1109/ISDPE.2007.102)
- Loukides, G. and Shao, J. 2007. Capturing data usefulness and privacy protection in K-anonymisation. Presented at: 22nd Annual ACM Symposium on Applied Computing, Seoul, Korea, 11-15 March 2007SAC '07 Proceedings of the 2007 ACM Symposium on Applied Computing. New York, NY: ACM pp. 370-374., (10.1145/1244002.1244091)
- Loukides, G. and Shao, J. 2007. Clustering-based K-anonymisation algorithms. Lecture Notes in Computer Science 4653, pp. 761-771. (10.1007/978-3-540-74469-6_74)
2006
- Shercliff, G., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. A multiple quality-space mapping approach to QoS assessment. Presented at: IEEE International Conference on Computer and Information Technology - CIT 2006, Seoul, South Korea, 20-22 September 2006 Presented at Jeong, C. ed.Proceedings of CIT 2006. Los Alamitos, CA: IEEE pp. 26., (10.1109/CIT.2006.15)
- Loukides, G. and Shao, J. 2006. Towards balancing data usefulness and privacy protection in K-anonymisation. Presented at: The Sixth IEEE International Conference on Computer and Information Technology (CIT 2006), Seoul, South Korea, 20-22 September 2006 Presented at Jeong, C. ed.Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT 2006). Los Alamitos, CA: IEEE pp. 15., (10.1109/CIT.2006.184)
- Loukides, G. and Shao, J. 2006. Query-driven data anonymisation. Presented at: 23rd British National Conference on Databases - BNCOD 2006, PhD Forum, Belfast, Northern Ireland, 17-20 July 2006.
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Expectation-based quality of service assessment. International Journal on Digital Libraries 6(3), pp. 260-269. (10.1007/s00799-006-0004-3)
- Stockreisser, P. J., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Supporting QoS monitoring in virtual organisations. Lecture Notes in Computer Science 4294, pp. 447-452. (10.1007/11948148_38)
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Supporting QoS based selection in service oriented architecture. Presented at: 2nd International Conference on Next-Generation Web Services Practices, Seoul, Korea, 25-28 September 2006 Presented at Abraham, A. and Han, S. Y. eds.Proceedings of the International Conference on Next-Generation Web Services Practices. Los Alamitos, CA: IEEE Computer Society pp. 117-126., (10.1109/NWESP.2006.29)
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Modelling quality of service in service oriented computing. Presented at: Second IEEE International Symposium on Service-Oriented System Engineering, Shanghai, China, 25-26 October 2006 Presented at Chi, C., Bastani, F. and Xue, X. eds.Second IEEE International Symposium on Service-Oriented System Engineering : SOSE 2006 : proceedings. Los Alamitos, CA: IEEE Computer Society pp. 95-101., (10.1109/SOSE.2006.22)
- Shercliff, G., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. QoS assessment of providers with complex behaviours: An expectation-based approach with confidence. Lecture Notes in Computer Science 4294, pp. 378-389. (10.1007/11948148_31)
2005
- Shao, J., Ibrahim, Y. and Embury, S. M. 2005. An approach to tracking data derivation in information systems. Presented at: Fifth International Conference on Computer and Information Technology, 2005. CIT 2005, Shanghai, China, 21-23 September 2005 Presented at Gu, N. et al. eds.Proceedings of the Fifth International Conference on Computer and Information Technology, 2005. CIT 2005. Los Alamitos, CA: IEEE pp. 65-69., (10.1109/CIT.2005.63)
- Preece, A. D. et al. 2005. Managing Virtual Organisations on the Grid using agent technology. AgentLink News 17, pp. 14-17.
- Patel, J. et al. 2005. Agent-based virtual organisations for the Grid. Presented at: AAMAS '05 - Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, Utrecht, Netherlands, July 25-29 2005, Utrecht, Netherlands, 25-29 July 2005AAMAS '05 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. pp. 1151-1152., (10.1145/1082473.1082668)
- Patel, J. et al. 2005. Monitoring, policing and trust for gridbBased virtual organisations. Presented at: UK e-Science All Hands Meeting 2005, Nottingham, UK, 19-22 September 2005Proceedings of the UK e-Science All Hands Meeting 2005. EPSRC pp. 891-898.
- Patel, J. et al. 2005. Agent-based virtual organisations for the Grid. Multiagent and Grid Systems - Smart Grid Technologies & Market Models 1(4), pp. 237-249.
2004
- Fu, G., Shao, J., Embury, S. M. and Gray, W. A. 2004. Algorithms for analysing related constraint business rules. Data & knowledge engineering 50(2), pp. 215-240. (10.1016/j.datak.2004.01.006)
- Norman, T. J. et al. 2004. Agent-based formation of virtual organisations. Knowledge-based systems 17(2-4), pp. 103-111. (10.1016/j.knosys.2004.03.005)
- Deora, V., Shao, J., Shercliff, G., Stockreisser, P. J., Gray, W. A. and Fiddian, N. J. 2004. Incorporating QoS specifications in service discovery. Lecture Notes in Computer Science 3307, pp. 252-263. (10.1007/978-3-540-30481-4_25)
- Norman, T. J. et al. 2004. CONOISE: Agent-based formation of virtual organisations. Presented at: 23rd SGAI International Conference on Innovative Techniques and Applications of AI (AI-2003), Cambridge, UK, 15-17 December 2003 Presented at Coenen, F., Preece, A. D. and Macintosh, A. eds.Research and Development in Intelligent Systems XX : Proceedings of AI2003, the Twenty-Third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence /. BCS Conference Series London: Springer pp. 353-366.
- Shao, J. et al. 2004. Supporting formation and operation of virtual organisations in a grid environment. Presented at: UK e-Science All Hands Meeting 2004 (AHM2004), Nottingham, UK, 31 August – 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the UK e-Science All Hands Meeting 2004. The Engineering and Physical Sciences Research Council (EPSRC) pp. 376-383.
- Willmor, D., Embury, S. M. and Shao, J. 2004. Program slicing in the presence of database state. Presented at: 20th International Conference on Software Maintenance, Chicago, IL, USA, 11-17 September 2004ICSM 2004: 20th IEEE International Conference on Software Maintenance : proceedings. Los Alamitos, CA: IEEE Computer Society pp. 448-452., (10.1109/ICSM.2004.1357833)
2001
- Fu, G., Shao, J., Embury, S. M., Gray, W. A. and Liu, X. 2001. A framework for business rule presentation. Presented at: 12th International Workshop on Database and Expert Systems Applications, Munich, Germany, 3-7 September 2001Proceedings of the 12th International Workshop on Database and Expert Systems Applications, 2001.. IEEE pp. 922-926., (10.1109/DEXA.2001.953173)
- Shao, J., Liu, X., Fu, G., Embury, S. M. and Gray, W. A. 2001. Querying Data-Intensive Programs for Data Design. Lecture Notes in Computer Science 2068, pp. 203-218. (10.1007/3-540-45341-5_14)
Articles
- Xu, Y., Shao, J., Slaats, T. and Düdder, B. 2023. MWPoW+: a strong consensus protocol for intra-shard consensus in blockchain sharding. ACM Transactions on Internet Technology 23(2), article number: 34. (10.1145/3584020)
- AlShuhail, A. and Shao, J. 2023. Semantic attack on disassociated transaction data. Springer Nature 4, article number: 344. (10.1007/s42979-023-01781-6)
- Alsulami, A. and Shao, J. 2022. Extracting attributes for twitter hashtag communities. International Journal of Humanities and Social Sciences 16(3), pp. 171-178.
- Xu, Y., Huang, Y., Shao, J. and Theodorakopoulos, G. 2020. A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurrency and Computation: Practice and Experience 32(19), article number: e5773. (10.1002/cpe.5773)
- Shao, J. and Tziatzios, A. 2018. Mining range associations for classification and characterization. Data and Knowledge Engineering 118, pp. 92-106. (10.1016/j.datak.2018.10.001)
- Shao, J. and Ong, H. 2017. Exploiting contextual information in attacking set-generalized transactions. ACM Transactions on Internet Technology 17(4), article number: 40. (10.1145/3106165)
- Loukides, G., Gkoulalas-Divanis, A. and Shao, J. 2013. Efficient and flexible anonymization of transaction data. Knowledge and Information Systems 36(1), pp. 153-210. (10.1007/s10115-012-0544-3)
- Al-Dossari, H., Shao, J. and Preece, A. D. 2012. Improving QoS assessment over multiple attributes with asynchronous data. Computer Systems Science and Engineering 27(2), pp. 133-147.
- Loukides, G. and Shao, J. 2011. Preventing range disclosure in k-anonymised data. Expert Systems with Applications 38(4), pp. 4559-4574. (10.1016/j.eswa.2010.09.130)
- Loukides, G., Tziatzios, A. and Shao, J. 2009. Towards preference-constrained k-anonymisation. Lecture Notes in Computer Science 5667, pp. 231-245. (10.1007/978-3-642-04205-8_20)
- Loukides, G. and Shao, J. 2008. An efficient clustering algorithm for k-anonymisation. Journal of Computer Science and Technology 23(2), pp. 188-202. (10.1007/s11390-008-9121-3)
- Smith, R. and Shao, J. 2007. Privacy and e-Commerce: a Consumer-Centric Perspective. Electronic Commerce Research 7(2), pp. 89-116. (10.1007/s10660-007-9002-9)
- Loukides, G. and Shao, J. 2007. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. Lecture Notes in Computer Science 4587, pp. 203-214. (10.1007/978-3-540-73390-4_23)
- Loukides, G. and Shao, J. 2007. Clustering-based K-anonymisation algorithms. Lecture Notes in Computer Science 4653, pp. 761-771. (10.1007/978-3-540-74469-6_74)
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Expectation-based quality of service assessment. International Journal on Digital Libraries 6(3), pp. 260-269. (10.1007/s00799-006-0004-3)
- Stockreisser, P. J., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Supporting QoS monitoring in virtual organisations. Lecture Notes in Computer Science 4294, pp. 447-452. (10.1007/11948148_38)
- Shercliff, G., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. QoS assessment of providers with complex behaviours: An expectation-based approach with confidence. Lecture Notes in Computer Science 4294, pp. 378-389. (10.1007/11948148_31)
- Preece, A. D. et al. 2005. Managing Virtual Organisations on the Grid using agent technology. AgentLink News 17, pp. 14-17.
- Patel, J. et al. 2005. Agent-based virtual organisations for the Grid. Multiagent and Grid Systems - Smart Grid Technologies & Market Models 1(4), pp. 237-249.
- Fu, G., Shao, J., Embury, S. M. and Gray, W. A. 2004. Algorithms for analysing related constraint business rules. Data & knowledge engineering 50(2), pp. 215-240. (10.1016/j.datak.2004.01.006)
- Norman, T. J. et al. 2004. Agent-based formation of virtual organisations. Knowledge-based systems 17(2-4), pp. 103-111. (10.1016/j.knosys.2004.03.005)
- Deora, V., Shao, J., Shercliff, G., Stockreisser, P. J., Gray, W. A. and Fiddian, N. J. 2004. Incorporating QoS specifications in service discovery. Lecture Notes in Computer Science 3307, pp. 252-263. (10.1007/978-3-540-30481-4_25)
- Shao, J., Liu, X., Fu, G., Embury, S. M. and Gray, W. A. 2001. Querying Data-Intensive Programs for Data Design. Lecture Notes in Computer Science 2068, pp. 203-218. (10.1007/3-540-45341-5_14)
Conferences
- Davies, J. R. and Shao, J. 2022. Utility of anonymised data in decision tree derivation. Presented at: ICISSP 2022 : 8th International Conference on Information Systems Security and Privacy, 9 - 11 February 2022.
- AlShuhail, A. and Shao, J. 2021. Semantic attack on disassociated transactions. Presented at: 8th International Conference on Information Systems Security and Privacy (ICISSP 2022), Virtual, 9-11 February 2022.
- Xu, Y., Huang, Y. and Shao, J. 2020. Anchoring the value of cryptocurrency. Presented at: IWBOSE 2020: 3rd International Workshop on Blockchain Oriented Software Engineering, London, Canada, 18 February 20202020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE pp. 30-36., (10.1109/IWBOSE50093.2020.9050264)
- Zolkeply, M. S. and Shao, J. 2019. Classifying software issue reports through association mining. Presented at: 34th ACM/SIGAPP Symposium on Applied Computing, Limassol, Cyprus, 8-12 Apr 2019SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. ACM pp. 1860-1863., (10.1145/3297280.3297608)
- Tsaneva, D. and Shao, J. 2018. Assisting investors with collective intelligence. Presented at: International Conference on Data Science, E-learning and Information Systems, Madrid, 01-02 October 2018DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. New York, NY: ACM, (10.1145/3279996.3280030)
- Shao, J. and Beckford, J. 2017. Learning decision trees from anonymized data. Presented at: 8th Annual International Conf on ICT: Big Data, Cloud and Security, Singapore, 21-22 August 2017.
- Shao, J. and Ong, H. 2016. Semantic attack on anonymised transactions. Presented at: FDSE 2014: 1st International Conference on Future Data and Security Engineering 2014, Ho Chi Minh City, Vietnam, 19-21 November 2014 Presented at Hameurlain, A. et al. eds.Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII: Selected Papers from FDSE 2014, Vol. 9480. Lecture Notes in Computer Science Springer pp. 75-99., (10.1007/978-3-662-49175-1_4)
- Memon, N. and Shao, J. 2015. MR-RBAT: Anonymizing large transaction datasets using MapReduce. Presented at: Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015, Fairfax, VA, USA, 13-15 July 2015.
- Memon, N., Loukides, G. and Shao, J. 2015. A parallel method for scalable anonymization of transaction data. Presented at: 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015, Limassol, Cyprus, 29 June - 2 July 20152015 14th International Symposium on Parallel and Distributed Computing (ISPDC). IEEE pp. 235-241., (10.1109/ISPDC.2015.34)
- Ong, H. and Shao, J. 2015. De-anonymising set-generalised transactions based on semantic relationships. Presented at: Future Data and Security Engineering - First International Conference, FDSE 2014, Ho Chi Minh City, Vietnam, 19-21 November, 2014.
- Tziatzios, A., Shao, J. and Loukides, G. 2011. A heuristic method for deriving range-based classification rules. Presented at: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Shanghai, China, 26-28 July 2011 Presented at Ding, Y. et al. eds.Proceedings: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), Vol. 2. Los Alamitos, CA: IEEE pp. 925-929., (10.1109/FSKD.2011.6019723)
- Al-Dossari, H., Shao, J. and Preece, A. D. 2010. QoS assessment over multiple attributes. Presented at: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT), Bradford, UK2010 IEEE 10th International Conference on Computer and Information Technology (CIT). pp. 1456-1461., (10.1109/CIT.2010.260)
- Al-Dossari, H., Shao, J. and Preece, A. D. 2010. Handling asynchronous data in assessing QoS over multiple attributes. Presented at: IEEE International Conference on Service-Oriented Computing and Applications, Perth, Australia, 13-15 December 2010IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2010 Perth, WA, 13-15 Dec. 2010. Piscataway, NJ: IEEE, (10.1109/SOCA.2010.5707145)
- Loukides, G., Gkoulalas-Divanis, A. and Shao, J. 2010. Anonymizing transaction data to eliminate sensitive inferences. Presented at: DEXA 2010: International Conference on Database and Expert Systems Applications, Bilbao, Spain, 30 August - 3 September 2010 Presented at Garcia Bringas, P., Hameurlain, A. and Quirchmayr, G. eds.Database and Expert Systems Applications: 21st International Conference, DEXA 2010, Bilbao, Spain, August 30 - September 3, 2010, Proceedings, Part I, Vol. 6261. Springer Verlag pp. 400-415., (10.1007/978-3-642-15364-8_34)
- Loukidis, G. and Shao, J. 2007. Capturing Data Usefulness and Privacy Protection in K-Anonymisation. Presented at: Proceedings of the 2007 ACM Symposium on Applied Computing. pp. 370-374., (10.1145/1244002.1244091)
- Loukides, G. and Shao, J. 2007. Greedy clustering with sample-based heuristics for k-anonymisation. Presented at: The First International Symposium on Data, Privacy, and E-Commerce, 2007, Chengdu, Sichuan, 1-3 November 2007Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, 2007. Los Alamitos, CA: IEEE pp. 191-196., (10.1109/ISDPE.2007.102)
- Loukides, G. and Shao, J. 2007. Capturing data usefulness and privacy protection in K-anonymisation. Presented at: 22nd Annual ACM Symposium on Applied Computing, Seoul, Korea, 11-15 March 2007SAC '07 Proceedings of the 2007 ACM Symposium on Applied Computing. New York, NY: ACM pp. 370-374., (10.1145/1244002.1244091)
- Shercliff, G., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. A multiple quality-space mapping approach to QoS assessment. Presented at: IEEE International Conference on Computer and Information Technology - CIT 2006, Seoul, South Korea, 20-22 September 2006 Presented at Jeong, C. ed.Proceedings of CIT 2006. Los Alamitos, CA: IEEE pp. 26., (10.1109/CIT.2006.15)
- Loukides, G. and Shao, J. 2006. Towards balancing data usefulness and privacy protection in K-anonymisation. Presented at: The Sixth IEEE International Conference on Computer and Information Technology (CIT 2006), Seoul, South Korea, 20-22 September 2006 Presented at Jeong, C. ed.Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT 2006). Los Alamitos, CA: IEEE pp. 15., (10.1109/CIT.2006.184)
- Loukides, G. and Shao, J. 2006. Query-driven data anonymisation. Presented at: 23rd British National Conference on Databases - BNCOD 2006, PhD Forum, Belfast, Northern Ireland, 17-20 July 2006.
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Supporting QoS based selection in service oriented architecture. Presented at: 2nd International Conference on Next-Generation Web Services Practices, Seoul, Korea, 25-28 September 2006 Presented at Abraham, A. and Han, S. Y. eds.Proceedings of the International Conference on Next-Generation Web Services Practices. Los Alamitos, CA: IEEE Computer Society pp. 117-126., (10.1109/NWESP.2006.29)
- Deora, V., Shao, J., Gray, W. A. and Fiddian, N. J. 2006. Modelling quality of service in service oriented computing. Presented at: Second IEEE International Symposium on Service-Oriented System Engineering, Shanghai, China, 25-26 October 2006 Presented at Chi, C., Bastani, F. and Xue, X. eds.Second IEEE International Symposium on Service-Oriented System Engineering : SOSE 2006 : proceedings. Los Alamitos, CA: IEEE Computer Society pp. 95-101., (10.1109/SOSE.2006.22)
- Shao, J., Ibrahim, Y. and Embury, S. M. 2005. An approach to tracking data derivation in information systems. Presented at: Fifth International Conference on Computer and Information Technology, 2005. CIT 2005, Shanghai, China, 21-23 September 2005 Presented at Gu, N. et al. eds.Proceedings of the Fifth International Conference on Computer and Information Technology, 2005. CIT 2005. Los Alamitos, CA: IEEE pp. 65-69., (10.1109/CIT.2005.63)
- Patel, J. et al. 2005. Agent-based virtual organisations for the Grid. Presented at: AAMAS '05 - Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, Utrecht, Netherlands, July 25-29 2005, Utrecht, Netherlands, 25-29 July 2005AAMAS '05 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. pp. 1151-1152., (10.1145/1082473.1082668)
- Patel, J. et al. 2005. Monitoring, policing and trust for gridbBased virtual organisations. Presented at: UK e-Science All Hands Meeting 2005, Nottingham, UK, 19-22 September 2005Proceedings of the UK e-Science All Hands Meeting 2005. EPSRC pp. 891-898.
- Norman, T. J. et al. 2004. CONOISE: Agent-based formation of virtual organisations. Presented at: 23rd SGAI International Conference on Innovative Techniques and Applications of AI (AI-2003), Cambridge, UK, 15-17 December 2003 Presented at Coenen, F., Preece, A. D. and Macintosh, A. eds.Research and Development in Intelligent Systems XX : Proceedings of AI2003, the Twenty-Third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence /. BCS Conference Series London: Springer pp. 353-366.
- Shao, J. et al. 2004. Supporting formation and operation of virtual organisations in a grid environment. Presented at: UK e-Science All Hands Meeting 2004 (AHM2004), Nottingham, UK, 31 August – 3 September 2004 Presented at Cox, S. J. ed.Proceedings of the UK e-Science All Hands Meeting 2004. The Engineering and Physical Sciences Research Council (EPSRC) pp. 376-383.
- Willmor, D., Embury, S. M. and Shao, J. 2004. Program slicing in the presence of database state. Presented at: 20th International Conference on Software Maintenance, Chicago, IL, USA, 11-17 September 2004ICSM 2004: 20th IEEE International Conference on Software Maintenance : proceedings. Los Alamitos, CA: IEEE Computer Society pp. 448-452., (10.1109/ICSM.2004.1357833)
- Fu, G., Shao, J., Embury, S. M., Gray, W. A. and Liu, X. 2001. A framework for business rule presentation. Presented at: 12th International Workshop on Database and Expert Systems Applications, Munich, Germany, 3-7 September 2001Proceedings of the 12th International Workshop on Database and Expert Systems Applications, 2001.. IEEE pp. 922-926., (10.1109/DEXA.2001.953173)
Research
My research interest is broadly in the area of data management and analysis. This includes data mining (discovering patterns of interest from data), business rule extraction (recovering data semantics and design knowledge buried in legacy information systems), quality of service data analysis (establishing service quality in a service oriented computing environment through the analysis of historical QoS data), and privacy protection (protecting private and identity information contained in datasets).