|
[Name]Gang Li |
[Gender] Male |
[Title] Associate Professor (Part-time: Information Management System & E-commerce) |
[Address] School of Information Technology at Deakin University |
[Phone] |
[e-mail]gang.li@deakin.edu.au |
[Date of Birth] |
[Nationality] |
[Professional Experience Years]16 |
Academic Interests |
data mining, machine learning, and business intelligence |
Education Background |
Degree |
Degree |
Degree |
Doctoral |
|
|
Working Experiences |
Institution |
Time |
Deakin University |
2004 to present |
Visiting Experiences |
University |
Time |
|
|
Projects |
Projects Name |
Time |
|
|
Awards and Honors |
Awards |
Time |
|
|
Academic Memberships |
Name of Academic Organization and Position |
Time |
IEEE Data Mining and Big Data Analytics Technical Committee (2017-2018 Vice Chair) |
|
IEEE Enterprise Information Systems Technical Committee |
|
IEEE Enterprise Architecture and Engineering Technical Committee |
|
chair for IEEE Task force on Educational Data Mining |
|
Associate Editor for Decision Support Systems (Elsevier), IEEE Access (IEEE), Journal of Travel Research (Sage), and Information Discovery & Delivery (Emerald), and Human-Centric Computing and Information Sciences (Springer) etc |
|
Editorial Board: Journal of Travel Research (Sage, Editorial Board member),EEE Access (IEEE, Associate Editor), Decision Support Systems (Elsevier, Associate Editor), Interlending & Document Supply (Emerald), Human-Centric Computing and Information Sciences (Springer) |
|
Grant Reviewer: Czech Science Foundation |
|
External Examiner for HDR (PhD/Msc) Thesis: 9 Australian Universities |
|
Reviewer for 18 international journals |
|
Social Service |
Name of the Social Organization |
Time |
|
|
International Conference Presentation |
Conference Name |
Conference Name |
Conference Name |
ICRTAC -DISRUP - TIV INNOVATION 2019 : |
Characterizing the Outlying Feature Set of Groups |
2020 |
HIS 2019 |
Identification of botnet attacks using hybrid machine learning models |
2020 |
IJCNN |
Bias-regularised neural-network metamodelling of insurance portfolio risk |
2020 |
ECAI 2020 |
CIDetector: Semi-supervised method for multi-topic confidential information detection |
2020 |
ESORICS 2020 |
Similarity of binaries across optimization levels and obfuscation |
2020 |
ISCC 2020 |
CES2Vec: a confidentiality-oriented word embedding for confidential information detection |
2020 |
ACSAC '20 |
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark |
2020 |
ICPADS 2020 |
Exploring data correlation between feature pairs for generating constraint-based adversarial examples |
2020 |
KSEM 2019 |
Deep neighbor embedding for evaluation of large portfolios of variable annuities |
2019 |
PRICAI 2019 |
Fast valuation of large portfolios of variable annuities via transfer learning |
2019 |
PRICAI 2019 |
Duo attention with deep learning on tomato yield prediction and factor interpretation |
2019 |
HPCC/SmartCity/DSS 2019 |
A unified malicious documents detection model based on two layers of abstraction |
2019 |
KSEM 2019 |
A two-stage model based on BERT for short fake news detection |
2019 |
ISCC 2019 |
Android malware family classification based on sensitive opcode sequence |
2019 |
CVPR 2019 |
Polynomial represetation for persistence diagram |
2019 |
ICRTAC - DISRUP - TIV INNOVATION 2019 |
Personalized Review Selection |
2019 |
PAKDD 2018 |
Mining human periodic behaviors using mobility intention and relative entropy |
2018 |
KSEM 2018 |
Sentiment embedded semantic space for more accurate sentiment analysis |
2018 |
KSEM 2018 |
Group outlying aspects mining |
2018 |
TrustCom/BigDataSE 2018 |
ALDD: a hybrid traffic-user behavior detection method for application layer DDoS |
2018 |
CIKM 2018 |
Multi-view group anomaly detection |
2018 |
IEEE MASS 2018 |
MRDroid: a multi-act classification model for android malware risk assessment |
2018 |
ENTER2018 |
Automatic hotel photo quality assessment based on visual features |
2018 |
IPCCC 2018 |
URefFlow: a unified android malware detection model based on reflective calls |
2018 |
HPCC/Smart City/DSS 2016 |
WiseFi: activity localization and recognition on commodity off-the-shelf WiFi devices |
2017 |
ICCS 2017 |
Learning robust low-rank approximation for crowdsourcing on Riemannian Manifold |
2017 |
Big Data 2017 |
Differentially private query learning: from data publishing to model publishing |
2017 |
IJCNN 2017 |
NotiFi: a ubiquitous WiFi-based abnormal activity detection system |
2017 |
Trustcom/BigDataSE/ICESS 2017 |
FEPDF: a robust feature extractor for malicious PDF detection |
2017 |
MILCOM 2017 |
WarnFi: non-invasive wifi-based abnormal activity sensing using non-parametric model |
2017 |
ACML 2015 |
Preference relation-based markov random fields 4 |
2017 |
IJCNN 2016 |
Riemannian optimization with subspace tracking for low-rank recovery |
2017 |
IEEE TrustCom/BigDataSE/ISPA 2016 |
WiN: non-invasive abnormal activity detection leveraging fine-grained WiFi signals |
2017 |
ICPADS 2016 |
Opportunistic probe: an efficient adaptive detection model for collaborative intrusion detection |
2017 |
Publications |
Journal |
Article |
Year |
Journal of hospitality marketing and management |
Large scale comparative analyses of hotel photo content posted by managers and customers to review platforms based on deep learning: implications for hospitality marketers |
2021 |
Journal of sustainable tourism |
Improving the resident-tourist relationship in urban hotspots |
2021 |
International journal of intelligent systems |
Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding |
2021 |
Security and Communication Networks, London |
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure |
2021 |
Future generation computer systems |
Differentially private model publishing in cyber physical systems |
2020 |
Future generation computer systems |
Private collaborative filtering under untrusted recommender server |
2020 |
Journal of travel research |
Cross-country analysis of tourist activities based on venue-referenced social media data |
2020 |
International journal of hospitality management |
Evaluation of hotel brand competitiveness based on hotel features ratings |
2020 |
Expert systems with applications |
Multivariable data imputation for the analysis of incomplete credit data |
2020 |
Tourism Management |
Discovering highly profitable travel patterns by high-utility pattern mining |
2020 |
Tourism management perspectives |
Analyzing co-authoring communities of tourism research collaboration |
2020 |
Journal of Hospitality and Tourism Research |
Exploration of Tourist Activities in Urban Destination Using Venue Check-In Data |
2020 |
Expert systems |
Endoscopy report mining for intelligent gastric cancer screening |
2020 |
Expert systems |
A homogeneous ensemble method for predicting gastric cancer based on gastroscopy reports |
2020 |
Journal of Travel & Tourism Marketing, London |
Topic modelling for theme park online reviews: Analysis of Disneyland |
2020 |
Tourism Management |
Racism in tourism reviews |
2020 |
Annals of Tourism Research |
Group pooling for deep tourism demand forecasting |
2020 |
Journal of travel research |
Tourism demand forecasting: a decomposed deep learning approach |
2020 |
International Journal of Intelligent Systems |
Private rank aggregation under local differential privacy |
2020 |
Journal of industrial information integration |
Application of SVR optimized by Modified Simulated Annealing (MSA-SVR) air conditioning load prediction model |
2019 |
Journal of hospitality marketing and management |
Identifying hotel competitiveness based on hotel feature ratings |
2019 |
Journal of travel and tourism marketing |
Tourist behavior analysis in gaming destinations based on venue check-in data |
2019 |
Journal of travel research |
Exploring tourist dining preferences based on restaurant reviews |
2019 |
Current issues in tourism |
Breach of traveller privacy in location-based social media |
2019 |
Annals of tourism research |
Tourism demand forecasting: a deep learning approach |
2019 |
Future generation computer systems |
Malicious documents detection for business process management based on multi-layer abstract model |
2019 |
International journal of recent technology and engineering |
Prediction of Alzheimer's disease using oasis dataset |
2019 |
Tourism management |
Discovering implicit activity preferences in travel itineraries by topic modeling |
2019 |
International journal of hospitality and tourism administration |
Understanding clusters of tourist behavior associations using network analysis |
2019 |
Multimedia tools and applications |
An overview of protection of privacy in multibiometrics |
2018 |
Future generation computer systems |
Answering differentially private queries for continual datasets release |
2018 |
Expert systems with applications |
Context-aware personalized path inference from large-scale GPS snippets |
2018 |
Journal of travel and tourism marketing |
Evaluating museum visitor experiences based on user-generated travel photos |
2018 |
Journal of network and systems management |
A novel approach for information discovery in wireless sensor grids |
2018 |
Journal of travel research |
Travel diaries analysis by sequential rule mining |
2018 |
Information discovery and delivery |
Characters-based sentiment identification method for short and informal Chinese text |
2018 |
Journal of travel research |
Tourist activity analysis by leveraging mobile social media data |
2018 |
Information discovery and delivery |
Lazy collaborative filtering with dynamic neighborhoods |
2018 |
Expert systems with applications |
Feedback-based metric learning for activity recognition |
2018 |
IEEE access |
Domestic violence crisis identification from Facebook posts based on deep learning |
2018 |
Journal of hospitality & tourism research |
Temporal analysis of tourism research collaboration network |
2017 |
Machine learning |
Preference relation-based Markov Random Fields for recommender systems |
2017 |
Frontiers of computer science |
Boosting imbalanced data learning with Wiener process oversampling |
2017 |
IEEE Transactions on Knowledge and Data Engineering |
Differentially private data publishing and analysis: a survey |
2017 |
Knowledge and information systems |
Privacy-preserving topic model for tagging recommender systems |
2016 |
Knowledge and information systems |
A differentially private algorithm for location data release |
2016 |
Journal of network and systems management |
Energy efficient sleep schedule with service coverage guarantee in wireless sensor networks |
2016 |
Computer networks |
Design and evaluation of coordinated in-network caching model for content centric networking |
2016 |
Monograph and Textbook |
Publisher |
Name |
Time |
Cham |
Differential privacy and applications |
2017 |
Routledge handbook of hospitality marketing |
Personalized hotel recommendations based on social networks |
2017 |
|
Applications and techniques in information security: 6th International Conference, ATIS 2016, Cairns, QLD, Australia, October 26-28, 2016, proceedings |
2016 |