selected publications
-
academic article
-
Yin JTang MJCao JWang H. Apply transfer learning to cybersecurity: predicting exploitability of vulnerabilities by description.
Knowledge-Based Systems.
210:1-12.
2020
Full text if available -
Ge YYu WJCao JWang HZhan ZHZhang YZhang J. Distributed memetic algorithm for outsourced database fragmentation.
IEEE Transactions on Systems, Man and Cybernetics Part B: Cybernetics.
2020
Full text if available -
Mahdi OAPardede EAli NCao J. Diversity measure as a new drift detection method in data streaming.
Knowledge-Based Systems.
191.
2020
Full text if available -
Mahdi OAPardede EAli NCao J. Fast Reaction to Sudden Concept Drift in the Absence of Class Labels.
Applied Sciences (Switzerland).
10.
2020
Full text if available -
Yin JCao JSiuly SWang H. An Integrated MCI Detection Framework Based on Spectral-temporal Analysis.
International Journal of Automation and Computing.
16:786-799.
2019
Full text if available -
Liu FZhou XWang ZCao JWang HZhang Y. Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining.
Sensors.
19.
2019
Full text if available -
Kabir ESiulyCao JWang H. A computer aided analysis scheme for detecting epileptic seizure from EEG data.
International Journal of Computational Intelligence Systems.
11:663-671.
2018
Full text if available -
Tao LCao JLiu F. Dynamic feature weighting based on user preference sensitivity for recommender systems.
Knowledge-Based Systems.
149:61-75.
2018
Full text if available -
Mahdi OMehdi OIbrahim HAffendey LSPardede ECao J. Exploring Instances for Matching Heterogeneous Database Schemas Utilizing Google Similarity and Regular Expression.
Computer Science and Information Systems.
15:295-320.
2018
Full text if available -
Wang YShen YWang HCao JJiang X. MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-based Verifications.
IEEE Transactions on Big Data.
4:418-431.
2018
Full text if available -
Huang JPeng MWang HCao JGao WZhang X. A probabilistic method for emerging topic tracking in Microblog stream.
World Wide Web.
20:325-350.
2017
Full text if available -
Tao LCao JLiu F. Quantifying textual terms of items for similarity measurement.
Information Sciences.
415-416:269-282.
2017
Full text if available -
Trieu MNLCao JHe Z. Answering skyline queries on probabilistic data using the dominance of probabilistic skyline tuples.
Information Sciences.
340-341:58-85.
2016
Full text if available -
Yin X-XZhang YCao JWu J-LHadjiloucas S. Exploring the complementarity of THz pulse imaging and DCE-MRIs: Toward a unified multi-channel classification and a deep learning framework.
Computer Methods and Programs in Biomedicine.
137:87-114.
2016
Full text if available -
Supriya SSiuly SWang HCao JZhang Y. Weighted Visibility Graph with Complex Network Features in the Detection of Epilepsy.
IEEE Access.
4:6554-6566.
2016
Full text if available -
Vo LTHCao JRahayu W. Structured content-based query answers for improving information quality.
World Wide Web.
18:889-912.
2015
Full text if available -
Nguyen HTHCao J. Trustworthy answers for top-k queries on uncertain Big Data in decision making.
Information Sciences.
318:73-90.
2015
Full text if available -
Vo LTHCao JRahayu WNguyen H-Q. Structured content-aware discovery for improving XML data consistency.
Information Sciences.
248:168-190.
2013
Full text if available -
Liu DCao J. Scheduling para-virtualized virtual machines based on events.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
29:1130-1139.
2013
Full text if available -
Hao YZhang YCao J. A novel QoS model and computation framework in web service selection.
World Wide Web.
15:663-684.
2012
Full text if available -
Nguyen KCao J. Top-k answers for XML keyword queries.
World Wide Web.
15:485-515.
2012
Full text if available -
Nguyen KCao J. Top-K data source selection for keyword queries over multiple XML data sources.
Journal of Information Science.
38:156-175.
2012
Full text if available -
He JZhang YHuang GCao J. A smart web service based on the context of things.
ACM Transactions on Internet Technology.
11:1-23.
2012
Full text if available -
Wu LDuan JLi QCao JLiu WMin S. Identification of the Volatile Components in Tobacco by Gas Chromatograph Coupled with Ion Trap Tandem Mass Spectrometry.
Chinese Journal of Chemistry.
70:649-649.
2012
Full text if available -
Cao JJia XShu L. SPECIAL ISSUE: MULTIMEDIA DATA APPLICATIONS IN WIRELESS SENSOR NETWORKS.
International Journal of Sensor Networks.
11:1-2.
2012
-
Huang GZhang YHe JCao J. Fault Tolerance in Data Gathering Wireless Sensor Networks.
The Computer Journal.
54:976-987.
2011
Full text if available -
Wang SCao JHu J. A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
Journal of Network and Computer Applications.
34:116-120.
2011
Full text if available -
Hao YZhang YCao J. Web services discovery and rank: An information retrieval approach.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
26:1053-1062.
2010
Full text if available -
Xin YHe ZCao J. Effective pruning for XML structural match queries.
Data and Knowledge Engineering.
69:640-659.
2010
Full text if available -
Wang HCao JZhang Y. Delegating revocations and authorizations in collaborative business environments.
Information Systems Frontiers: a journal of research and innovation.
11:293-305.
2009
Full text if available -
Cao JHua WangYanchun ZhangJinli Cao. Effective Collaboration with Information Sharing in Virtual Universities.
IEEE Transactions on Knowledge and Data Engineering.
21:840-853.
2009
Full text if available -
Wang HZhang YCao J. Access control management for ubiquitous computing.
Future Generation Computer Systems: the international journal of grid computing: theory, methods and applications.
24:870-878.
2008
Full text if available -
Choudry BABertok PCao J. Cost based web services transaction management.
International Journal of Web and Grid Services.
2:198-198.
2006
Full text if available -
Xiaohua JiaDeying LiHongwei DuCao J. On optimal replication of data object at hierarchical and transparent Web proxies.
IEEE Transactions on Parallel and Distributed Systems.
16:673-685.
2005
Full text if available -
Cao JHua WangJinli CaoYanchun Zhang. A flexible payment scheme and its role-based access control.
IEEE Transactions on Knowledge and Data Engineering.
17:425-436.
2005
Full text if available -
Hou JCao J. Matrix model for web page community construction.
International Journal of Science and Research.
1:21-30.
2005
-
Wang HZhang YCao J. An Electronic Cash Scheme and its Management.
Concurrent Engineering: Research and Applications.
12:247-257.
2004
Full text if available -
Wang HZhang YCao JKambayahsi Y. A Global Ticket-Based Access Scheme for Mobile Users.
Information Systems Frontiers: a journal of research and innovation.
6:35-46.
2004
Full text if available -
Wang HCao JZhang YHuang X. A Flexible Electronic Payment Scheme and its Management.
Information.
7:187-196.
2004
-
Wang HZhang YCao JYang J. Specifying Role-Based Access Constraints with Object Constraint Language.
Lecture Notes in Computer Science.
3007:687-696.
2004
Full text if available -
Cao JHua WangYanchun ZhangJinli CaoVaradharajan V. Achieving secure and flexible M-services through tickets.
IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans.
33:697-708.
2003
Full text if available -
Hou JZhang YCao J. Web Page Clustering: A Hyperlink-Based Similarity and Matrix-Based Hierarchical Algorithms.
Lecture Notes in Computer Science.
2642:201-212.
2003
Full text if available -
Hou JZhang YCao JLai WRoss D. Visual Support for Information Retrieval based on Linear Algebra.
Journal of Applied Systems Studies: methodologies and applications for systems approaches.
3.
2002
-
Liu CZhou XCao JLin X. On incremental global update support in cooperative database systems.
Informatica: journal of computing and informatics.
24:27-31.
2000
-
ZHOU XLIN XLIU CCAO J. SPATIAL QUERY PROCESSING USING GENERALIZED FILTER.
International Journal of Cooperative Information Systems.
09:77-91.
2000
Full text if available
-
Yin JTang MJCao JWang H. Apply transfer learning to cybersecurity: predicting exploitability of vulnerabilities by description.
Knowledge-Based Systems.
210:1-12.
2020
-
book
-
Cao J. Database Systems for Advanced Applications
2012
Full text if available -
Cao J. Database and Expert Systems Applications
2011
Full text if available -
Cao J. Web Information Systems Engineering – WISE 2010
2010
Full text if available -
Cao J. Advanced Information Systems Engineering
2009
Full text if available -
Cao J. Database Systems for Advanced Applications
2009
Full text if available -
Cao J. Advances in Grid and Pervasive Computing
2008
Full text if available -
Cao J. Business Process Management Workshops
2008
Full text if available -
Cao J. Computational Science and Its Applications – ICCSA 2008
2008
Full text if available -
Cao J. Progress in WWW Research and Development
2008
Full text if available -
Cao J. Advanced Information Systems Engineering
2007
Full text if available -
Cao J. Frontiers of WWW Research and Development - APWeb 2006
2006
Full text if available -
Cao J. Advanced Web Technologies and Applications
2004
Full text if available -
Cao J. Web Technologies and Applications
2003
Full text if available
-
Cao J. Database Systems for Advanced Applications
2012
-
chapter
-
Nguyen HTHCao J. Preference-based top-k representative skyline queries on uncertain databases.
Lecture Notes in Computer Science.
280-292.
2015
Full text if available -
Wang HZhang YCCao JL. A flexible payment scheme and its user-role assignment.
Kluwer International Series in Engineering and Computer Science.
107-127.
2003
-
Nguyen HTHCao J. Preference-based top-k representative skyline queries on uncertain databases.
Lecture Notes in Computer Science.
280-292.
2015
-
conference paper
-
Yin JTang MJCao JWang HYou MLin Y. Adaptive online learning for vulnerability exploitation time prediction.
Lecture Notes in Computer Science.
252-266.
2020
Full text if available -
Yin JYou MCao JWang HTang MJGe YF. Data-driven hierarchical neural network modeling for high-pressure feedwater heater group.
Lecture Notes in Computer Science.
225-233.
2020
Full text if available -
Ge YCao JWang HZhang YChen Z. Distributed differential evolution for anonymity-driven vertical fragmentation in outsourced data storage.
Lecture Notes in Computer Science.
213-226.
2020
Full text if available -
Alrefae ACao JPardede E. Graph-based semantic query optimization for intensional XML data.
Advances in Soft Computing.
247-256.
2020
Full text if available -
Liu FZhou XCao JWang ZWang HZhang Y. A LSTM and CNN Based Assemble Neural Network Framework for Arrhythmias Classification.
ICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings.
1303-1307.
2019
Full text if available -
Ge YFCao JWang HYin JYu WJZhan ZHZhang J. A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation.
GECCO 2019 - Proceedings of the 2019 Genetic and Evolutionary Computation Conference.
771-776.
2019
Full text if available -
Liu FZhou XWang TCao JWang ZWang HZhang Y. An attention-based hybrid LSTM-CNN model for arrhythmias classification.
Proceedings of International Joint Conference on Neural Networks.
2019
Full text if available -
Liu FZhou XCao JWang ZWang HZhang Y. Arrhythmias Classification by Integrating Stacked Bidirectional LSTM and Two-Dimensional CNN.
Lecture Notes in Computer Science.
136-149.
2019
Full text if available -
Mahdi OPardede ECao J. Combination of information entropy and ensemble classification for detecting concept drift in data stream.
Proceedings of the Australasian Computer Science Week Multiconference 2018.
2018
Full text if available -
Alrefae ACao JPardede E. Graph database indexing layer for logic-based tree pattern matching over intensional XML document databases.
Lecture Notes in Computer Science.
577-588.
2018
Full text if available -
Vimalachandran PZhang YCao JSun LYong J. Preserving Data Privacy and Security in Australian My Health Record System: A Quality Health Care Implication.
Lecture Notes in Computer Science.
111-120.
2018
Full text if available -
Rasool RUWang HRafique WYong JCao J. A study on securing software defined networks.
Lecture Notes in Computer Science.
479-489.
2017
Full text if available -
Alrefae ACao J. Intensional XML-enabled web-based real-time decision support system.
Proceedings of the IEEE International Conference on Computing, Networking and Informatics, ICCNI 2017.
2017
Full text if available -
Ma TWang HCao JYong JZhao Y. Access control management with provenance in healthcare environments.
2016 IEEE 20th International Conference on Computer Supported Cooperative Work in Design (CSCWD).
545-550.
2016
Full text if available -
Tao LLiu FCao J. Taxonomy tree based similarity measurement of textual attributes of items for recommender systems.
Lecture Notes in Computer Science.
294-301.
2016
Full text if available -
Nguyen HTHCao J. Top-k dominance range-based uncertain queries.
Lecture Notes in Computer Science.
191-203.
2016
Full text if available -
Puansurin KCao J. Simulation Application for Improving the Efficiency of New Distribution Centers.
Proceedings - IEEE International Symposium on Distributed Simulation and Real-Time Applications, DS-RT.
128-135.
2015
Full text if available -
Alrefae ACao J. Web-based real-time decision support system - Active XML-based metadata.
2014 Global Summit on Computer & Information Technology (GSCIT).
1-4.
2014
Full text if available -
Le TMNCao JHe Z. Top-k best probability queries and semantics ranking properties on probabilistic databases.
Data and Knowledge Engineering.
248-266.
2013
Full text if available -
Liu DCao JCao J. FEAS: A full-time event aware scheduler for improving responsiveness of virtual machines.
Conferences in Research and Practice in Information Technology Series.
3-9.
2012
-
Yang YCao J. Feature-based recommendation framework on OLAP.
Conferences in Research and Practice in Information Technology Series.
81-88.
2012
-
Le TMNCao J. Top-k Best Probability Queries on Probabilistic Data.
Lecture Notes in Computer Science.
1-16.
2012
Full text if available -
Vo LTHCao JRahayu W. Discovering conditional functional dependencies in xml data.
Conferences in Research and Practice in Information Technology Series.
143-152.
2011
-
Nguyen KTCao J. K-Graphs: selecting top-k data sources for XML keyword queries.
Lecture Notes in Computer Science.
425-439.
2011
Full text if available -
Nguyen KCao J. Exploit keyword query semantics and structure of data for effective xml keyword search.
Conferences in Research and Practice in Information Technology Series.
133-140.
2010
-
Ma JCao JZhang Y. Efficiently supporting secure and reliable collaboration in scientific workflows.
Journal of Computer and System Sciences.
475-489.
2010
Full text if available -
Choudry BCao J. Coordinating Business Web Services.
Proceedings of the 12th International Conference on Information Integration and Web-based A[pplications and Services (iiWAS2010).
89-95.
2010
-
Choudry BACao J. Coordinating business web services.
Proceedings of the 12th International Conference on Information Integration and Web-based Applications & Services - iiWAS '10.
91-97.
2010
Full text if available -
Nguyen KCao J. Relevant Answers for XML Keyword Search: A Skyline Approach.
Lecture Notes in Computer Science.
216-224.
2010
Full text if available -
Shen HTHuang ZCao JZhou X. High-dimensional indexing with oriented cluster representation for multimedia databases.
Proceedings - IEEE International Conference on Multimedia and Expo.
1628-1631.
2009
Full text if available -
Hao YCao JZhang Y. Efficient IR-Style Search over Web Services.
Lecture Notes in Computer Science.
305-318.
2009
Full text if available -
Tang MCao JJia XLiu K-Y. Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks.
Lecture Notes in Computer Science.
77-91.
2009
Full text if available -
Dao D-BCao J. A Glance on Current XML Twig Pattern Matching Algorithms.
Lecture Notes in Computer Science.
307-321.
2008
Full text if available -
Tang MCao JJia X. Efficient power management for Wireless Sensor Networks: A data-driven approach.
2008 33rd IEEE Conference on Local Computer Networks (LCN).
106-113.
2008
Full text if available -
Minh TLe NCao J. Flexible and Semantics-Based Support for Web Services Transaction Protocols.
Lecture Notes in Computer Science.
492-503.
2008
Full text if available -
Nguyen KCao JLiu C. Semantic-Enabled Organization of Web Services.
Lecture Notes in Computer Science.
511-521.
2008
Full text if available -
Tang MCao J. An energy-efficient data-driven power management for wireless sensor networks.
Proceedings of the 5th workshop on Data management for sensor networks - DMSN '08.
21-27.
2008
Full text if available -
Wang HCao J. Delegating Revocations and Authorizations.
Lecture Notes in Computer Science.
294-305.
2008
Full text if available -
Tang MCao JJia X. Efficient Power Management for Wireless Sensor Networks: a Data-Driven Approach.
Conference on Local Computer Networks.
95-+.
2008
-
Cao JMingJian TangJinli Cao. Optimization on distributed user management in Wireless Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS.
1-8.
2007
Full text if available -
Tang MCao JChilamkurti NK. TAMPA: Tabu Search-Based Multiple Queries Optimization for Wireless Sensor Networks.
2007 International Conference on Wireless Communications, Networking and Mobile Computing.
2731-2734.
2007
Full text if available -
Wang LCao J. Web Services Semantic Searching enhanced by Case Reasoning.
Proceedings - International Workshop on Database and Expert Systems Applications, DEXA.
565-569.
2007
Full text if available -
Ma JCao JZhang Y. A probabilistic semantic approach for discovering web services.
Proceedings of the 16th international conference on World Wide Web - WWW '07.
1221-1222.
2007
Full text if available -
Tang MCao J. Optimization on distributed user management in Wireless Sensor Networks.
Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS.
9-16.
2007
-
Choudry BCao J. Towards dynamic integration of heterogenrous web services transaction partners..
The Ninth International Conference on Information Integration and Web-based Applications & Services (iiWAS2007): December 3 - 5, 2007 Jakarta, Indonesia.
89-99.
2007
-
Hao YZhang YCao J. WSXplorer: Searching for Desired Web Services.
Lecture Notes in Computer Science.
173-187.
2007
Full text if available -
Tang MCao J. A dynamic mechanism for handling mobile computing environmental changes.
Proceedings of the 1st international conference on Scalable information systems - InfoScale '06.
1-9.
2006
Full text if available -
Cao J. Proceedings of the 1st international conference on Scalable information systems - InfoScale '06
2006
Full text if available -
Wang HCao JRoss D. Role-Based Delegation with Negative Authorization.
Lecture Notes in Computer Science.
307-318.
2006
Full text if available -
Wang HZhang YCao J. Ubiquitous computing environments and its usage access control.
Proceedings of the 1st international conference on Scalable information systems - InfoScale '06.
1-9.
2006
Full text if available -
Wang HSun LZhang YCao J. Authorization algorithms for the mobility of user-role relationship.
Conferences in Research and Practice in Information Technology Series.
69-78.
2005
-
Choudry BBertok PCao J. A cost based coordination model for long running transactions in web services..
The Seventh International Conference on Information Integration and Web-based Applications & Services : (iiWAS 2005), September 19-21, 2005, Kuala Lumpur, Malaysia.
97-108.
2005
-
Cao JLogothetis RJinli Cao. Web Services Oriented Transactons Using Partial Dependecies.
2005 International Conference on Information and Communication Technology.
619-632.
2005
Full text if available -
Cao JSun LWang H. Web Technologies Research and Development - APWeb 2005.
Lecture Notes in Computer Science.
296-307.
2005
Full text if available -
Wang HSun LZhang YCao J. Anonymous Access Scheme for Electronic-services.
Proceedings of the twenty-seventh Australasian Computer Science Conference (ACSC 2004).
295-304.
2004
-
Hou JCao J. Mining More Gold from Web Page Hyperlinks.
The sixth International Conference on Information Integration and web-based Applications & Services (iiWAS 2004).
283-292.
2004
-
Wang HCao JZhang Y. A flexible payment scheme and its permission-role assignment..
Computer science 2003: proceedings of the Twenty-Sixth Australasian Computer Science Conference (ACSC 2003).
189-198.
2003
-
Wang HZhang YCao J. Formal Authorization Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations.
Database technologies 2003 : proceedings of the fourteenth Australasian Database Conference (ADC 2003).
125-133.
2003
-
Wang HCao J. Building a consumer scalable anonymity payment protocol for Internet purchases.
Proceedings of the IEEE Great Lakes Symposium on VLSI.
159-168.
2002
Full text if available -
Wang HCao JKambayahsi Y. Building consumer self-anonymity scalable payment protocol for internet purchases.
Proceedings of the 12th International Workshop on Research Issues on Data Engineering: Engineering E-Commerce/E-Business Systems (RIDE-2EC'2002).
159-168.
2002
-
Cao JHua WangJinli CaoYanchun Zhang. Formal authorization allocation approaches for role-based access control based on relational algebra operations.
Proceedings of the Third International Conference on Web Information Systems Engineering, 2002. WISE 2002..
301-310.
2002
Full text if available -
Cao JWang LJia X. Minimize execution time of distributed transactions on heterogeneous databases.
Proceedings of the IASTED International Conference on Networks, Parallel and Distributed Processing and Applications (NPDPA02).
229-234.
2002
-
Wang HCao JZhang Y. Ticket-based service access scheme for mobile users.
25th Australian Computer Science Conference (ACSC2002).
285-292.
2002
-
Wang HCao JZhang Y. A consumer anonymity scalable payment scheme with role bases access control.
Proceedings of the 2nd International Conference on Web Information Systems Engineering (WISE 2001).
53-62.
2001
-
Cao JHua WangJinli CaoYanchun Zhang. A consumer scalable anonymity payment scheme with role based access control.
Proceedings of the Second International Conference on Web Information Systems Engineering.
53-62.
2001
Full text if available -
Cao JOrlowski M. On performance of cooperative transactions in multibase systems.
Proceedings of the 16th International Symposium on Computer and Information Sciences (ISCIS XVI).
120-127.
2001
-
Hou JZhang YCao JLai W. Visual support for text information retrieval based on matrix's singular value decomposition.
Proceedings of the First International Conference on Web Information Systems Engineering.
344-351.
2000
Full text if available
-
Yin JTang MJCao JWang HYou MLin Y. Adaptive online learning for vulnerability exploitation time prediction.
Lecture Notes in Computer Science.
252-266.
2020