default search action
Andrei V. Kelarev
Person information
- affiliation: RMIT University, Melbourne, Australia
- affiliation: Deakin University, Melbourne, Australia
- affiliation: University of Newcastle, Callaghan, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j45]Xuechao Yang, Andrei Kelarev, Xun Yi:
Privacy-enhancing data aggregation and data analytics in wireless networks for a large class of distributed queries. Wirel. Networks 30(6): 4749-4759 (2024) - 2023
- [j44]Michael Kerr, Fengling Han, Xun Yi, Andrei Kelarev, Ron G. van Schyndel:
A non-invasive method for the cataloguing and authentication of surveillance video using on-camera blockchain participation, machine learning and signal analysis. Forensic Sci. Int. Digit. Investig. 46: 301573 (2023) - 2022
- [j43]Xuanlong Ma, Andrei Kelarev, Yuqing Lin, Kaishun Wang:
A survey on enhanced power graphs of finite groups. Electron. J. Graph Theory Appl. 10(1): 89 (2022) - [j42]Xuechao Yang, Xun Yi, Andrei Kelarev, Leanne Rylands, Yuqing Lin, Joe Ryan:
Protecting Private Information for Two Classes of Aggregated Database Queries. Informatics 9(3): 66 (2022) - [i5]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. CoRR abs/2205.00384 (2022) - [i4]Ziaur Rahman, Xun Yi, Sk. Tanzir Mehedi, Rafiqul Islam, Andrei Kelarev:
Blockchain Applicability for the Internet of Things: Performance and Scalability Challenges and Solutions. IACR Cryptol. ePrint Arch. 2022: 504 (2022) - 2021
- [j41]Leanne Rylands, Jennifer Seberry, Xun Yi, Andrei Kelarev, Joe Ryan, Yuqing Lin:
Collusion-resistant protocols for private processing of aggregated queries in distributed databases. Distributed Parallel Databases 39(1): 97-127 (2021) - [j40]Xuechao Yang, Xun Yi, Andrei Kelarev, Fengling Han, Junwei Luo:
A distributed networked system for secure publicly verifiable self-tallying online voting. Inf. Sci. 543: 125-142 (2021) - [c20]Junwei Luo, Xuechao Yang, Xun Yi, Fengling Han, Andrei Kelarev:
Efficient Privacy-Preserving User Matching with Intel SGX. BROADNETS 2021: 92-111 - [c19]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. QSHINE 2021: 57-74 - [c18]Xuechao Yang, Xun Yi, Andrei Kelarev:
Secure Ranked Choice Online Voting System via Intel SGX and Blockchain. TrustCom 2021: 139-146 - [i3]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. CoRR abs/2111.11158 (2021) - [i2]Ziaur Rahman, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Blockchain for IoT: A Critical Analysis Concerning Performance and Scalability. IACR Cryptol. ePrint Arch. 2021: 1551 (2021) - 2020
- [j39]Xuechao Yang, Xun Yi, Surya Nepal, Andrei Kelarev, Fengling Han:
Blockchain voting: Publicly verifiable online voting protocol without trusted tallying authorities. Future Gener. Comput. Syst. 112: 859-874 (2020) - [j38]Jemal H. Abawajy, Morshed U. Chowdhury, Andrei Kelarev:
Hybrid Consensus Pruning of Ensemble Classifiers for Big Data Malware Detection. IEEE Trans. Cloud Comput. 8(2): 398-407 (2020) - [j37]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei Kelarev, Herbert F. Jelinek:
A Clustering-Based Multi-Layer Distributed Ensemble for Neurological Diagnostics in Cloud Services. IEEE Trans. Cloud Comput. 8(2): 473-483 (2020)
2010 – 2019
- 2019
- [j36]Andrei Kelarev, Xun Yi, Shahriar Badsha, Xuechao Yang, Leanne Rylands, Jennifer Seberry:
A multistage protocol for aggregated queries in distributed cloud databases with privacy protection. Future Gener. Comput. Syst. 90: 368-380 (2019) - [j35]Jemal H. Abawajy, Andrei Kelarev:
Iterative Classifier Fusion System for the Detection of Android Malware. IEEE Trans. Big Data 5(3): 282-292 (2019) - 2018
- [j34]Xuechao Yang, Xun Yi, Surya Nepal, Andrei Kelarev, Fengling Han:
A Secure Verifiable Ranked Choice Online Voting System Based on Homomorphic Encryption. IEEE Access 6: 20506-20519 (2018) - [j33]Jemal H. Abawajy, Andrei V. Kelarev, Xun Yi, Herbert F. Jelinek:
Minimal ensemble based on subset selection using ECG to diagnose categories of CAN. Comput. Methods Programs Biomed. 160: 85-94 (2018) - [j32]Andrei Kelarev, Joe Ryan, Leanne Rylands, Jennifer Seberry, Xun Yi:
Discrete algorithms and methods for security of statistical databases related to the work of Mirka Miller. J. Discrete Algorithms 52-53: 112-121 (2018) - 2017
- [j31]Morshed U. Chowdhury, Jemal H. Abawajy, Andrei V. Kelarev, Teruhisa Hochin:
Multilayer hybrid strategy for phishing email zero-day filtering. Concurr. Comput. Pract. Exp. 29(23) (2017) - [c17]Andrei Kelarev, Jennifer Seberry, Leanne Rylands, Xun Yi:
Combinatorial Algorithms and Methods for Security of Statistical Databases Related to the Work of Mirka Miller. IWOCA 2017: 383-394 - [c16]Shahriar Badsha, Xun Yi, Ibrahim Khalil, Andrei Kelarev:
Private Recommendations Generation for Vertically Partitioned Datasets. PACIS 2017: 163 - 2016
- [j30]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Herbert F. Jelinek:
Enhancing Predictive Accuracy of Cardiac Autonomic Neuropathy Using Blood Biochemistry Features and Iterative Multitier Ensembles. IEEE J. Biomed. Health Informatics 20(1): 408-415 (2016) - 2015
- [j29]Jemal H. Abawajy, Andrei V. Kelarev, Joe Ryan:
Ideal basis in constructions defined by directed graphs. Electron. J. Graph Theory Appl. 3(1): 35-49 (2015) - [j28]W. P. Eureka Priyadarshani, Lynn Margaret Batten, Gihan N. Wikramanayake, Andrei V. Kelarev:
Cloud omnibus system for evaluating cloud market services. Int. J. Cloud Comput. 4(4): 335-352 (2015) - [j27]Jemal H. Abawajy, Andrei V. Kelarev, Mirka Miller, Joseph F. Ryan:
Distances of Centroid Sets in a Graph-Based Construction for Information Security Applications. Math. Comput. Sci. 9(2): 127-137 (2015) - 2014
- [j26]Herbert F. Jelinek, Andrei V. Kelarev, Dean J. Robinson, Andrew Stranieri, David Cornforth:
Using meta-regression data mining to improve predictions of performance based on heart rate dynamics for Australian football. Appl. Soft Comput. 14: 81-87 (2014) - [j25]Jemal H. Abawajy, Gleb Beliakov, Andrei V. Kelarev, Morshed U. Chowdhury:
Iterative Construction of Hierarchical Classifiers for Phishing Website Detection. J. Networks 9(8): 2089-2098 (2014) - [j24]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Automatic Generation of Meta Classifiers with Large Levels for Distributed Computing and Networking. J. Networks 9(9): 2259-2268 (2014) - [j23]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Large Iterative Multitier Ensemble Classifiers for Security of Big Data. IEEE Trans. Emerg. Top. Comput. 2(3): 352-363 (2014) - 2013
- [j22]Andrew Stranieri, Jemal H. Abawajy, Andrei V. Kelarev, Md. Shamsul Huda, Morshed U. Chowdhury, Herbert F. Jelinek:
An approach for Ewing test selection to support the clinical assessment of cardiac autonomic neuropathy. Artif. Intell. Medicine 58(3): 185-193 (2013) - [j21]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury, Andrew Stranieri, Herbert F. Jelinek:
Predicting cardiac autonomic neuropathy category for diabetic data with missing values. Comput. Biol. Medicine 43(10): 1328-1333 (2013) - [j20]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Multistage approach for clustering and classification of ECG data. Comput. Methods Programs Biomed. 112(3): 720-730 (2013) - [j19]Jemal H. Abawajy, Andrei V. Kelarev, Morshed U. Chowdhury:
Power graphs: A survey. Electron. J. Graph Theory Appl. 1(2): 125-147 (2013) - [j18]Andrei V. Kelarev, Jemal H. Abawajy, Andrew Stranieri, Herbert F. Jelinek:
Empirical Investigation of Decision Tree Ensembles for Monitoring Cardiac Complications of Diabetes. Int. J. Data Warehous. Min. 9(4): 1-18 (2013) - [j17]Gleb Beliakov, Andrei V. Kelarev:
Global non-smooth optimization in robust multivariate regression. Optim. Methods Softw. 28(1): 124-138 (2013) - 2012
- [j16]Gleb Beliakov, John Yearwood, Andrei V. Kelarev:
Application of Rank Correlation, Clustering and Classification in Information Security. J. Networks 7(6): 935-945 (2012) - [c15]Andrei V. Kelarev, Andrew Stranieri, John Yearwood, Jemal H. Abawajy, Herbert F. Jelinek:
Improving Classi cations for Cardiac Autonomic Neuropathy Using Multi-level Ensemble Classi ers and Feature Selection Based. AusDM 2012: 93-102 - [c14]Andrei V. Kelarev, Andrew Stranieri, John Yearwood, Herbert F. Jelinek:
Empirical investigation of consensus clustering for large ECG data sets. CBMS 2012: 1-4 - [c13]Jemal H. Abawajy, Andrei V. Kelarev:
A Multi-tier Ensemble Construction of Classifiers for Phishing Email Detection and Filtering. CSS 2012: 48-56 - [c12]Andrei V. Kelarev, Andrew Stranieri, John Yearwood, Herbert F. Jelinek:
Empirical Study of Decision Trees and Ensemble Classifiers for Monitoring of Diabetes Patients in Pervasive Healthcare. NBiS 2012: 441-446 - [c11]Andrei V. Kelarev, Richard Dazeley, Andrew Stranieri, John Yearwood, Herbert F. Jelinek:
Detection of CAN by Ensemble Classifiers Based on Ripple Down Rules. PKAW 2012: 147-159 - 2011
- [i1]Gleb Beliakov, Andrei V. Kelarev, John Yearwood:
Robust artificial neural networks and outlier detection. Technical report. CoRR abs/1110.0169 (2011) - 2010
- [c10]Richard Dazeley, John Yearwood, Byeong Ho Kang, Andrei V. Kelarev:
Consensus Clustering and Supervised Classification for Profiling Phishing Emails in Internet Commerce Security. PKAW 2010: 235-246
2000 – 2009
- 2009
- [j15]Andrei V. Kelarev, Joe Ryan, John Yearwood:
Cayley graphs as classifiers for data mining: The influence of asymmetries. Discret. Math. 309(17): 5360-5369 (2009) - [c9]Peter Vamplew, Richard Dazeley, Ewan Barker, Andrei V. Kelarev:
Constructing Stochastic Mixture Policies for Episodic Multiobjective Reinforcement Learning Tasks. Australasian Conference on Artificial Intelligence 2009: 340-349 - [c8]John Yearwood, Dean Webb, Liping Ma, Peter Vamplew, Bahadorreza Ofoghi, Andrei V. Kelarev:
Applying Clustering and Ensemble Clustering Approaches to phishing Profiling. AusDM 2009: 25-34 - [c7]John Yearwood, Byeong Ho Kang, Andrei V. Kelarev:
Experimental Investigation of Three Machine Learning Algorithms for ITS Dataset. FGIT 2009: 308-316 - 2008
- [j14]Andrei V. Kelarev:
An Algorithm for BCH Codes Extended with Finite State Automata. Fundam. Informaticae 84(1): 51-60 (2008) - 2007
- [j13]Andrei V. Kelarev:
Algorithms for computing parameters of graph-based extensions of BCH codes. J. Discrete Algorithms 5(3): 553-563 (2007) - 2006
- [c6]Andrei V. Kelarev, Byeong Kang, Dorothy Steane:
Clustering Algorithms for ITS Sequence Data with Alignment Metrics. Australian Conference on Artificial Intelligence 2006: 1027-1031 - [c5]Andrei V. Kelarev:
A Polynomial Algorithm for Codes Based on Directed Graphs. CATS 2006: 87-92 - [c4]Byeong Kang, Andrei V. Kelarev, Arthur H. J. Sale, Ray Williams:
A New Model for Classifying DNA Code Inspired by Neural Networks and FSA. PKAW 2006: 187-198 - 2004
- [j12]Andrei V. Kelarev:
Labelled Cayley graphs and minimal automata. Australas. J Comb. 30: 95-102 (2004) - [j11]Andrei V. Kelarev:
On group automata over finite fields. Finite Fields Their Appl. 10(1): 65-71 (2004) - [j10]Andrei V. Kelarev:
On the Structure of Incidence Rings of Group Automata. Int. J. Algebra Comput. 14(4): 505-511 (2004) - 2003
- [j9]Andrei V. Kelarev, Cheryl E. Praeger:
On transitive Cayley graphs of groups and semigroups. Eur. J. Comb. 24(1): 59-72 (2003) - [j8]Sergey Bereg, Andrei V. Kelarev:
An Algorithm for Analysis of Images in Spatial Information Systems. J. Autom. Lang. Comb. 8(4): 557-565 (2003) - [j7]Sergei Bespamyatnikh, Andrei V. Kelarev:
Algorithms for shortest paths and d-cycle problems. J. Discrete Algorithms 1(1): 1-9 (2003) - [j6]Andrei V. Kelarev, Olga Sokratova:
On congruences of automata defined by directed graphs. Theor. Comput. Sci. 301(1-3): 31-43 (2003) - 2002
- [j5]Andrei V. Kelarev:
On undirected Cayley graphs. Australas. J Comb. 25: 73-78 (2002) - [j4]Andrei V. Kelarev, Olga Sokratova:
Two Algorithms for Languages Recognized by Graph Algebras. Int. J. Comput. Math. 79(12): 1317-1327 (2002) - 2001
- [j3]Andrei V. Kelarev, Olga Sokratova:
Languages Recognized by a Class of Finite Automata. Acta Cybern. 15(1): 45-52 (2001) - [j2]Andrei V. Kelarev, Olga Sokratova:
Directed Graphs and Syntactic Algebras of Tree Languages. J. Autom. Lang. Comb. 6(3): 305-311 (2001) - [c3]Andrei V. Kelarev, Olga Sokratova:
Information Rates and Weights of Codes in Structural Matrix Rings. AAECC 2001: 151-158 - 2000
- [c2]Andrei V. Kelarev, Peter G. Trotter:
A Combinatorial Property of Languages and Monoids. Words, Languages & Combinatorics 2000: 228-239
1990 – 1999
- 1996
- [c1]Andrei V. Kelarev:
Combinatorial Properties of Sequences in Groups and Semirings. DMTCS 1996: 289-298 - 1994
- [j1]Andrei V. Kelarev:
Combinatorial Properties and Homomorphisms of Semigroups. Int. J. Algebra Comput. 4(3): 443-450 (1994)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:23 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint