Jinli Cao
Cited by
Cited by
A flexible payment scheme and its role-based access control
H Wang, J Cao, Y Zhang
IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005
Weighted visibility graph with complex network features in the detection of epilepsy
S Supriya, S Siuly, H Wang, J Cao, Y Zhang
IEEE access 4, 6554-6566, 2016
A probabilistic method for emerging topic tracking in microblog stream
J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang
World Wide Web 20, 325-350, 2017
Web services discovery and rank: An information retrieval approach
Y Hao, Y Zhang, J Cao
Future generation computer systems 26 (8), 1053-1062, 2010
Effective collaboration with information sharing in virtual universities
H Wang, Y Zhang, J Cao
IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008
A smart web service based on the context of things
J He, Y Zhang, G Huang, J Cao
ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012
Access control management for ubiquitous computing
H Wang, Y Zhang, J Cao
Future Generation Computer Systems 24 (8), 870-878, 2008
Ubiquitous computing environments and its usage access control
H Wang, Y Zhang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
Building access control policy model for privacy preserving and testing policy conflicting problems
H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang
Access Control Management in Cloud Environments, 225-247, 2020
Achieving secure and flexible m-services through tickets
H Wang, Y Zhang, J Cao, V Varadharajan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003
Ticket-based service access scheme for mobile users
H Wang, J Cao, Y Zhang
Australian Computer Science Communications 24 (1), 285-292, 2002
On optimal replication of data object at hierarchical and transparent web proxies
X Jia, D Li, H Du, J Cao
IEEE Transactions on Parallel and Distributed Systems 16 (8), 673-685, 2005
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
A computer aided analysis scheme for detecting epileptic seizure from EEG data
E Kabir, S Siuly, J Cao, H Wang
International Journal of Computational Intelligence Systems 11 (1), 663-671, 2018
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
J Yin, MJ Tang, J Cao, H Wang
Knowledge-Based Systems 210, 106529, 2020
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning
MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang
World Wide Web Internet and Web Information Systems, 2021
Distributed memetic algorithm for outsourced database fragmentation
YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang
IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020
High-performance flexible supercapacitor electrodes based on Te nanowire arrays
J Cao, M Safdar, Z Wang, J He
Journal of Materials Chemistry A 1 (34), 10024-10029, 2013
Trustworthy answers for top-k queries on uncertain big data in decision making
HTH Nguyen, J Cao
Information Sciences 318, 73-90, 2015
WSXplorer: Searching for desired web services
Y Hao, Y Zhang, J Cao
Advanced Information Systems Engineering: 19th International Conference …, 2007
The system can't perform the operation now. Try again later.
Articles 1–20