Campbell Wilson

Campbell Wilson
Monash University (Australia) · Caulfield School of Information Technology

About

35
Publications
7,238
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
253
Citations
Introduction

Publications

Publications (35)
Preprint
Full-text available
Data science collaboration is problematic when access to operational data or models from outside the data-holding organisation is prohibited, for a variety of legal, security, ethical, or practical reasons. There are significant data privacy challenges when performing collaborative data science work against such restricted data. In this paper we de...
Preprint
Efficient and reliable automated detection of modified image and multimedia files has long been a challenge for law enforcement, compounded by the harm caused by repeated exposure to psychologically harmful materials. In August 2019 Facebook open-sourced their PDQ and TMK + PDQF algorithms for image and video similarity measurement, respectively. I...
Article
The health impacts of repeated exposure to distressing concepts such as child exploitation materials (CEM, aka ‘child pornography’) have become a major concern to law enforcement agencies and associated entities. Existing methods for ‘flagging’ materials largely rely upon prior knowledge, whilst predictive methods are unreliable, particularly when...
Article
Research into the nature and structure of 'Dark Webs' such as Tor has largely focused upon manually labelling a series of crawled sites against a series of categories, sometimes using these labels as a training corpus for subsequent automated crawls. Such an approach is adequate for establishing broad taxonomies, but is of limited value for special...
Conference Paper
Model based feature selection for identification of diverse faults in rotary machines can significantly cost time and money and it is nearly impossible to model all faults under different operating environments. In this paper, feedforward ANN input-layer-weights have been used for the adaptive selection of the least number of features, without faul...
Article
Criminal investigations invariably involve the triage or cursory examination of relevant electronic media for evidentiary value. Legislative restrictions and operational considerations can result in investigators having minimal time and resources to establish such relevance, particularly in situations where a person is in custody and awaiting inter...
Article
For absolute process safety in diverse machine applications, timely and reliable anomalous behavior detection is very crucial. Different machine applications have different normal behavior patterns and safety standards thus require adjustable and adaptive anomaly detection techniques. In this paper an autonomous behavior modeling approach for anoma...
Article
Full-text available
Rotary machine fault classification from vibrations requires robust feature extraction and enhancement procedures for transient and steady-state fault signatures. Accurate fault pattern classification relies on the quality of features extracted from the fault patterns. Fourier transform (FT) and wavelet transform (WT) based methods have largely bee...
Article
Consumers are increasingly using Internet portals when searching for relevant health information. Despite the broad range of health information portals (HIPs) available, usage problems with such portals are still widely recognized and reported. In this study, we analyzed usage data from an operational health information portal and identified ways i...
Article
Full-text available
The importance of affect in learning has led many intelligent tutoring systems (ITS) to include learners' affective states in their student models. The approaches used to identify affective states include human observation, self-reporting, data from physical sensors, modeling affective states, and mining students' data in log files. Among these, da...
Conference Paper
Features extraction has always been crucial in rotary machines for Condition based machine health monitoring. Time-domain-segmentation being among the preliminary steps for further classification process plays a momentous role. Vibration signals from bearing are quasistationary in nature therefore calculation of constituent frequencies amplitudes i...
Conference Paper
In rotary machines bearings are a primary cause of failure. In order to estimate the time before failure to provide information for timely bearing replacement strategies, condition-based machine health monitoring techniques are employed. This paper discusses a model for estimating the severity of bearing faults that can be used for residual bearing...
Conference Paper
Safety has always been of vital concern in both industrial and home applications. Ensuring safety often requires certain quantifications regarding the inclusive behavior of the system under observation in order to determine deviations from normal behavior. In machine health monitoring, the vibration signal is of great importance for such measuremen...
Conference Paper
Full-text available
The next generation of mobile services makes it desirable for mobile users to be connected everywhere. Since these users usually in the move, roaming services are deployed to allow mobile users to access foreign network services without being limited to the geographical coverage of their home networks. Several solutions have been proposed based on...
Conference Paper
Current mobile banking protocols simply are not as well guarded as their Internet counterparts during the transactions between a mobile device and a financial institution. Recently, many mobile banking protocols using public-key cryptography have been proposed. However, they are designed to provide a basic protection for traditional flow of payment...
Conference Paper
Consumer health information portals (HIP) are a popular means to provide quality health information via the Web. However complex usage problems in HIPs are still a major hairier to their success. A usage-driven approach, which places emphasis on improving online services based on learnings from the data of the interactions between users and the sys...
Conference Paper
Full-text available
Automating human capabilities for classifying different genre of songs is a difficult task. This has led to various studies that focused on finding solutions to solve this problem. Analyzing music contents (often referred as content- based analysis) is one of many ways to identify and group similar songs together. Various music contents, for exampl...
Conference Paper
Authorization and authentication services are the major components protecting integrity and authenticity. Authorization control service provides a mechanism to verify user permission to access services. In wireless networks, not only users may change roles but also services can be added, removed or modified more frequently. Although role-based acce...
Conference Paper
This paper proposes two related RF methods for use in CBIR. These two methods are based on a general classificatory analysis based framework for RF in CBMR that considers RF independently from retrieval. The proposed methods show how the user's information need expressed as a set of "proto-reducts'' can be used as the basis of a re-weighting techni...
Conference Paper
The ldquosemantic gaprdquo observed in content-based image retrieval (CBIR) has become a highly active research topic in last twenty years, and it is widely accepted that domain specification is one of the most effective methods of addressing this problem. However, along with the challenge of making a CBIR system specific to a particular domain com...
Conference Paper
Full-text available
With the widespread use of wireless network services and applications, security is a major concern. From wireless network security aspects, authentication for services is very important especially in Internet banking. In this paper, an authentication method for wireless networks using dynamic key theory is presented. The dynamic key theory is used...
Conference Paper
Full-text available
Relevance feedback (RF) is a widely used technique to deal with the issues of user subjectivity and the semantic gap in content-based image retrieval (CBIR). We build on existing work that outlined a rough set based general framework called CAFe for RF and proposed a re-weighting strategy based on a rough set theoretic analysis of the user feedback...
Chapter
Relevance feedback is a mature technique that has been used to take user subjectivity into account in multimedia retrieval. It can be seen as an attempt to bridge the semantic gap by keeping a human in the loop. A variety of techniques have been used to implement relevance feedback in existing retrieval systems. An analysis of these techniques is u...
Conference Paper
Full-text available
Although privacy is often seen as an essential right for inter- net users, the provision of anonymity can also provide the ultimate cover for malicious users. Privacy Enhancing Technologies (PETs) should not only hide the identity of legitimate users but also provide means by which evidence of malicious activity can be gathered. This paper proposes...
Conference Paper
Relevance Feedback (RF) is a useful technique in reducing semantic gap which is a bottleneck in Content-Based Image Retrieval (CBIR). One of the classical approaches to implement RF is feature re-weighting where weights in the similarity measure are modified using feedback samples as returned by the user. The main issues in RF are learning the sys...
Conference Paper
The BIR content based image retrieval system uses a Bayesian belief network architecture to match query by example images to images in a database. This probabilistic architecture provides support for multiple image features at varying levels of abstraction. Relevance feedback may be natively implemented in the model via diagnostic inference in the...
Conference Paper
This paper presents an image retrieval system based on Bayesian belief networks. This architecture offers several advantages when applied in the image retrieval domain. The features of the system are outlined as are the mechanics of the intra-network inference used for the content based retrieval of images
Conference Paper
Bayesian inference networks have found application in probabilistic information retrieval in the context of textual documents. The paper outlines an architecture whereby an inference network retrieval engine can be applied to multimedia retrieval. Initially, the system was developed to support the content based retrieval of images, however extensio...
Conference Paper
Bayesian belief networks have been used widely to solve many decision problem that involve uncertainty. One major advantage of this approach compared with other reasoning tools is its semantic richness in describing the decision process. Some inference algorithms for carrying out the reasoning process exist, but they are known to be computationally...
Conference Paper
This paper describes a new measure for calculating the error that has been introduced when an image is modified which can be used to compare the quality of images. It is based on the following principle: The quality of an image should be measured locally and globally. This implies that: (1) Since the change of each pixel value affects the quality o...
Article
Full-text available
Data warehouse is a dedicated database used for querying and reporting. Queries in this environment show special characteristics such as multidimensionality and aggregation. Exploiting the nature of queries, in this paper we propose a query driven design framework. The proposed framework is general and allows a designer to generate a schema based o...

Network

Cited By