Follow
Jinli Cao
Title
Cited by
Cited by
Year
Weighted visibility graph with complex network features in the detection of epilepsy
S Supriya, S Siuly, H Wang, J Cao, Y Zhang
IEEE access 4, 6554-6566, 2016
2002016
A flexible payment scheme and its role-based access control
H Wang, J Cao, Y Zhang
IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005
1762005
A probabilistic method for emerging topic tracking in microblog stream
J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang
World Wide Web 20, 325-350, 2017
1582017
Effective collaboration with information sharing in virtual universities
H Wang, Y Zhang, J Cao
IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008
992008
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
J Yin, MJ Tang, J Cao, H Wang
Knowledge-Based Systems 210, 106529, 2020
892020
Web services discovery and rank: An information retrieval approach
Y Hao, Y Zhang, J Cao
Future generation computer systems 26 (8), 1053-1062, 2010
882010
Building access control policy model for privacy preserving and testing policy conflicting problems
H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang
Access Control Management in Cloud Environments, 225-247, 2020
812020
A smart web service based on the context of things
J He, Y Zhang, G Huang, J Cao
ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012
812012
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning
MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang
World Wide Web Internet and Web Information Systems, 2021
77*2021
Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery
J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab
IEEE transactions on industrial informatics 19 (4), 5593-5601, 2022
742022
Distributed memetic algorithm for outsourced database fragmentation
YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang
IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020
732020
Ubiquitous computing environments and its usage access control
H Wang, Y Zhang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
722006
Achieving secure and flexible m-services through tickets
H Wang, Y Zhang, J Cao, V Varadharajan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003
722003
Access control management for ubiquitous computing
H Wang, Y Zhang, J Cao
Future Generation Computer Systems 24 (8), 870-878, 2008
702008
A knowledge graph empowered online learning framework for access control decision-making
M You, J Yin, H Wang, J Cao, K Wang, Y Miao, E Bertino
World Wide Web 26 (2), 827-848, 2023
672023
Anomaly detection in quasi-periodic time series based on automatic data segmentation and attentional LSTM-CNN
F Liu, X Zhou, J Cao, Z Wang, T Wang, H Wang, Y Zhang
IEEE Transactions on Knowledge and Data Engineering 34 (6), 2626-2640, 2020
652020
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation
YF Ge, M Orlowska, J Cao, H Wang, Y Zhang
The VLDB Journal 31 (5), 957-975, 2022
632022
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
552016
Ticket-based service access scheme for mobile users
H Wang, C Jinli, Y Zhang
University Of Tasmania, 2002
512002
An integrated MCI detection framework based on spectral-temporal analysis
J Yin, J Cao, S Siuly, H Wang
International Journal of Automation and Computing 16, 786-799, 2019
492019
The system can't perform the operation now. Try again later.
Articles 1–20