Follow
Jinli Cao
Title
Cited by
Cited by
Year
Weighted visibility graph with complex network features in the detection of epilepsy
S Supriya, S Siuly, H Wang, J Cao, Y Zhang
IEEE access 4, 6554-6566, 2016
1612016
A flexible payment scheme and its role-based access control
H Wang, J Cao, Y Zhang
IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005
1592005
A probabilistic method for emerging topic tracking in microblog stream
J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang
World Wide Web 20, 325-350, 2017
1462017
Web services discovery and rank: An information retrieval approach
Y Hao, Y Zhang, J Cao
Future generation computer systems 26 (8), 1053-1062, 2010
882010
Effective collaboration with information sharing in virtual universities
H Wang, Y Zhang, J Cao
IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008
852008
A smart web service based on the context of things
J He, Y Zhang, G Huang, J Cao
ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012
832012
Access control management for ubiquitous computing
H Wang, Y Zhang, J Cao
Future Generation Computer Systems 24 (8), 870-878, 2008
672008
Ubiquitous computing environments and its usage access control
H Wang, Y Zhang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
632006
Building access control policy model for privacy preserving and testing policy conflicting problems
H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang
Access Control Management in Cloud Environments, 225-247, 2020
622020
Achieving secure and flexible m-services through tickets
H Wang, Y Zhang, J Cao, V Varadharajan
IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003
592003
Ticket-based service access scheme for mobile users
H Wang, J Cao, Y Zhang
Australian Computer Science Communications 24 (1), 285-292, 2002
452002
On optimal replication of data object at hierarchical and transparent web proxies
X Jia, D Li, H Du, J Cao
IEEE Transactions on Parallel and Distributed Systems 16 (8), 673-685, 2005
442005
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
J Yin, MJ Tang, J Cao, H Wang
Knowledge-Based Systems 210, 106529, 2020
432020
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications
Y Wang, Y Shen, H Wang, J Cao, X Jiang
IEEE Transactions on Big Data 4 (3), 418-431, 2016
422016
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning
MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang
World Wide Web Internet and Web Information Systems, 2021
41*2021
A computer aided analysis scheme for detecting epileptic seizure from EEG data
E Kabir, S Siuly, J Cao, H Wang
International Journal of Computational Intelligence Systems 11 (1), 663-671, 2018
402018
High-performance flexible supercapacitor electrodes based on Te nanowire arrays
J Cao, M Safdar, Z Wang, J He
Journal of Materials Chemistry A 1 (34), 10024-10029, 2013
392013
Distributed memetic algorithm for outsourced database fragmentation
YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang
IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020
382020
Trustworthy answers for top-k queries on uncertain big data in decision making
HTH Nguyen, J Cao
Information Sciences 318, 73-90, 2015
352015
WSXplorer: Searching for desired web services
Y Hao, Y Zhang, J Cao
Advanced Information Systems Engineering: 19th International Conference …, 2007
332007
The system can't perform the operation now. Try again later.
Articles 1–20