Остановите войну!
for scientists:
default search action
Hua Wang 0002
- > Home > Persons > Hua Wang 0002
Publications
- 2024
- [j135]Yong-Feng Ge, Elisa Bertino, Hua Wang, Jinli Cao, Yanchun Zhang:
Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency. ACM Trans. Knowl. Discov. Data 18(1): 20:1-20:23 (2024) - [j134]Yong-Feng Ge, Hua Wang, Jinli Cao, Yanchun Zhang, Xiaohong Jiang:
Privacy-preserving data publishing: an information-driven distributed genetic algorithm. World Wide Web (WWW) 27(1): 1 (2024) - 2023
- [j126]Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang, Mamoun Alazab:
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery. IEEE Trans. Ind. Informatics 19(4): 5593-5601 (2023) - [j123]Mingshan You, Jiao Yin, Hua Wang, Jinli Cao, Kate N. Wang, Yuan Miao, Elisa Bertino:
A knowledge graph empowered online learning framework for access control decision-making. World Wide Web (WWW) 26(2): 827-848 (2023) - [c156]Shaodong Han, Yingqun Chen, Guihong Chen, Jiao Yin, Hua Wang, Jinli Cao:
Multi-step reinforcement learning-based offloading for vehicle edge computing. ICACI 2023: 1-8 - [c151]Mingshan You, Yong-Feng Ge, Kate N. Wang, Hua Wang, Jinli Cao, Georgios Kambourakis:
TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization. WISE 2023: 235-244 - [c150]Jiao Yin, Guihong Chen, Wei Hong, Hua Wang, Jinli Cao, Yuan Miao:
Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction. WISE 2023: 289-299 - [p3]Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang:
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. Emerging Trends in Cybersecurity Applications 2023: 371-389 - 2022
- [j119]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You:
A real-time dynamic concept adaptive learning algorithm for exploitability prediction. Neurocomputing 472: 252-265 (2022) - [j118]Yong-Feng Ge, Zhi-Hui Zhan, Jinli Cao, Hua Wang, Yanchun Zhang, Kuei-Kuei Lai, Jun Zhang:
DSGA: A Distributed Segment-Based Genetic Algorithm for Multi-Objective Outsourced Database Partitioning. Inf. Sci. 612: 864-886 (2022) - [j114]Fan Liu, Xingshe Zhou, Jinli Cao, Zhu Wang, Tianben Wang, Hua Wang, Yanchun Zhang:
Anomaly Detection in Quasi-Periodic Time Series Based on Automatic Data Segmentation and Attentional LSTM-CNN. IEEE Trans. Knowl. Data Eng. 34(6): 2626-2640 (2022) - [j111]Yong-Feng Ge, Maria E. Orlowska, Jinli Cao, Hua Wang, Yanchun Zhang:
MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation. VLDB J. 31(5): 957-975 (2022) - [j109]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You, Yongzheng Lin:
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25(1): 401-423 (2022) - [c142]Wei Hong, Jiao Yin, Mingshan You, Hua Wang, Jinli Cao, Jianxin Li, Ming Liu:
Graph Intelligence Enhanced Bi-Channel Insider Threat Detection. NSS 2022: 86-102 - [c141]Yong-Feng Ge, Hua Wang, Jinli Cao, Yanchun Zhang:
An Information-Driven Genetic Algorithm for Privacy-Preserving Data Publishing. WISE 2022: 340-354 - 2021
- [j107]Yong-Feng Ge, Jinli Cao, Hua Wang, Zhenxiang Chen, Yanchun Zhang:
Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation. Data Sci. Eng. 6(4): 380-391 (2021) - [j103]Yong-Feng Ge, Maria E. Orlowska, Jinli Cao, Hua Wang, Yanchun Zhang:
Knowledge transfer-based distributed differential evolution for dynamic database fragmentation. Knowl. Based Syst. 229: 107325 (2021) - [j99]Yong-Feng Ge, Wei-jie Yu, Jinli Cao, Hua Wang, Zhi-Hui Zhan, Yanchun Zhang, Jun Zhang:
Distributed Memetic Algorithm for Outsourced Database Fragmentation. IEEE Trans. Cybern. 51(10): 4808-4821 (2021) - [c134]Mingshan You, Jiao Yin, Hua Wang, Jinli Cao, Yuan Miao:
A Minority Class Boosted Framework for Adaptive Access Control Decision-Making. WISE (1) 2021: 143-157 - 2020
- [b1]Hua Wang, Jinli Cao, Yanchun Zhang:
Access Control Management in Cloud Environments. Springer 2020, ISBN 978-3-030-31728-7, pp. 3-297 - [j82]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang:
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. Knowl. Based Syst. 210: 106529 (2020) - [c131]Jiao Yin, Mingshan You, Jinli Cao, Hua Wang, MingJian Tang, Yong-Feng Ge:
Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group. ADC 2020: 225-233 - [c121]Yong-Feng Ge, Jinli Cao, Hua Wang, Yanchun Zhang, Zhenxiang Chen:
Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage. WISE (2) 2020: 213-226 - [c120]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You, Yongzheng Lin:
Adaptive Online Learning for Vulnerability Exploitation Time Prediction. WISE (2) 2020: 252-266 - 2019
- [j66]Jiao Yin, Jinli Cao, Siuly Siuly, Hua Wang:
An Integrated MCI Detection Framework Based on Spectral-temporal Analysis. Int. J. Autom. Comput. 16(6): 786-799 (2019) - [j60]Fan Liu, Xingshe Zhou, Zhu Wang, Jinli Cao, Hua Wang, Yanchun Zhang:
Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining. Sensors 19(7): 1489 (2019) - [c117]Yong-Feng Ge, Jinli Cao, Hua Wang, Jiao Yin, Wei-jie Yu, Zhi-Hui Zhan, Jun Zhang:
A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation. GECCO 2019: 771-776 - [c116]Fan Liu, Xingshe Zhou, Jinli Cao, Zhu Wang, Hua Wang, Yanchun Zhang:
A LSTM and CNN Based Assemble Neural Network Framework for Arrhythmias Classification. ICASSP 2019: 1303-1307 - [c114]Fan Liu, Xingshe Zhou, Tianben Wang, Jinli Cao, Zhu Wang, Hua Wang, Yanchun Zhang:
An Attention-based Hybrid LSTM-CNN Model for Arrhythmias Classification. IJCNN 2019: 1-8 - [c110]Fan Liu, Xingshe Zhou, Jinli Cao, Zhu Wang, Hua Wang, Yanchun Zhang:
Arrhythmias Classification by Integrating Stacked Bidirectional LSTM and Two-Dimensional CNN. PAKDD (2) 2019: 136-149 - 2018
- [j54]Md. Enamul Kabir, Siuly, Jinli Cao, Hua Wang:
A computer aided analysis scheme for detecting epileptic seizure from EEG data. Int. J. Comput. Intell. Syst. 11(1): 663-671 (2018) - [j53]Yongzhi Wang, Yulong Shen, Hua Wang, Jinli Cao, Xiaohong Jiang:
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications. IEEE Trans. Big Data 4(3): 418-431 (2018) - 2017
- [j41]Jiajia Huang, Min Peng, Hua Wang, Jinli Cao, Wang Gao, Xiuzhen Zhang:
A probabilistic method for emerging topic tracking in Microblog stream. World Wide Web 20(2): 325-350 (2017) - [c89]Raihan Ur Rasool, Hua Wang, Wajid Rafique, Jianming Yong, Jinli Cao:
A Study on Securing Software Defined Networks. WISE (2) 2017: 479-489 - 2016
- [j39]Supriya, Siuly Siuly, Hua Wang, Jinli Cao, Yanchun Zhang:
Weighted Visibility Graph With Complex Network Features in the Detection of Epilepsy. IEEE Access 4: 6554-6566 (2016) - [c84]Taotao Ma, Hua Wang, Jinli Cao, Jianming Yong, Yueai Zhao:
Access control management with provenance in healthcare environments. CSCWD 2016: 545-550 - 2009
- [j9]Hua Wang, Jinli Cao, Yanchun Zhang:
Delegating revocations and authorizations in collaborative business environments. Inf. Syst. Frontiers 11(3): 293-305 (2009) - [j7]Hua Wang, Yanchun Zhang, Jinli Cao:
Effective Collaboration with Information Sharing in Virtual Universities. IEEE Trans. Knowl. Data Eng. 21(6): 840-853 (2009) - 2008
- [j6]Hua Wang, Yanchun Zhang, Jinli Cao:
Access control management for ubiquitous computing. Future Gener. Comput. Syst. 24(8): 870-878 (2008) - 2007
- [c21]Hua Wang, Jinli Cao:
Delegating Revocations and Authorizations. Business Process Management Workshops 2007: 294-305 - 2006
- [c17]Hua Wang, Jinli Cao, David Ross:
Role-Based Delegation with Negative Authorization. APWeb 2006: 307-318 - [c14]Hua Wang, Yanchun Zhang, Jinli Cao:
Ubiquitous computing environments and its usage access control. Infoscale 2006: 6 - 2005
- [j4]Hua Wang, Jinli Cao, Yanchun Zhang:
A Flexible Payment Scheme and Its Role-Based Access Control. IEEE Trans. Knowl. Data Eng. 17(3): 425-436 (2005) - [c11]Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Authorization Algorithms for the Mobility of User-Role Relationship. ACSC 2005: 69-78 - [c10]Jinli Cao, Lili Sun, Hua Wang:
Towards Secure XML Document with Usage Control. APWeb 2005: 296-307 - 2004
- [j3]Hua Wang, Yanchun Zhang, Jinli Cao:
An Electronic Cash Scheme and its Management. Concurr. Eng. Res. Appl. 12(3): 247-257 (2004) - [j2]Hua Wang, Yanchun Zhang, Jinli Cao, Yahiko Kambayashi:
A Global Ticket-Based Access Scheme for Mobile Users. Inf. Syst. Frontiers 6(1): 35-46 (2004) - [c9]Hua Wang, Lili Sun, Yanchun Zhang, Jinli Cao:
Anonymous Access Scheme for Electronic Services. ACSC 2004: 295-304 - [c8]Hua Wang, Yanchun Zhang, Jinli Cao, Jian Yang:
Specifying Role-Based Access Constraints with Object Constraint Language. APWeb 2004: 687-696 - 2003
- [j1]Hua Wang, Yanchun Zhang, Jinli Cao, Vijay Varadharajan:
Achieving secure and flexible M-services through tickets. IEEE Trans. Syst. Man Cybern. Part A 33(6): 697-708 (2003) - [c7]Hua Wang, Jinli Cao, Yanchun Zhang:
A Flexible Payment Scheme and its Permission-Role Assignment. ACSC 2003: 189-198 - [c6]Hua Wang, Yanchun Zhang, Jinli Cao:
Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations. ADC 2003: 125-133 - 2002
- [c5]Hua Wang, Jinli Cao, Yanchuan Zhang:
Ticket-Based Service Access Scheme for Mobile Users. ACSC 2002: 285-292 - [c4]Hua Wang, Jinli Cao, Yahiko Kambayashi:
Building consumer self-anonymity scalable payment protocol for Internet purchase. RIDE 2002: 159-168 - [c3]Hua Wang, Jinli Cao, Yanchun Zhang:
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations. WISE 2002: 301-312 - 2001
- [c2]Hua Wang, Jinli Cao, Yanchun Zhang:
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control. WISE (1) 2001: 53-62
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint