Weighted visibility graph with complex network features in the detection of epilepsy S Supriya, S Siuly, H Wang, J Cao, Y Zhang IEEE access 4, 6554-6566, 2016 | 161 | 2016 |
A flexible payment scheme and its role-based access control H Wang, J Cao, Y Zhang IEEE Transactions on knowledge and Data Engineering 17 (3), 425-436, 2005 | 159 | 2005 |
A probabilistic method for emerging topic tracking in microblog stream J Huang, M Peng, H Wang, J Cao, W Gao, X Zhang World Wide Web 20, 325-350, 2017 | 146 | 2017 |
Web services discovery and rank: An information retrieval approach Y Hao, Y Zhang, J Cao Future generation computer systems 26 (8), 1053-1062, 2010 | 88 | 2010 |
Effective collaboration with information sharing in virtual universities H Wang, Y Zhang, J Cao IEEE Transactions on Knowledge and Data Engineering 21 (6), 840-853, 2008 | 85 | 2008 |
A smart web service based on the context of things J He, Y Zhang, G Huang, J Cao ACM Transactions on Internet Technology (TOIT) 11 (3), 1-23, 2012 | 83 | 2012 |
Access control management for ubiquitous computing H Wang, Y Zhang, J Cao Future Generation Computer Systems 24 (8), 870-878, 2008 | 67 | 2008 |
Ubiquitous computing environments and its usage access control H Wang, Y Zhang, J Cao Proceedings of the 1st international conference on Scalable information …, 2006 | 63 | 2006 |
Building access control policy model for privacy preserving and testing policy conflicting problems H Wang, J Cao, Y Zhang, H Wang, J Cao, Y Zhang Access Control Management in Cloud Environments, 225-247, 2020 | 62 | 2020 |
Achieving secure and flexible m-services through tickets H Wang, Y Zhang, J Cao, V Varadharajan IEEE Transactions on Systems, Man, and Cybernetics-Part A: Systems and …, 2003 | 59 | 2003 |
Ticket-based service access scheme for mobile users H Wang, J Cao, Y Zhang Australian Computer Science Communications 24 (1), 285-292, 2002 | 45 | 2002 |
On optimal replication of data object at hierarchical and transparent web proxies X Jia, D Li, H Du, J Cao IEEE Transactions on Parallel and Distributed Systems 16 (8), 673-685, 2005 | 44 | 2005 |
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description J Yin, MJ Tang, J Cao, H Wang Knowledge-Based Systems 210, 106529, 2020 | 43 | 2020 |
Mtmr: Ensuring mapreduce computation integrity with merkle tree-based verifications Y Wang, Y Shen, H Wang, J Cao, X Jiang IEEE Transactions on Big Data 4 (3), 418-431, 2016 | 42 | 2016 |
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning MYYL Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang World Wide Web Internet and Web Information Systems, 2021 | 41* | 2021 |
A computer aided analysis scheme for detecting epileptic seizure from EEG data E Kabir, S Siuly, J Cao, H Wang International Journal of Computational Intelligence Systems 11 (1), 663-671, 2018 | 40 | 2018 |
High-performance flexible supercapacitor electrodes based on Te nanowire arrays J Cao, M Safdar, Z Wang, J He Journal of Materials Chemistry A 1 (34), 10024-10029, 2013 | 39 | 2013 |
Distributed memetic algorithm for outsourced database fragmentation YF Ge, WJ Yu, J Cao, H Wang, ZH Zhan, Y Zhang, J Zhang IEEE Transactions on Cybernetics 51 (10), 4808-4821, 2020 | 38 | 2020 |
Trustworthy answers for top-k queries on uncertain big data in decision making HTH Nguyen, J Cao Information Sciences 318, 73-90, 2015 | 35 | 2015 |
WSXplorer: Searching for desired web services Y Hao, Y Zhang, J Cao Advanced Information Systems Engineering: 19th International Conference …, 2007 | 33 | 2007 |