Weighted visibility graph with complex network features in the detection of epilepsy S Supriya, S Siuly, H Wang, J Cao, Y Zhang IEEE access 4, 6554-6566, 2016 | 200 | 2016 |
A flexible payment scheme and its role-based access control H Wang, J Cao, Y Zhang IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005 | 176 | 2005 |
A probabilistic method for emerging topic tracking in microblog stream J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang World Wide Web 20, 325-350, 2017 | 158 | 2017 |
Effective collaboration with information sharing in virtual universities H Wang, Y Zhang, J Cao IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008 | 99 | 2008 |
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description J Yin, MJ Tang, J Cao, H Wang Knowledge-Based Systems 210, 106529, 2020 | 89 | 2020 |
Web services discovery and rank: An information retrieval approach Y Hao, Y Zhang, J Cao Future generation computer systems 26 (8), 1053-1062, 2010 | 88 | 2010 |
Building access control policy model for privacy preserving and testing policy conflicting problems H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang Access Control Management in Cloud Environments, 225-247, 2020 | 81 | 2020 |
A smart web service based on the context of things J He, Y Zhang, G Huang, J Cao ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012 | 81 | 2012 |
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang World Wide Web Internet and Web Information Systems, 2021 | 77* | 2021 |
Knowledge-driven cybersecurity intelligence: Software vulnerability coexploitation behavior discovery J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab IEEE transactions on industrial informatics 19 (4), 5593-5601, 2022 | 74 | 2022 |
Distributed memetic algorithm for outsourced database fragmentation YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020 | 73 | 2020 |
Ubiquitous computing environments and its usage access control H Wang, Y Zhang, J Cao Proceedings of the 1st international conference on Scalable information …, 2006 | 72 | 2006 |
Achieving secure and flexible m-services through tickets H Wang, Y Zhang, J Cao, V Varadharajan IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003 | 72 | 2003 |
Access control management for ubiquitous computing H Wang, Y Zhang, J Cao Future Generation Computer Systems 24 (8), 870-878, 2008 | 70 | 2008 |
A knowledge graph empowered online learning framework for access control decision-making M You, J Yin, H Wang, J Cao, K Wang, Y Miao, E Bertino World Wide Web 26 (2), 827-848, 2023 | 67 | 2023 |
Anomaly detection in quasi-periodic time series based on automatic data segmentation and attentional LSTM-CNN F Liu, X Zhou, J Cao, Z Wang, T Wang, H Wang, Y Zhang IEEE Transactions on Knowledge and Data Engineering 34 (6), 2626-2640, 2020 | 65 | 2020 |
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation YF Ge, M Orlowska, J Cao, H Wang, Y Zhang The VLDB Journal 31 (5), 957-975, 2022 | 63 | 2022 |
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang IEEE Transactions on Big Data 4 (3), 418-431, 2016 | 55 | 2016 |
Ticket-based service access scheme for mobile users H Wang, C Jinli, Y Zhang University Of Tasmania, 2002 | 51 | 2002 |
An integrated MCI detection framework based on spectral-temporal analysis J Yin, J Cao, S Siuly, H Wang International Journal of Automation and Computing 16, 786-799, 2019 | 49 | 2019 |