Follow
Jingwei Huang
Title
Cited by
Cited by
Year
Trust mechanisms for cloud computing
J Huang, DM Nicol
Journal of Cloud Computing: Advances, Systems and Applications 2, 1-14, 2013
3662013
An ontology of trust: formal semantics and transitivity
J Huang, MS Fox
Proceedings of the 8th international conference on Electronic commerce: The …, 2006
1822006
A calculus of trust and its application to PKI and identity management
J Huang, D Nicol
Proceedings of the 8th Symposium on Identity and Trust on the Internet, 23-37, 2009
1262009
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
1082012
A formal-semantics-based calculus of trust
J Huang, D Nicol
IEEE Internet Computing 14 (5), 38-46, 2010
932010
Knowledge provenance in enterprise information
MS Fox*, J Huang
International Journal of Production Research 43 (20), 4471-4492, 2005
472005
Knowledge discovery from big data for intrusion detection using LDA
J Huang, Z Kalbarczyk, DM Nicol
2014 IEEE International Congress on Big Data, 760-761, 2014
422014
Uncertainty in knowledge provenance
J Huang, MS Fox
European Semantic Web Symposium, 372-387, 2004
402004
Towards digital engineering: the advent of digital systems engineering
J Huang, A Gheorghe, H Handley, P Pazos, A Pinto, S Kovacic, A Collins, ...
International Journal of System of Systems Engineering 10 (3), 234-261, 2020
382020
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge
MS Fox, J Huang
University of Toronto, 2003
352003
Towards trustworthy smart cyber-physical-social systems in the era of internet of things
J Huang, MD Seck, A Gheorghe
2016 11th System of Systems Engineering Conference (SoSE), 1-6, 2016
342016
Next-generation access control for distributed control systems
JH Huh, RB Bobba, T Markham, DM Nicol, J Hull, A Chernoguzov, ...
IEEE Internet Computing 20 (5), 28-37, 2016
312016
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge
J Huang
University of Toronto, 2008
312008
Reinforcement learning for automatic quadrilateral mesh generation: A soft actor–critic approach
J Pan, J Huang, G Cheng, Y Zeng
Neural Networks 157, 288-304, 2023
262023
Denial-of-service threat to Hadoop/YARN clusters with multi-tenancy
J Huang, DM Nicol, RH Campbell
2014 IEEE International Congress on Big Data, 48-55, 2014
262014
Cluster resource scheduling in cloud computing: literature review and research challenges
W Khallouli, J Huang
The Journal of supercomputing 78 (5), 6898-6943, 2022
252022
Trust judgment in knowledge provenance
J Huang, MS Fox
16th International Workshop on Database and Expert Systems Applications …, 2005
222005
Dynamic knowledge provenance
J Huang, MS Fox
Proceedings of Business Agents and Semantic Web Workshop, 11-20, 2004
212004
Machine learning in requirements elicitation: a literature review
C Cheligeer, J Huang, G Wu, N Bhuiyan, Y Xu, Y Zeng
AI EDAM 36, e32, 2022
192022
Assessing trust in the long-term protection of documents
M Vigil, D Cabarcas, J Buchmann, J Huang
2013 IEEE Symposium on Computers and Communications (ISCC), 000185-000191, 2013
192013
The system can't perform the operation now. Try again later.
Articles 1–20