Dr Shao Shao
Teams and roles for Shao Shao
Honorary Senior Lecturer
Overview
I am a member of the Data and Knowledge Engineering research group within the School. My research interest is broadly in the area of data analysis including more recently privacy protection, and I welcome the opportunity to work with PhD students and industrial partners to develop privacy protection solutions.
Publication
2023
- AlShuhail, A. and Shao, J. 2023. Semantic attack on disassociated transaction data. Springer Nature 4 344. (10.1007/s42979-023-01781-6)
- Xu, Y. et al., 2023. MWPoW+: a strong consensus protocol for intra-shard consensus in blockchain sharding. ACM Transactions on Internet Technology 23 (2) 34. (10.1145/3584020)
2022
- Alsulami, A. and Shao, J. 2022. Extracting attributes for twitter hashtag communities. International Journal of Humanities and Social Sciences 16 (3), pp.171-178.
- Davies, J. R. and Shao, J. 2022. Utility of anonymised data in decision tree derivation. Presented at: ICISSP 2022 : 8th International Conference on Information Systems Security and Privacy 9 - 11 February 2022.
2021
- AlShuhail, A. and Shao, J. 2021. Semantic attack on disassociated transactions. Presented at: 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) Virtual 9-11 February 2022.
2020
- Xu, Y. et al. 2020. A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurrency and Computation: Practice and Experience 32 (19) e5773. (10.1002/cpe.5773)
- Xu, Y. , Huang, Y. and Shao, J. 2020. Anchoring the value of cryptocurrency. Presented at: IWBOSE 2020: 3rd International Workshop on Blockchain Oriented Software Engineering London, Canada 18 February 2020. 2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE. , pp.30-36. (10.1109/IWBOSE50093.2020.9050264)
2019
- Zolkeply, M. S. and Shao, J. 2019. Classifying software issue reports through association mining. Presented at: 34th ACM/SIGAPP Symposium on Applied Computing Limassol, Cyprus 8-12 Apr 2019. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. ACM. , pp.1860-1863. (10.1145/3297280.3297608)
2018
- Shao, J. and Tziatzios, A. 2018. Mining range associations for classification and characterization. Data and Knowledge Engineering 118 , pp.92-106. (10.1016/j.datak.2018.10.001)
- Tsaneva, D. and Shao, J. 2018. Assisting investors with collective intelligence. Presented at: International Conference on Data Science, E-learning and Information Systems Madrid 01-02 October 2018. DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. New York, NY: ACM. (10.1145/3279996.3280030)
2017
- Shao, J. and Beckford, J. 2017. Learning decision trees from anonymized data. Presented at: 8th Annual International Conf on ICT: Big Data, Cloud and Security Singapore 21-22 August 2017.
- Shao, J. and Ong, H. 2017. Exploiting contextual information in attacking set-generalized transactions. ACM Transactions on Internet Technology 17 (4) 40. (10.1145/3106165)
2016
- Shao, J. and Ong, H. 2016. Semantic attack on anonymised transactions. Presented at: FDSE 2014: 1st International Conference on Future Data and Security Engineering 2014 Ho Chi Minh City, Vietnam 19-21 November 2014. Published in: Hameurlain, A. et al., Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII: Selected Papers from FDSE 2014. Vol. 9480.Lecture Notes in Computer Science Springer. , pp.75-99. (10.1007/978-3-662-49175-1_4)
2015
- Memon, N. , Loukides, G. and Shao, J. 2015. A parallel method for scalable anonymization of transaction data. Presented at: 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015 Limassol, Cyprus 29 June - 2 July 2015. 2015 14th International Symposium on Parallel and Distributed Computing (ISPDC). IEEE. , pp.235-241. (10.1109/ISPDC.2015.34)
- Memon, N. and Shao, J. 2015. MR-RBAT: Anonymizing large transaction datasets using MapReduce. Presented at: Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015 Fairfax, VA, USA 13-15 July 2015.
- Ong, H. and Shao, J. 2015. De-anonymising set-generalised transactions based on semantic relationships. Presented at: Future Data and Security Engineering - First International Conference, FDSE 2014 Ho Chi Minh City, Vietnam 19-21 November, 2014.
2013
- Loukides, G. , Gkoulalas-Divanis, A. and Shao, J. 2013. Efficient and flexible anonymization of transaction data. Knowledge and Information Systems 36 (1), pp.153-210. (10.1007/s10115-012-0544-3)
2012
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2012. Improving QoS assessment over multiple attributes with asynchronous data. Computer Systems Science and Engineering 27 (2), pp.133-147.
2011
- Loukides, G. and Shao, J. 2011. Preventing range disclosure in k-anonymised data. Expert Systems with Applications 38 (4), pp.4559-4574. (10.1016/j.eswa.2010.09.130)
- Tziatzios, A. , Shao, J. and Loukides, G. 2011. A heuristic method for deriving range-based classification rules. Presented at: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) Shanghai, China 26-28 July 2011. Published in: Ding, Y. et al., Proceedings: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). Vol. 2.Los Alamitos, CA: IEEE. , pp.925-929. (10.1109/FSKD.2011.6019723)
2010
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2010. Handling asynchronous data in assessing QoS over multiple attributes. Presented at: IEEE International Conference on Service-Oriented Computing and Applications Perth, Australia 13-15 December 2010. IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2010 Perth, WA, 13-15 Dec. 2010. Piscataway, NJ: IEEE(10.1109/SOCA.2010.5707145)
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2010. QoS assessment over multiple attributes. Presented at: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT) Bradford, UK2010 IEEE 10th International Conference on Computer and Information Technology (CIT). , pp.1456-1461. (10.1109/CIT.2010.260)
- Loukides, G. , Gkoulalas-Divanis, A. and Shao, J. 2010. Anonymizing transaction data to eliminate sensitive inferences. Presented at: DEXA 2010: International Conference on Database and Expert Systems Applications Bilbao, Spain 30 August - 3 September 2010. Published in: Garcia Bringas, P. , Hameurlain, A. and Quirchmayr, G. eds. Database and Expert Systems Applications: 21st International Conference, DEXA 2010, Bilbao, Spain, August 30 - September 3, 2010, Proceedings, Part I. Vol. 6261.Springer Verlag. , pp.400-415. (10.1007/978-3-642-15364-8_34)
2009
- Loukides, G. , Tziatzios, A. and Shao, J. 2009. Towards preference-constrained k-anonymisation. Lecture Notes in Computer Science 5667 , pp.231-245. (10.1007/978-3-642-04205-8_20)
2008
- Loukides, G. and Shao, J. 2008. An efficient clustering algorithm for k-anonymisation. Journal of Computer Science and Technology 23 (2), pp.188-202. (10.1007/s11390-008-9121-3)
2007
- Loukides, G. and Shao, J. 2007. Clustering-based K-anonymisation algorithms. Lecture Notes in Computer Science 4653 , pp.761-771. (10.1007/978-3-540-74469-6_74)
- Loukides, G. and Shao, J. 2007. Greedy clustering with sample-based heuristics for k-anonymisation. Presented at: The First International Symposium on Data, Privacy, and E-Commerce, 2007 Chengdu, Sichuan 1-3 November 2007. Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, 2007. Los Alamitos, CA: IEEE. , pp.191-196. (10.1109/ISDPE.2007.102)
- Loukides, G. and Shao, J. 2007. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. Lecture Notes in Computer Science 4587 , pp.203-214. (10.1007/978-3-540-73390-4_23)
- Loukidis, G. and Shao, J. 2007. Capturing data usefulness and privacy protection in K-anonymisation. Presented at: Proceedings of the 2007 ACM Symposium on Applied Computing Seoul, South Korea 11-15 March 2007. SAC '07 Proceedings of the 2007 ACM Symposium on Applied Computing. New York, NY: ACM. , pp.370-374. (10.1145/1244002.1244091)
- Smith, R. and Shao, J. 2007. Privacy and e-Commerce: a Consumer-Centric Perspective. Electronic Commerce Research 7 (2), pp.89-116. (10.1007/s10660-007-9002-9)
2006
- Deora, V. et al. 2006. Expectation-based quality of service assessment. International Journal on Digital Libraries 6 (3), pp.260-269. (10.1007/s00799-006-0004-3)
- Deora, V. et al. 2006. Modelling quality of service in service oriented computing. Presented at: Second IEEE International Symposium on Service-Oriented System Engineering Shanghai, China 25-26 October 2006. Published in: Chi, C. , Bastani, F. and Xue, X. eds. Second IEEE International Symposium on Service-Oriented System Engineering : SOSE 2006 : proceedings. Los Alamitos, CA: IEEE Computer Society. , pp.95-101. (10.1109/SOSE.2006.22)
- Deora, V. et al. 2006. Supporting QoS based selection in service oriented architecture. Presented at: 2nd International Conference on Next-Generation Web Services Practices Seoul, Korea 25-28 September 2006. Published in: Abraham, A. and Han, S. Y. eds. Proceedings of the International Conference on Next-Generation Web Services Practices. Los Alamitos, CA: IEEE Computer Society. , pp.117-126. (10.1109/NWESP.2006.29)
- Loukides, G. and Shao, J. 2006. Query-driven data anonymisation. Presented at: 23rd British National Conference on Databases - BNCOD 2006, PhD Forum Belfast, Northern Ireland 17-20 July 2006.
- Loukides, G. and Shao, J. 2006. Towards balancing data usefulness and privacy protection in K-anonymisation. Presented at: The Sixth IEEE International Conference on Computer and Information Technology (CIT 2006) Seoul, South Korea 20-22 September 2006. Published in: Jeong, C. ed. Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT 2006). Los Alamitos, CA: IEEE. , pp.15. (10.1109/CIT.2006.184)
- Shercliff, G. et al. 2006. A multiple quality-space mapping approach to QoS assessment. Presented at: IEEE International Conference on Computer and Information Technology - CIT 2006 Seoul, South Korea 20-22 September 2006. Published in: Jeong, C. ed. Proceedings of CIT 2006. Los Alamitos, CA: IEEE. , pp.26. (10.1109/CIT.2006.15)
- Shercliff, G. et al., 2006. QoS assessment of providers with complex behaviours: An expectation-based approach with confidence. Lecture Notes in Computer Science 4294 , pp.378-389. (10.1007/11948148_31)
- Stockreisser, P. J. et al., 2006. Supporting QoS monitoring in virtual organisations. Lecture Notes in Computer Science 4294 , pp.447-452. (10.1007/11948148_38)
2005
- Patel, J. et al., 2005. Agent-based virtual organisations for the Grid. Presented at: AAMAS '05 - Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, Utrecht, Netherlands, July 25-29 2005 Utrecht, Netherlands 25-29 July 2005. AAMAS '05 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. , pp.1151-1152. (10.1145/1082473.1082668)
- Patel, J. et al., 2005. Monitoring, policing and trust for gridbBased virtual organisations. Presented at: UK e-Science All Hands Meeting 2005 Nottingham, UK 19-22 September 2005. Proceedings of the UK e-Science All Hands Meeting 2005. EPSRC. , pp.891-898.
- Patel, J. et al., 2005. Agent-based virtual organisations for the Grid. Multiagent and Grid Systems - Smart Grid Technologies & Market Models 1 (4), pp.237-249.
- Preece, A. D. et al. 2005. Managing Virtual Organisations on the Grid using agent technology. AgentLink News 17 , pp.14-17.
- Shao, J. , Ibrahim, Y. and Embury, S. M. 2005. An approach to tracking data derivation in information systems. Presented at: Fifth International Conference on Computer and Information Technology, 2005. CIT 2005 Shanghai, China 21-23 September 2005. Published in: Gu, N. et al., Proceedings of the Fifth International Conference on Computer and Information Technology, 2005. CIT 2005. Los Alamitos, CA: IEEE. , pp.65-69. (10.1109/CIT.2005.63)
2004
- Deora, V. et al. 2004. Incorporating QoS specifications in service discovery. Lecture Notes in Computer Science 3307 , pp.252-263. (10.1007/978-3-540-30481-4_25)
- Fu, G. et al. 2004. Algorithms for analysing related constraint business rules. Data & knowledge engineering 50 (2), pp.215-240. (10.1016/j.datak.2004.01.006)
- Norman, T. J. et al., 2004. CONOISE: Agent-based formation of virtual organisations. Presented at: 23rd SGAI International Conference on Innovative Techniques and Applications of AI (AI-2003) Cambridge, UK 15-17 December 2003. Published in: Coenen, F. , Preece, A. D. and Macintosh, A. eds. Research and Development in Intelligent Systems XX : Proceedings of AI2003, the Twenty-Third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence /. BCS Conference Series London: Springer. , pp.353-366.
- Norman, T. J. et al., 2004. Agent-based formation of virtual organisations. Knowledge-based systems 17 (2-4), pp.103-111. (10.1016/j.knosys.2004.03.005)
- Shao, J. et al. 2004. Supporting formation and operation of virtual organisations in a grid environment. Presented at: UK e-Science All Hands Meeting 2004 (AHM2004) Nottingham, UK 31 August – 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the UK e-Science All Hands Meeting 2004. The Engineering and Physical Sciences Research Council (EPSRC). , pp.376-383.
- Willmor, D. , Embury, S. M. and Shao, J. 2004. Program slicing in the presence of database state. Presented at: 20th International Conference on Software Maintenance Chicago, IL, USA 11-17 September 2004. ICSM 2004: 20th IEEE International Conference on Software Maintenance : proceedings. Los Alamitos, CA: IEEE Computer Society. , pp.448-452. (10.1109/ICSM.2004.1357833)
2001
- Fu, G. et al. 2001. A framework for business rule presentation. Presented at: 12th International Workshop on Database and Expert Systems Applications Munich, Germany 3-7 September 2001. Proceedings of the 12th International Workshop on Database and Expert Systems Applications, 2001.. IEEE. , pp.922-926. (10.1109/DEXA.2001.953173)
- Shao, J. et al. 2001. Querying Data-Intensive Programs for Data Design. Lecture Notes in Computer Science 2068 , pp.203-218. (10.1007/3-540-45341-5_14)
Articles
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2012. Improving QoS assessment over multiple attributes with asynchronous data. Computer Systems Science and Engineering 27 (2), pp.133-147.
- AlShuhail, A. and Shao, J. 2023. Semantic attack on disassociated transaction data. Springer Nature 4 344. (10.1007/s42979-023-01781-6)
- Alsulami, A. and Shao, J. 2022. Extracting attributes for twitter hashtag communities. International Journal of Humanities and Social Sciences 16 (3), pp.171-178.
- Deora, V. et al. 2006. Expectation-based quality of service assessment. International Journal on Digital Libraries 6 (3), pp.260-269. (10.1007/s00799-006-0004-3)
- Deora, V. et al. 2004. Incorporating QoS specifications in service discovery. Lecture Notes in Computer Science 3307 , pp.252-263. (10.1007/978-3-540-30481-4_25)
- Fu, G. et al. 2004. Algorithms for analysing related constraint business rules. Data & knowledge engineering 50 (2), pp.215-240. (10.1016/j.datak.2004.01.006)
- Loukides, G. , Gkoulalas-Divanis, A. and Shao, J. 2013. Efficient and flexible anonymization of transaction data. Knowledge and Information Systems 36 (1), pp.153-210. (10.1007/s10115-012-0544-3)
- Loukides, G. and Shao, J. 2008. An efficient clustering algorithm for k-anonymisation. Journal of Computer Science and Technology 23 (2), pp.188-202. (10.1007/s11390-008-9121-3)
- Loukides, G. and Shao, J. 2007. Clustering-based K-anonymisation algorithms. Lecture Notes in Computer Science 4653 , pp.761-771. (10.1007/978-3-540-74469-6_74)
- Loukides, G. and Shao, J. 2011. Preventing range disclosure in k-anonymised data. Expert Systems with Applications 38 (4), pp.4559-4574. (10.1016/j.eswa.2010.09.130)
- Loukides, G. and Shao, J. 2007. Speeding up clustering-based k-anonymisation algorithms with pre-partitioning. Lecture Notes in Computer Science 4587 , pp.203-214. (10.1007/978-3-540-73390-4_23)
- Loukides, G. , Tziatzios, A. and Shao, J. 2009. Towards preference-constrained k-anonymisation. Lecture Notes in Computer Science 5667 , pp.231-245. (10.1007/978-3-642-04205-8_20)
- Norman, T. J. et al., 2004. Agent-based formation of virtual organisations. Knowledge-based systems 17 (2-4), pp.103-111. (10.1016/j.knosys.2004.03.005)
- Patel, J. et al., 2005. Agent-based virtual organisations for the Grid. Multiagent and Grid Systems - Smart Grid Technologies & Market Models 1 (4), pp.237-249.
- Preece, A. D. et al. 2005. Managing Virtual Organisations on the Grid using agent technology. AgentLink News 17 , pp.14-17.
- Shao, J. et al. 2001. Querying Data-Intensive Programs for Data Design. Lecture Notes in Computer Science 2068 , pp.203-218. (10.1007/3-540-45341-5_14)
- Shao, J. and Ong, H. 2017. Exploiting contextual information in attacking set-generalized transactions. ACM Transactions on Internet Technology 17 (4) 40. (10.1145/3106165)
- Shao, J. and Tziatzios, A. 2018. Mining range associations for classification and characterization. Data and Knowledge Engineering 118 , pp.92-106. (10.1016/j.datak.2018.10.001)
- Shercliff, G. et al., 2006. QoS assessment of providers with complex behaviours: An expectation-based approach with confidence. Lecture Notes in Computer Science 4294 , pp.378-389. (10.1007/11948148_31)
- Smith, R. and Shao, J. 2007. Privacy and e-Commerce: a Consumer-Centric Perspective. Electronic Commerce Research 7 (2), pp.89-116. (10.1007/s10660-007-9002-9)
- Stockreisser, P. J. et al., 2006. Supporting QoS monitoring in virtual organisations. Lecture Notes in Computer Science 4294 , pp.447-452. (10.1007/11948148_38)
- Xu, Y. et al. 2020. A flexible n/2 adversary node resistant and halting recoverable blockchain sharding protocol. Concurrency and Computation: Practice and Experience 32 (19) e5773. (10.1002/cpe.5773)
- Xu, Y. et al., 2023. MWPoW+: a strong consensus protocol for intra-shard consensus in blockchain sharding. ACM Transactions on Internet Technology 23 (2) 34. (10.1145/3584020)
Conferences
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2010. Handling asynchronous data in assessing QoS over multiple attributes. Presented at: IEEE International Conference on Service-Oriented Computing and Applications Perth, Australia 13-15 December 2010. IEEE International Conference on Service-Oriented Computing and Applications (SOCA) 2010 Perth, WA, 13-15 Dec. 2010. Piscataway, NJ: IEEE(10.1109/SOCA.2010.5707145)
- Al-Dossari, H. , Shao, J. and Preece, A. D. 2010. QoS assessment over multiple attributes. Presented at: 2010 IEEE 10th International Conference on Computer and Information Technology (CIT) Bradford, UK2010 IEEE 10th International Conference on Computer and Information Technology (CIT). , pp.1456-1461. (10.1109/CIT.2010.260)
- AlShuhail, A. and Shao, J. 2021. Semantic attack on disassociated transactions. Presented at: 8th International Conference on Information Systems Security and Privacy (ICISSP 2022) Virtual 9-11 February 2022.
- Davies, J. R. and Shao, J. 2022. Utility of anonymised data in decision tree derivation. Presented at: ICISSP 2022 : 8th International Conference on Information Systems Security and Privacy 9 - 11 February 2022.
- Deora, V. et al. 2006. Modelling quality of service in service oriented computing. Presented at: Second IEEE International Symposium on Service-Oriented System Engineering Shanghai, China 25-26 October 2006. Published in: Chi, C. , Bastani, F. and Xue, X. eds. Second IEEE International Symposium on Service-Oriented System Engineering : SOSE 2006 : proceedings. Los Alamitos, CA: IEEE Computer Society. , pp.95-101. (10.1109/SOSE.2006.22)
- Deora, V. et al. 2006. Supporting QoS based selection in service oriented architecture. Presented at: 2nd International Conference on Next-Generation Web Services Practices Seoul, Korea 25-28 September 2006. Published in: Abraham, A. and Han, S. Y. eds. Proceedings of the International Conference on Next-Generation Web Services Practices. Los Alamitos, CA: IEEE Computer Society. , pp.117-126. (10.1109/NWESP.2006.29)
- Fu, G. et al. 2001. A framework for business rule presentation. Presented at: 12th International Workshop on Database and Expert Systems Applications Munich, Germany 3-7 September 2001. Proceedings of the 12th International Workshop on Database and Expert Systems Applications, 2001.. IEEE. , pp.922-926. (10.1109/DEXA.2001.953173)
- Loukides, G. , Gkoulalas-Divanis, A. and Shao, J. 2010. Anonymizing transaction data to eliminate sensitive inferences. Presented at: DEXA 2010: International Conference on Database and Expert Systems Applications Bilbao, Spain 30 August - 3 September 2010. Published in: Garcia Bringas, P. , Hameurlain, A. and Quirchmayr, G. eds. Database and Expert Systems Applications: 21st International Conference, DEXA 2010, Bilbao, Spain, August 30 - September 3, 2010, Proceedings, Part I. Vol. 6261.Springer Verlag. , pp.400-415. (10.1007/978-3-642-15364-8_34)
- Loukides, G. and Shao, J. 2007. Greedy clustering with sample-based heuristics for k-anonymisation. Presented at: The First International Symposium on Data, Privacy, and E-Commerce, 2007 Chengdu, Sichuan 1-3 November 2007. Proceedings of the First International Symposium on Data, Privacy, and E-Commerce, 2007. Los Alamitos, CA: IEEE. , pp.191-196. (10.1109/ISDPE.2007.102)
- Loukides, G. and Shao, J. 2006. Query-driven data anonymisation. Presented at: 23rd British National Conference on Databases - BNCOD 2006, PhD Forum Belfast, Northern Ireland 17-20 July 2006.
- Loukides, G. and Shao, J. 2006. Towards balancing data usefulness and privacy protection in K-anonymisation. Presented at: The Sixth IEEE International Conference on Computer and Information Technology (CIT 2006) Seoul, South Korea 20-22 September 2006. Published in: Jeong, C. ed. Proceedings of the Sixth IEEE International Conference on Computer and Information Technology (CIT 2006). Los Alamitos, CA: IEEE. , pp.15. (10.1109/CIT.2006.184)
- Loukidis, G. and Shao, J. 2007. Capturing data usefulness and privacy protection in K-anonymisation. Presented at: Proceedings of the 2007 ACM Symposium on Applied Computing Seoul, South Korea 11-15 March 2007. SAC '07 Proceedings of the 2007 ACM Symposium on Applied Computing. New York, NY: ACM. , pp.370-374. (10.1145/1244002.1244091)
- Memon, N. , Loukides, G. and Shao, J. 2015. A parallel method for scalable anonymization of transaction data. Presented at: 14th International Symposium on Parallel and Distributed Computing, ISPDC 2015 Limassol, Cyprus 29 June - 2 July 2015. 2015 14th International Symposium on Parallel and Distributed Computing (ISPDC). IEEE. , pp.235-241. (10.1109/ISPDC.2015.34)
- Memon, N. and Shao, J. 2015. MR-RBAT: Anonymizing large transaction datasets using MapReduce. Presented at: Data and Applications Security and Privacy XXIX - 29th Annual IFIP WG 11.3 Working Conference, DBSec 2015 Fairfax, VA, USA 13-15 July 2015.
- Norman, T. J. et al., 2004. CONOISE: Agent-based formation of virtual organisations. Presented at: 23rd SGAI International Conference on Innovative Techniques and Applications of AI (AI-2003) Cambridge, UK 15-17 December 2003. Published in: Coenen, F. , Preece, A. D. and Macintosh, A. eds. Research and Development in Intelligent Systems XX : Proceedings of AI2003, the Twenty-Third SGAI International Conference on Innovative Techniques and Applications of Artificial Intelligence /. BCS Conference Series London: Springer. , pp.353-366.
- Ong, H. and Shao, J. 2015. De-anonymising set-generalised transactions based on semantic relationships. Presented at: Future Data and Security Engineering - First International Conference, FDSE 2014 Ho Chi Minh City, Vietnam 19-21 November, 2014.
- Patel, J. et al., 2005. Agent-based virtual organisations for the Grid. Presented at: AAMAS '05 - Fourth International Joint Conference on Autonomous Agents and Multiagent Systems, Utrecht, Netherlands, July 25-29 2005 Utrecht, Netherlands 25-29 July 2005. AAMAS '05 Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems. , pp.1151-1152. (10.1145/1082473.1082668)
- Patel, J. et al., 2005. Monitoring, policing and trust for gridbBased virtual organisations. Presented at: UK e-Science All Hands Meeting 2005 Nottingham, UK 19-22 September 2005. Proceedings of the UK e-Science All Hands Meeting 2005. EPSRC. , pp.891-898.
- Shao, J. and Beckford, J. 2017. Learning decision trees from anonymized data. Presented at: 8th Annual International Conf on ICT: Big Data, Cloud and Security Singapore 21-22 August 2017.
- Shao, J. et al. 2004. Supporting formation and operation of virtual organisations in a grid environment. Presented at: UK e-Science All Hands Meeting 2004 (AHM2004) Nottingham, UK 31 August – 3 September 2004. Published in: Cox, S. J. ed. Proceedings of the UK e-Science All Hands Meeting 2004. The Engineering and Physical Sciences Research Council (EPSRC). , pp.376-383.
- Shao, J. , Ibrahim, Y. and Embury, S. M. 2005. An approach to tracking data derivation in information systems. Presented at: Fifth International Conference on Computer and Information Technology, 2005. CIT 2005 Shanghai, China 21-23 September 2005. Published in: Gu, N. et al., Proceedings of the Fifth International Conference on Computer and Information Technology, 2005. CIT 2005. Los Alamitos, CA: IEEE. , pp.65-69. (10.1109/CIT.2005.63)
- Shao, J. and Ong, H. 2016. Semantic attack on anonymised transactions. Presented at: FDSE 2014: 1st International Conference on Future Data and Security Engineering 2014 Ho Chi Minh City, Vietnam 19-21 November 2014. Published in: Hameurlain, A. et al., Transactions on Large-Scale Data- and Knowledge-Centered Systems XXIII: Selected Papers from FDSE 2014. Vol. 9480.Lecture Notes in Computer Science Springer. , pp.75-99. (10.1007/978-3-662-49175-1_4)
- Shercliff, G. et al. 2006. A multiple quality-space mapping approach to QoS assessment. Presented at: IEEE International Conference on Computer and Information Technology - CIT 2006 Seoul, South Korea 20-22 September 2006. Published in: Jeong, C. ed. Proceedings of CIT 2006. Los Alamitos, CA: IEEE. , pp.26. (10.1109/CIT.2006.15)
- Tsaneva, D. and Shao, J. 2018. Assisting investors with collective intelligence. Presented at: International Conference on Data Science, E-learning and Information Systems Madrid 01-02 October 2018. DATA '18 Proceedings of the First International Conference on Data Science, E-learning and Information Systems. New York, NY: ACM. (10.1145/3279996.3280030)
- Tziatzios, A. , Shao, J. and Loukides, G. 2011. A heuristic method for deriving range-based classification rules. Presented at: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD) Shanghai, China 26-28 July 2011. Published in: Ding, Y. et al., Proceedings: 2011 Eighth International Conference on Fuzzy Systems and Knowledge Discovery (FSKD). Vol. 2.Los Alamitos, CA: IEEE. , pp.925-929. (10.1109/FSKD.2011.6019723)
- Willmor, D. , Embury, S. M. and Shao, J. 2004. Program slicing in the presence of database state. Presented at: 20th International Conference on Software Maintenance Chicago, IL, USA 11-17 September 2004. ICSM 2004: 20th IEEE International Conference on Software Maintenance : proceedings. Los Alamitos, CA: IEEE Computer Society. , pp.448-452. (10.1109/ICSM.2004.1357833)
- Xu, Y. , Huang, Y. and Shao, J. 2020. Anchoring the value of cryptocurrency. Presented at: IWBOSE 2020: 3rd International Workshop on Blockchain Oriented Software Engineering London, Canada 18 February 2020. 2020 IEEE International Workshop on Blockchain Oriented Software Engineering (IWBOSE). IEEE. , pp.30-36. (10.1109/IWBOSE50093.2020.9050264)
- Zolkeply, M. S. and Shao, J. 2019. Classifying software issue reports through association mining. Presented at: 34th ACM/SIGAPP Symposium on Applied Computing Limassol, Cyprus 8-12 Apr 2019. SAC '19 Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing. ACM. , pp.1860-1863. (10.1145/3297280.3297608)
Research
My research interest is broadly in the area of data management and analysis. This includes data mining (discovering patterns of interest from data), business rule extraction (recovering data semantics and design knowledge buried in legacy information systems), quality of service data analysis (establishing service quality in a service oriented computing environment through the analysis of historical QoS data), and privacy protection (protecting private and identity information contained in datasets).