Weighted visibility graph with complex network features in the detection of epilepsy S Supriya, S Siuly, H Wang, J Cao, Y Zhang IEEE access 4, 6554-6566, 2016 | 191 | 2016 |
A flexible payment scheme and its role-based access control H Wang, J Cao, Y Zhang IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005 | 165 | 2005 |
A probabilistic method for emerging topic tracking in microblog stream J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang World Wide Web 20, 325-350, 2017 | 151 | 2017 |
Effective collaboration with information sharing in virtual universities H Wang, Y Zhang, J Cao IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008 | 89 | 2008 |
Web services discovery and rank: An information retrieval approach Y Hao, Y Zhang, J Cao Future generation computer systems 26 (8), 1053-1062, 2010 | 87 | 2010 |
A smart web service based on the context of things J He, Y Zhang, G Huang, J Cao ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012 | 80 | 2012 |
Building access control policy model for privacy preserving and testing policy conflicting problems H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang Access Control Management in Cloud Environments, 225-247, 2020 | 77 | 2020 |
Access control management for ubiquitous computing H Wang, Y Zhang, J Cao Future Generation Computer Systems 24 (8), 870-878, 2008 | 69 | 2008 |
Achieving secure and flexible m-services through tickets H Wang, Y Zhang, J Cao, V Varadharajan IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003 | 66 | 2003 |
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description J Yin, MJ Tang, J Cao, H Wang Knowledge-Based Systems 210, 106529, 2020 | 64 | 2020 |
Ubiquitous computing environments and its usage access control H Wang, Y Zhang, J Cao Proceedings of the 1st international conference on Scalable information …, 2006 | 64 | 2006 |
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang World Wide Web Internet and Web Information Systems, 2021 | 61* | 2021 |
Distributed memetic algorithm for outsourced database fragmentation YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020 | 60 | 2020 |
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation YF Ge, M Orlowska, J Cao, H Wang, Y Zhang The VLDB Journal 31 (5), 957-975, 2022 | 49 | 2022 |
Ticket-based service access scheme for mobile users H Wang, C Jinli, Y Zhang University Of Tasmania, 2002 | 48 | 2002 |
Knowledge-driven cybersecurity intelligence: software vulnerability coexploitation behavior discovery J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab IEEE transactions on industrial informatics 19 (4), 5593-5601, 2022 | 47 | 2022 |
Anomaly detection in quasi-periodic time series based on automatic data segmentation and attentional LSTM-CNN F Liu, X Zhou, J Cao, Z Wang, T Wang, H Wang, Y Zhang IEEE Transactions on Knowledge and Data Engineering 34 (6), 2626-2640, 2020 | 47 | 2020 |
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang IEEE Transactions on Big Data 4 (3), 418-431, 2016 | 47 | 2016 |
A knowledge graph empowered online learning framework for access control decision-making M You, J Yin, H Wang, J Cao, K Wang, Y Miao, E Bertino World Wide Web 26 (2), 827-848, 2023 | 46 | 2023 |
A computer aided analysis scheme for detecting epileptic seizure from EEG data E Kabir, Siuly, J Cao, H Wang International Journal of Computational Intelligence Systems 11 (1), 663-671, 2018 | 45 | 2018 |