Profile Image

Professor Ljiljana Brankovic

Professor

School of Elect Engineering and Computer Science (Computer Science and Software Engineering)

Protecting personal data

With expertise in data security and privacy in data mining, Professor Ljiljana Brankovic has had a long-term interest in the growing problem of protecting an individual's personal data, the threat to individual privacy and how that private information is being 'mined' and used for purposes that the individual may not approve of.

Professor Ljiljana Brankovic with the VCA Vice-Chancellor's Award for Teaching Excellence and Contribution to Student Learning in 2014 capped off a productive year for Brankovic from the School of Electrical Engineering and Computer Science. The award recognises the role of an academic from each faculty for their outstanding and diverse contribution to the quality of student learning, and Brankovic was selected as a Highly Commended Recipient among the faculty winners.

Her research in computation theory and mathematics contributes to a number of different fields but the realm of data security and privacy is one that is increasingly affecting Western society and engenders more and more attention.

With a Bachelor of Engineering (Electrical) from her native Yugoslavia and a PhD from the University of Newcastle, Professor Brankovic has cemented her position in the Faculty with significant research grants and numerous conference invitations, book chapters and journal articles. In addition to her primary research interests in graph theory, graph algorithms and data security, she has also contributed to research being undertaken by the Faculty's Centre for Interdisciplinary Built Environment Research which focuses on the Building Information Modelling environment that facilitates collaboration and information sharing but also introduces new threats to the security of the data it harbours.

A 2012 study into measuring attitudes towards privacy, medical research and consent by Professor Brankovic and her PhD student and colleagues found that while individuals greatly supported medical research, they also had concerns about the privacy of health information, and believed they should be asked for permission before their health information is used for any purpose other than medical treatment. However, the study also revealed that many people are not aware that simply removing their names and other direct identifiers from medical records does not guarantee their health information is protected.

As our awareness of privacy issues increases, so does the use of knowledge discovery and data mining (KDDM) techniques that are concerned primarily with discovering and analysing patterns in data. An interdisciplinary technique, KDDM analysis is underpinned by statistics, machine intelligence, pattern recognition, databases, optimisation, information visualisation and high-performance computing. It is a bit of a 'chicken and egg' situation: as computerisation and networking expand, so does the collection of massive amounts of data; as data grows in scope and size, there is a greater demand for KDDM technologies to suit these 'big data'.

Professor Brankovic, together with her colleague Professor Vladimir Estivill-Castro, was one of the pioneers of privacy preserving data mining in Australia who warned that during the process of data mining from data collection to knowledge discovery, data are exposed to several parties leading to a potential breach of individual privacy. Over the years, together with a team of her PhD students, she has, on one hand, developed various 'noise' addition techniques that protect privacy in data mining while preserving the patterns found in data. On the other hand, she has designed a suite of techniques that carefully restrict access to data to protect privacy while maximising the usability of data. These techniques are based on solid mathematical foundations and have performance guarantees.

In the area of algorithms, Professor Brankovic is collaborating with her German colleague Professor Henning Fernau to develop parameterised approximation algorithms for computationally hard problems, with the addition of privacy. This research is funded by the German Research Foundation and over the next two years Professor Brankovic will spend some months at the University of Trier as a Mercator Fellow.

Professor Ljiljana Brankovic

Protecting personal data

With expertise in data security and privacy in data mining, Professor Ljiljana Brankovic has had a long-term interest in the growing problem of protecting an i

Read more

Career Summary

Biography

Professor Ljiljana Brankovic graduated in Electrical Engineering from The University in Belgrade in 1987. She obtained her PhD in Computer Science from The University of Newcastle in 1998. Her main research interests are graph theory, graph algorithms and data security.

Research Expertise
1) Statistical Disclosure Control
2) Privacy Preserving Data Mining
3) Algorithms and Complexity
4) Graph Theory

Teaching Expertise
Data Security, Algorithms, Complexity Theory

Administrative Expertise
Current: Member of the Academic Senate OSPRO Committee, Faculty of Engineering and Built Environment Industrial Experience Coordinator, Discipline of Computer Science and Software Engineering Promotions Committee, Faculty of Engineering and Built Environment Past: University Promotions Committee 2010-2012 Assistant Dean (Research), Faculty of Engineering and Built Environment, 2011 Assistant Dean (Postgradute), Faculty of Engineering and Built Environment 2005-2007 Head of Discipline, Discipline of Computer Science and Software Engineering 2005-2007 Promotions Committee, Faculty of Engineering and Built Environment 2005-2009

Collaborations
Ljiljana Brankovic has collaborated with over 30 researchers from around the world, most notably with Henning Fernau, Martin Baca, Xuemin Lin, Alex Rosa, Peter Horak, Jozef Siran and Mirka Miller.

Qualifications

  • PhD, University of Newcastle
  • Bachelor of Engineering (Electrical), University of Belgrade - Yugoslavia

Keywords

  • Algorithms
  • Data Security
  • Databases
  • Graph Theory
  • Theory of Computation

Languages

  • Serbian (Fluent)

Fields of Research

Code Description Percentage
080299 Computation Theory and Mathematics not elsewhere classified 45
120199 Architecture not elsewhere classified 15
120299 Building not elsewhere classified 40

Professional Experience

UON Appointment

Title Organisation / Department
Professor University of Newcastle
School of Elect Engineering and Computer Science
Australia

Academic appointment

Dates Title Organisation / Department
Fellow - Institute of Combinatorics and Its Applications Institute of Combinatorics and Its Applications
Canada
1/05/2015 -  Professor University of Newcastle
School of Elect Engineering and Computer Science
Australia
1/01/2007 - 1/01/2010 Chair National Committee for Computer Security, Australian Computer Society
Australia
1/01/2006 - 1/12/2014 Associate Professor University of Newcastle
School of Elect Engineering and Computer Science
Australia
1/07/2000 - 1/12/2005 Senior Lecturer University of Newcastle
School of Elect Engineering and Computer Science
Australia
1/01/1998 - 1/06/2000 Lecturer University of Newcastle
School of Elect Engineering and Computer Science
Australia
1/07/1997 - 1/12/1997 Reaserch Academic University of Newcastle
School of Elect Engineering and Computer Science
Australia

Membership

Dates Title Organisation / Department
Member - Australian Computer Society Australian Computer Society (ACS)
Australia
1/01/2002 -  Life Member - Combinatorial Mathematics Society of Australasia Combinatorial Mathematics Society of Australasia
Australia

Invitations

Participant

Year Title / Rationale
2007 Mathematics of Privacy
Organisation: ICGTIS 2007 Description: Invitation to give an invited talk at ICGTIS 2007, Bandung, West Java, Indonesia on February 10 13 2007; talk not delivered because of travel warning to Indonesia.
2005 Sigma and rho-labellings of graphs
Organisation: IWOGL2005 Description: Invited speaker at IWOGL2005, July 2005, Kosice, Slovakia
2004 Mathematics of Privacy
Organisation: AWOCA2004 Description: Invited speaker at AWOCA2004, July 2004, Ballina.

PhD Examiner

Year Title / Rationale
2006 PhD Thesis by Rohan Cattell
Organisation: The University of Newcastle

Research Masters Examiner

Year Title / Rationale
2007 Candidate: Vivek Mishra
Organisation: University of Ballarat
2007 Candidate: Vivek Mishra
Organisation: University of Ballarat

Speaker

Year Title / Rationale
2004 On The Graceful Tree Conjecture
Organisation: IWOGL2004 Description: Invited speaker at IWOGL2004, December, 2004, Batu, Jawa Timur, Indonesia.
Edit

Publications

For publications that are currently unpublished or in-press, details are shown in italics.


Chapter (4 outputs)

Year Citation Altmetrics Link
2010 Gu N, Singh V, Taylor C, London KA, Brankovic L, 'Bim adoption: Expectations across disciplines', Handbook of Research on Building Information Modeling and Construction Informatics: Concepts and Technologies, Information Science Reference, Hershey, Pennsylvania 501-520 (2010) [B1]
DOI 10.4018/978-1-60566-928-1.ch022
2010 London KA, Singh V, Gu N, Taylor C, Brankovic L, 'Towards the development of a project decision support framework for adoption of an integrated building information model using a model server', Handbook of Research on Building Information Modeling and Construction Informatics: Concepts and Technologies, Information Science Reference, Hershey, Pennsylvania 270-301 (2010) [B1]
DOI 10.4018/978-1-60566-928-1.ch013
2007 Brankovic L, Islam MZ, Giggins HP, 'Privacy-preserving data mining', Security, Privacy and Trust in Modern Data Management, Springer, Berlin 151-165 (2007) [B1]
Co-authors Helen Giggins
2007 Brankovic L, Giggins HP, 'Statistical database security', Security, Privacy and Trust in Modern Data Management, Springer, Berlin 167-181 (2007) [B1]
DOI 10.1007/978-3-540-69861-6_12
Co-authors Helen Giggins
Show 1 more chapter

Journal article (35 outputs)

Year Citation Altmetrics Link
2016 Brankovic L, Iliopoulos CS, Kundu R, Mohamed M, Pissis SP, Vayani F, 'Linear-time superbubble identification algorithm for genome assembly', THEORETICAL COMPUTER SCIENCE, 609 374-383 (2016) [C1]
DOI 10.1016/j.tcs.2015.10.021
Citations Scopus - 2Web of Science - 1
2014 AlMansour AA, Brankovic L, Iliopoulos CS, 'A Model for Recalibrating Credibility in Different Contexts and Languages - A Twitter Case Study', International Journal of Digital Information and Wireless Communications (IJDIWC), 4 53-62 (2014)
2014 Brankovic L, Lopez N, Miller M, Sebe F, 'Triangle randomization for social network data anonymization', Ars Mathematica Contemporanea, 7 461-477 (2014) [C1]
Citations Web of Science - 1
2013 Baca M, Brankovic L, Lascsakova M, Phanalasy O, Semanicova-Fenovciova A, 'On d-antimagic labelings of plane graphs', Electronic Journal of Graph Theory and Applications, 1 28-39 (2013) [C1]
2013 Brankovic L, Fernau H, 'A novel parameterised approximation algorithm for minimum vertex cover', Theoretical Computer Science, 511 85-108 (2013) [C1]

Parameterised approximation is a relatively new but growing field of interest. It merges two ways of dealing with NP-hard optimisation problems, namely polynomial approximation an... [more]

Parameterised approximation is a relatively new but growing field of interest. It merges two ways of dealing with NP-hard optimisation problems, namely polynomial approximation and exact parameterised (exponential-time) algorithms. We exemplify this idea by designing and analysing parameterised approximation algorithms for minimum vertex cover. More specifically, we provide a simple algorithm that works on any approximation ratio of the form 2l+1/l+1, l=1,2,¿, and has complexity that outperforms previously published algorithms based on sophisticated exact parameterised algorithms. In particular, for l=1 (factor-1.5 approximation) our algorithm runs in time O* (1.0883k), where parameter k=2/3t, and t is the size of a minimum vertex cover. Additionally, we present an improved polynomial-time approximation algorithm for graphs of average degree at most four and a limited number of vertices with degree less than two. Crown Copyright © 2012 Published by Elsevier B.V. All rights reserved.

DOI 10.1016/j.tcs.2012.12.003
Citations Scopus - 6Web of Science - 6
2012 King T, Brankovic L, Gillard PM, 'Perspectives of Australian adults about protecting the privacy of their health information in statistical databases', International Journal of Medical Informatics, 81 279-289 (2012) [C1]
Citations Scopus - 24Web of Science - 17
2011 Binkele-Raible D, Brankovic L, Cygan M, Fernau H, Kneis J, Kratsch D, et al., 'Breaking the 2n-barrier for irredundance: Two lines of attack', Journal of Discrete Algorithms, 9 214-230 (2011) [C1]
Citations Scopus - 10
2011 Brankovic L, Wanless IM, 'Graceful labelling: State of the art, applications and future directions', Mathematics in Computer Science, 5 11-20 (2011) [C1]
Citations Scopus - 1
2011 Islam MZ, Brankovic L, 'Privacy preserving data mining: A noise addition framework using a novel clustering technique', Knowledge-Based Systems, 24 1214-1223 (2011) [C1]
DOI 10.1016/j.knosys.2011.05.011
Citations Scopus - 26Web of Science - 16
2011 Cheema MA, Brankovic L, Lin X, Zhang W, Wang W, 'Continuous monitoring of distance-based range queries', IEEE Transactions on Knowledge and Data Engineering, 23 1182-1199 (2011) [C1]
Citations Scopus - 26Web of Science - 21
2011 Baca M, Brankovic L, Semanicova-Fenovcikova A, 'Labelings of plane graphs containing Hamilton Path', Acta Mathematica Sinica-English Series, 27 701-714 (2011) [C1]
Citations Scopus - 8Web of Science - 8
2010 Baca M, Brankovic L, 'Edge-antimagicness for a class of disconnected graphs', Ars Combinatoria, 97A 145-152 (2010) [C1]
Citations Scopus - 4Web of Science - 4
2009 Brankovic L, Fernau H, Kneis J, Kratsch D, Langer A, Liedloff M, et al., 'Breaking the 2^n-Barrier for Irredundance: A Parameterized Route to Solving Exact Puzzles', CoRR, abs/0909.4224 (2009)
2009 Baca M, Brankovic L, Semanicova-Fenovcikova A, 'Labelings of plane graphs with determined face weights', Acta Mechanica Slovaca, 13 64-71 (2009) [C1]
2008 Brankovic L, Miller M, Steketee C, 'Special Collection: Privacy', Journal of Research and Practice in Information Technology, 40 149-150 (2008) [C3]
2008 Brankovic L, Miller M, Steketee C, 'Special collection: Security', Journal of Research and Practice in Information Technology, 40 229-230 (2008) [C3]
2007 Brankovic L, Steketee C, 'Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007)', Conferences in Research and Practice in Information Technology Series, 68 (2007)
2005 Brankovic L, Rosa A, Siran J, 'Labellings of trees with maximum degree three---an improved bound', Journal of Combinatorial Mathematics and Combinatorial Computing, 55 159-169 (2005) [C1]
2003 Brankovic L, Miller M, 'Introduction to Statistical Database Security, Special Issue, Selected Topics of Cryptography and Information Security, H. Wang, ed.,', Communications of the CCISA, 9 1-30 (2003) [C2]
2003 Brankovic L, Cvetkovic D, 'The Eigenspace of the Eigenvalue-2 in generalized line graphs and a problem in security of statistical databases', Univerziteta u Beogradu, Elektrotehnicki Fakultet. Publikacije. Serija: Matematika, 14 37-48 (2003) [C1]
2002 Brankovic L, Miller M, Siran J, 'On Range Query Usability of Statistical Databases', International Journal of Computer Mathematics, 79 1265-1271 (2002) [C1]
Citations Scopus - 2Web of Science - 1
2002 Brankovic L, Siran J, '2-Compromise Usability in 1-Dimensional Statistical Databases', Lecture Notes in Computer Science, . 448-455 (2002) [C1]
2002 Brankovic L, Horak P, Miller M, Rosa A, 'Premature Partial Latin Squares', Arts Combinatoria, 63 175-184 (2002) [C1]
Citations Scopus - 4Web of Science - 3
2000 Miller M, Brankovic L, Horak P, 'An Optimization Problem in Statistical Databases', SIAM Journal on Discrete Maths, 13, No 3 346-353 (2000) [C1]
Citations Scopus - 8Web of Science - 6
1999 Horak P, Brankovic L, Miller M, 'A Combinatorial problem in database security', Discrete Mathematics, 91 119-126 (1999) [C1]
Citations Scopus - 11Web of Science - 11
1999 Brankovic L, Miller M, Lieby P, 'Flattening Antichains with Respect to the Volume', The Electronic Journal of Combinatorics, Vol(6)1 * (1999) [C1]
Citations Scopus - 3
1999 Estivill-Castro V, Brankovic L, Dowe D, 'Privacy in Data Mining', Privacy Law and Policy Reporter, 9 33-35 (1999) [C2]
1998 Brankovic L, Miller M, Plesnik J, Ryan J, Siran J, 'large graphs with small degree and diameter: A voltage assignment approach', Australian Journal of Combinatorics, 18 65-76 (1998) [C1]
Citations Scopus - 5
Co-authors Joe Ryan
1998 Brankovic L, Miller M, Plesnik J, Ryan J, Siran J, 'A note on constructing large Cayley graphs of given degree and diameter by voltage assignments', The Electronic Journal of Combinatorics, 5 1-11 (1998) [C1]
Citations Scopus - 12
Co-authors Joe Ryan
1997 Edy BT, Brankovic L, Miller M, Plesnik J, Ryan J, Siran J, 'Large Digraphs with Small Diameter: A Voltage Assignment Approach', Journal of Combinatorial Mathematics and Combinatorial Computing, 24 161-176 (1997) [C1]
1996 Brankovic L, Miller M, Siran J, 'Graphs, 0-1 Matrices, and Usability of Statistical Databases', Congressus Numerantium: a conference journal on numerical themes, 12 169-182 (1996) [C1]
1995 Brankovic L, Miller M, 'An Application of Combinatorics to the Security of Statistical Databases', Gazette of the Australian Mathematical Society, 22 173-177 (1995) [C2]
1995 Pacheco F, Cooper J, Bomba D, Morris S, Miller M, Brankovic L, 'Value Added Networks (VANS) and Their Benefit to a Health Information System', Informatics in Healthcare Australia, 4 141-144 (1995) [C1]
1995 Pacheco F, Cooper J, Bomba D, Morris S, Miller M, Brankovic L, 'Educational Issues in Health Informatics', Informatics in Healthcare Australia, 4 101-105 (1995) [C1]
1995 Morris S, Cooper J, Bomba D, Brankovic L, Miller M, Pacheco F, 'Australian Healthcare: Smart Card for a Clever Country', International Journal of Bio-Medical Computing, 40 101-105 (1995) [C1]
Citations Scopus - 6Web of Science - 3
Show 32 more journal articles

Conference (54 outputs)

Year Citation Altmetrics Link
2016 Aljamea MM, Brankovic L, Gao J, Iliopoulos CS, Samiruzzaman M, 'Smart meter data analysis', ICC '16 Proceedings of the International Conference on Internet of things and Cloud Computing (2016) [E1]
DOI 10.1145/2896387.2896407
2016 Bazgan C, Brankovic L, Casel K, Fernau H, Jansen K, Klein KM, et al., 'Algorithmic aspects of upper domination: A parameterised perspective', Algorithmic Aspects in Information and Management (2016) [E1]
DOI 10.1007/978-3-319-41168-2_10
2016 Bazgan C, Brankovic L, Casel K, Fernau H, Jansen K, Klein KM, et al., 'Upper domination: Complexity and approximation', Combinatorial Algorithms (2016) [E1]
DOI 10.1007/978-3-319-44543-4_19
2016 Bazgan C, Brankovic L, Casel K, Fernau H, 'On the complexity landscape of the domination chain', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2016) [E1]

© Springer International Publishing Switzerland 2016.In this paper, we survey and supplement the complexity landscape of the domination chain parameters as a whole, including cla... [more]

© Springer International Publishing Switzerland 2016.In this paper, we survey and supplement the complexity landscape of the domination chain parameters as a whole, including classifications according to approximability and parameterised complexity. Moreover, we provide clear pointers to yet open questions. As this posed the majority of hitherto unsettled problems, we focus on Upper Irredundance and Lower Irredundance that correspond to finding the largest irredundant set and resp. the smallest maximal irredundant set. The problems are proved NP-hard even for planar cubic graphs. While Lower Irredundance is proved not c log(n)-approximable in polynomial time unless NP ¿ DTIME(nlog log n), no such result is known for Upper Irredundance. Their complementary versions are constantfactor approximable in polynomial time. All these four versions are APXhard even on cubic graphs.

DOI 10.1007/978-3-319-29221-2_6
2015 Alfalayleh M, Brankovic L, 'Quantifying privacy: A novel entropy-based measure of disclosure risk', Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (2015) [E1]

© Springer International Publishing Switzerland 2015.It is well recognised that data mining and statistical analysis pose a serious treat to privacy. This is true for financial, ... [more]

© Springer International Publishing Switzerland 2015.It is well recognised that data mining and statistical analysis pose a serious treat to privacy. This is true for financial, medical, criminal and marketing research. Numerous techniques have been proposed to protect privacy, including restriction and data modification. Recently proposed privacy models such as differential privacy and kanonymity received a lot of attention and for the latter there are now several improvements of the original scheme, each removing some security shortcomings of the previous one. However, the challenge lies in evaluating and comparing privacy provided by various techniques. In this paper we propose a novel entropy based security measure that can be applied to any generalisation, restriction or data modification technique. We use our measure to empirically evaluate and compare a few popular methods, namely query restriction, sampling and noise addition.

DOI 10.1007/978-3-319-19315-1_3
2014 Brankovic L, Muir A, Giggins H, 'Teaching Mathematical Reasoning: From Textbooks to Software' (2014)
Co-authors Helen Giggins
2014 Almansour AA, Brankovic L, Iliopoulos CS, 'Evaluation of credibility assessment for microblogging - Models and future directions', ACM International Conference Proceeding Series (2014)

© Copyright 2014 ACM.Due to their openness and low publishing barrier nature, User- Generated Content (UGC) platforms facilitate the creation of huge amounts of inaccurate conten... [more]

© Copyright 2014 ACM.Due to their openness and low publishing barrier nature, User- Generated Content (UGC) platforms facilitate the creation of huge amounts of inaccurate content. Consequently, assessing UGC information credibility is developing into a vitally important research topic. This paper offers a systematic review of the current developments in assessing information credibility automatically in UGC platforms, focusing on microblogging service. It covers different aspects from dataset collection and feature usage, through classification techniques, to performance evaluation. A novel theoretical credibility model which integrates the evaluators' traits and context factors to assess information credibility is also presented along with important directions for future research on UGC information credibility.

DOI 10.1145/2637748.2638439
2013 Reynolds M, Brankovic L, 'Hard theorems made easier: visualisation and interactivity', Proceedings of the 24th Annual Conference of the Australasian Association for Engineering Education AAEE2013 (2013) [E1]
2013 Brankovic L, Ye, Reynolds, 'Reflection and guided problem-based learning in software engineering', Proceedings of the 24th Annual Conference of the Australasian Association for Engineering Education ¿ AAEE2013 (2013) [E1]
2012 Giggins HP, Brankovic L, 'VICUS - A noise addition technique for categorical data', Proceedings of the Tenth Australasian Data Mining Conference AusDM' 2012 (2012) [E1]
Co-authors Helen Giggins
2012 Brankovic L, Fernau H, 'Parameterized approximation algorithms for HITTING SET', Approximation and Online Algorithms (2012) [E1]
Citations Scopus - 3
2010 Cheema MA, Brankovic L, Lin X, Zhang W, Wang W, 'Multi-guarded safe zone: An effective technique to monitor moving circular range queries', Proceedings - 26th IEEE International Conference on Data Engineering (2010) [E1]
Citations Scopus - 22Web of Science - 11
2010 Fuster-Sabater A, Delgado-Mohatar O, Brankovic L, 'On the linearity of cryptographic sequence generators', Computer Science and Its Applications - 2010 International Conference Proceedings Part II (2010) [E1]
DOI 10.1007/978-3-642-12165-4_46
Citations Scopus - 1Web of Science - 1
2010 Delgado-Mohatar O, Sierra JM, Brankovic L, Fuster-Sabater A, 'An energy-efficient symmetric cryptography based authentication scheme for wireless sensor networks', Information Security Theory and Practices: Security and Privacy of Pervasive Systems and Smart Devices. 4th IFIP WG 11.2 International Workshop on Information Security Theory and Practices (2010) [E1]
Citations Scopus - 3Web of Science - 2
2010 Binkele-Raible D, Brankovic L, Fernau H, Kneis J, Kratsch D, Langer A, et al., 'A parameterized route to exact puzzles: Breaking the 2n-barrier for irredundance', Algorithms and Complexity. 7th International Conference, CIAC 2010 Proceedings (2010) [E1]
Citations Scopus - 2
2010 Brankovic L, Fernau H, 'Combining two worlds: Parameterised approximation for vertex cover', Lecture Notes in Computer Science (2010) [E1]
DOI 10.1007/978-3-642-17517-6_35
Citations Scopus - 8Web of Science - 4
2009 Brankovic L, Susilo W, 'Conference editors', Information Security 2009: Proceedings of the Seventh Australasian Information Security Conference (AISC 2009) (2009) [E4]
2008 Giggins HP, Brankovic L, 'Statistical disclosure control: To trust or not to trust', Proceedings: International Symposium on Computer Science and Its Applications, CSA 2008 (2008) [E1]
DOI 10.1109/csa.2008.12
Co-authors Helen Giggins
2008 London KA, Singh V, Taylor C, Gu N, Brankovic L, 'Building information modelling project decision support framework', Proceedings of the Twenty-Fourth Annual Conference Association of Researchers in Construction Management (ARCOM) 2008 (2008) [E1]
2008 Gu N, Singh V, London KA, Brankovic L, Taylor C, 'Building information modelling: What is in there for the architects?', ANZAScA 2008: Proceedings of the 42nd Annual Conference of the Australian and New Zealand Architectural Science Association (2008) [E1]
2008 Brankovic L, Lin Y, Smyth WF, 'Conference editors', Proceedings of the International Workshop on Combinatorial Algorithms 2007 (2008) [E4]
Co-authors Yuqing Lin
2008 Brankovic L, Miller M, 'Conference Editors', Information Security 2008: Proceedings of the Sixth Australasian Information Security Conference (AISC 2008) (2008) [E4]
2008 Singh V, Gu N, London KA, Brankovic L, Taylor C, 'BIM: Expectations and a reality check', Proceedings of 12th International Conference on Computing in Civil and Building Engineering & 2008 International Conference on Information Technology in Construction (2008) [E1]
2008 Gu N, Singh V, London KA, Brankovic L, Taylor C, 'Adopting building information modeling (BIM) as collaboration platform in the design industry', CAADRIA 2008: Beyond Computer-Aided Design: Proceedings of the 13th Conference on Computer Aided Architectural Design Research in Asia (2008) [E1]
2008 Tsai JJ-H, Taylor C, London KA, Brankovic L, Gu N, Singh V, 'Industry perception of BIM adoption in design sector', 8th International Conference on Construction Applications of Virtual Reality CD-ROM (2008) [E1]
2007 Brankovic L, Coddington P, Roddick JF, Steketee C, Warren JR, Wendelborn A, 'Conference Editors', Proceedings of the Fifth Australasian Symposium on ACSW Frontiers (2007) [E4]
2007 'ACSW Frontiers 2007. Proceedings of the Fifth Australasian Symposium on Grid Computing and e-Research (AusGrid 2007), the Fifth Australasian Information Security Workshop (Privacy Enhancing Technologies) (AISW 2007), and the Australasian Workshop on Health Knowledge Management and Discovery (HKMD 2007). Proceedings, Ballarat, Victoria, Australia, January 30 - February 2, 2007', ACSW Frontiers (2007)
2006 Lin Y, Tang J, Brankovic L, Miller M, 'On graphs of maximum size with given girth', Proceedings of the Seventeenth Australasian Workshop on Combinatorial Algorithms (AWOCA 2006) (2006) [E1]
Co-authors Yuqing Lin
2005 Alfalayleh M, Brankovic L, 'An overview of security issues and techniques in mobile agents', COMMUNICATIONS AND MULTIMEDIA SECURITY (2005)
Citations Scopus - 4Web of Science - 2
2005 Brankovic L, Fernau H, 'Approximability of a {0,1} - matrix problem', Proceedings of the Sixteenth Australasian Workshop on Combinatorial Algorithms (AWOCA 2005) : September 18-21, 2005 Ballarat, Australia (2005) [E1]
2005 Brankovic L, Murch CL, Pond J, Rosa A, 'Alpha - size of Trees With Maximum Degree Three and Perfect Matching', Proceedings of the Sixteenth Australasian Workshop on Combinatorial Algorithms (AWOCA 2005) : September 18-21, 2005 Ballarat, Australia (2005) [E1]
2005 Alfalayleh MMD, Brankovic L, 'Scout and Routed Mobile Agents', 3rd IEEE International Conference on Industrial Informatics (INDIN) : 10-12 August, 2005, Perth, Australia (2005) [E1]
2005 Islam MZ, Brankovic L, 'DETECTIVE: A Decision Tree Based Categorical Value Clustering and Perturbation Technique for Preserving Privacy in Data Mining', 3rd IEEE International Conference on Industrial Informatics (INDIN) : 10-12 August, 2005, Perth, Australia (2005) [E1]
Citations Scopus - 2Web of Science - 1
2004 Alfalayleh MMD, Brankovic L, Giggins HP, Islam MZ, 'Towards the graceful tree conjecture: a survey', Proceedings from Fifteenth Australasian Workshop on Combinatorial Algorithms (2004) [E1]
Co-authors Helen Giggins
2004 Mathieson L, King T, Brankovic L, '2-Compromise: usability in 1-dimensional statistical database', Proceedings from Fifteenth Australasian Workshop on Combinatorial Algorithms (2004) [E1]
Co-authors Luke Mathieson
2004 Islam MZ, Brankovic L, 'A framework for privacy preserving classification in data mining', Proceedings of the The Australasian Information Security Workshop & The Australasian Workshop on Data Mining and Web Intelligence and The Australasian Workshop on Software Internationalisation (2004) [E1]
2004 Alfalayleh MMD, Brankovic L, 'An overview of security issues and techniques in mobile agents', Communications and Multimedia Security (2004) [E1]
2003 Giggins HP, Brankovic L, 'Protecting Privacy in Genetic Databases', Proceedings for EMAC 2003 (2003) [E1]
Co-authors Helen Giggins
2003 Islam MZ, Brankovic L, 'Noise Addition for protecting Privacy in Data Mining', Proceedings for EMAC 2003 (2003) [E1]
2003 Potdar V, Chang E, Jayaratna N, Ye W, Brankovic L, 'Pendulum Model for Open Source Software Development', SCI 2003 (2003) [E2]
2003 Ye W, Chang E, Brankovic L, 'Analysis and Design Methodology for Enterprise Information System Development', SCI 2003 (2003) [E2]
2003 Islam MZ, Barnaghi PM, Brankovic L, 'Measuring Data Quality: Predictive Accuracy vs. Similarity of Decision Trees', Proceedings for ICCIT 2003 (2003) [E1]
2002 Giggins HP, Brankovic L, 'Ethical and Privacy Issues in Genetic Databases', Third Australian Institute of Computer Ethics Conference (2002) [E1]
Co-authors Helen Giggins
2000 Brankovic L, Miller M, Siran J, 'Usability of K-compromise free statistical databases', Proceedings of the Eleventh Australasian Workshop on Combinatorial Algorithms (2000) [E1]
Citations Scopus - 10Web of Science - 9
2000 Brankovic L, Ryan JF, 'Proceedings of the Eleventh Australasian Workshop on Combinatorial Algorithms', Proceedings of the Eleventh Australasian Workshop on Combinatorial Algorithms (2000) [E4]
Co-authors Joe Ryan
1999 Brankovic L, Estivill-Castro V, 'Privacy Issues in Knowledge Discovery and Data Mining', Australian Institute of Computer Ethics (AICE) (1999) [E1]
1999 Estivill-Castro V, Brankovic L, 'Data Swapping: Balancing Privacy against Precision in Mining for Logic Rules', Data Warehousing and Knowledge Discovery (1999) [E1]
Citations Scopus - 14
1999 Brankovic L, Miller M, 'The Spectrum of Premature Partial Latin Squares', Proceedings of the 10th Australian Workshop on Combinatorial (1999) [E1]
1998 Brankovic L, Furche A, Miller M, Wrightson G, 'Newcash - Anonymous Digital Cash with Receipts', Proceedings of the 6th IEEE Singapore International Conference on Networks (SICON'98) (1998) [E1]
1997 Brankovic L, Horak P, Miller M, Wrightson G, 'Usability of Compromise-Free Statistical Databases for Range Sum Queries', Ninth International Conference on Scientific and Statistical Database Management, Proceedings (1997) [E1]
1997 Brankovic L, Miller M, 'Open Problems in Security of Statistical Databases', Proceedings of the Eighth Australasian Workshop on Combinatorial Algorithms (AWOCA'97) (1997) [E1]
1996 Brankovic L, Miller M, Siran J, 'Towards a Practical Auditing Method for the Prevention of Statistical Database Compromise', Seventh Australasian Database Conference Proceedings, Australian Computer Science Communications (1996) [E1]
1995 Brankovic L, Miller M, Bomba D, Cooper J, Morris S, Pacheco F, 'Confidentiality of the Patient Records and the Data Inference Problem', HIC 95: It's Time for Healthcare: Proceedings of the Third National Health Informatics Conference (1995) [E1]
1995 Cooper J, Miller M, Brankovic L, 'Secret Sharing for Access to Medical Databases', HIC 95: It's Time for Healthcare: Proceedings of the Third National Health Informatics Conference (1995) [E1]
Show 51 more conferences

Report (1 outputs)

Year Citation Altmetrics Link
2008 Singh V, Gu N, London KA, Brankovic L, Taylor C, 'Industry Consultation Report', CRC Construction Innovation, 61 (2008) [R1]
Edit

Research Supervision

Number of supervisions

Completed5
Current3

Total current UON EFTSL

PhD0.83

Current Supervision

Commenced Level of Study Research Title / Program / Supervisor Type
2015 PhD Usable Privacy
PhD (Software Engineering), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor
2013 PhD Improved Similarity Search for Large Data in Machine Learning and Robotics
PhD (Computer Science), Faculty of Engineering and Built Environment, The University of Newcastle
Co-Supervisor
2010 PhD Alpha-Labellings of Trees with Maximum Degree 3 and a Perfect Matching
PhD (Computer Science), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor

Past Supervision

Year Level of Study Research Title / Program / Supervisor Type
2009 PhD Privacy Issues in Health Care and Security of Statistical Databases
PhD (Computer Science), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor
2009 PhD Mobile Agent Security
PhD (Software Engineering), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor
2009 PhD Security of Genetic Databases
PhD (Computer Science), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor
2008 PhD Privacy Preservation in Data Mining Through Noise Addition
PhD (Computer Science), Faculty of Engineering and Built Environment, The University of Newcastle
Principal Supervisor
1999 PhD Extremal Problems in Finite Sets
Mathematics, Charles Darwin University
Co-Supervisor
Edit

News

PhD Opportunity in Graph Labellings

PhD Opportunity in Graph Labellings and Extremal Graph Theory

November 25, 2014

An opportunitiy exists for a PhD candidate to work on a project investigating graph labellings, in particular Graceful Labellings, and various extremal graph problems under the supervision of Associate Professor Ljiljana Brankovic.

Parameterised Approximation Algorithms

PhD Opportunity in Parameterised Approximation Algorithms

November 25, 2014

An opportunity exists for a PhD candidate to investigate parameterised approximation algorithms under the supervision of Associate Professor Ljiljana Brankovic.

Professor Ljiljana Brankovic

Position

Professor
School of Elect Engineering and Computer Science
Faculty of Engineering and Built Environment

Focus area

Computer Science and Software Engineering

Contact Details

Email ljiljana.brankovic@newcastle.edu.au
Phone 16054
Fax 16929

Office

Room ES221
Building Engineering Science - D.W. George
Location Callaghan
University Drive
Callaghan, NSW 2308
Australia
Edit