Jinli Cao

Orcid: 0000-0002-0221-6361

According to our database1, Jinli Cao authored at least 128 papers between 1999 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A heterogeneous graph-based semi-supervised learning framework for access control decision-making.
World Wide Web (WWW), July, 2024

Privacy-preserving data publishing: an information-driven distributed genetic algorithm.
World Wide Web (WWW), January, 2024

Distributed Cooperative Coevolution of Data Publishing Privacy and Transparency.
ACM Trans. Knowl. Discov. Data, January, 2024

Evolutionary Dynamic Database Partitioning Optimization for Privacy and Utility.
IEEE Trans. Dependable Secur. Comput., 2024

An optimized Q-Learning algorithm for mobile robot local path planning.
Knowl. Based Syst., 2024

When decoupled GCN meets group discrimination: A special graph contrastive learning framework.
Neurocomputing, 2024

Federated Genetic Algorithm: Two-Layer Privacy-Preserving Trajectory Data Publishing.
Proceedings of the Genetic and Evolutionary Computation Conference, 2024

2023
A deep reinforcement learning-based wireless body area network offloading optimization strategy for healthcare services.
Health Inf. Sci. Syst., December, 2023

Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery.
IEEE Trans. Ind. Informatics, April, 2023

A knowledge graph empowered online learning framework for access control decision-making.
World Wide Web (WWW), March, 2023

A Personalized Explainable Learner Implicit Friend Recommendation Method.
Data Sci. Eng., March, 2023

Multiplex network community detection algorithm based on motif awareness.
Knowl. Based Syst., 2023

TLEF: Two-Layer Evolutionary Framework for t-Closeness Anonymization.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Empowering Vulnerability Prioritization: A Heterogeneous Graph-Driven Framework for Exploitability Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Blockchain-Empowered Resource Allocation and Data Security for Efficient Vehicular Edge Computing.
Proceedings of the Web Information Systems Engineering - WISE 2023, 2023

Anomaly Detection in Quasi-Periodic Time Series based on Automatic Data Segmentation and Attentional LSTM-CNN (Extended Abstract).
Proceedings of the 39th IEEE International Conference on Data Engineering, 2023

Multi-step reinforcement learning-based offloading for vehicle edge computing.
Proceedings of the 15th International Conference on Advanced Computational Intelligence, 2023

A Study on Historical Behaviour Enabled Insider Threat Prediction.
Proceedings of the Web and Big Data - 7th International Joint Conference, 2023

Probabilistic Reverse Top-k Query on Probabilistic Data.
Proceedings of the Databases Theory and Applications, 2023

Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management.
Proceedings of the Emerging Trends in Cybersecurity Applications, 2023

2022
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning.
World Wide Web, 2022

MDDE: multitasking distributed differential evolution for privacy-preserving database fragmentation.
VLDB J., 2022

Anomaly Detection in Quasi-Periodic Time Series Based on Automatic Data Segmentation and Attentional LSTM-CNN.
IEEE Trans. Knowl. Data Eng., 2022

DSGA: A Distributed Segment-Based Genetic Algorithm for Multi-Objective Outsourced Database Partitioning.
Inf. Sci., 2022

A real-time dynamic concept adaptive learning algorithm for exploitability prediction.
Neurocomputing, 2022

Motif-based embedding label propagation algorithm for community detection.
Int. J. Intell. Syst., 2022

An Information-Driven Genetic Algorithm for Privacy-Preserving Data Publishing.
Proceedings of the Web Information Systems Engineering - WISE 2022, 2022

Graph Intelligence Enhanced Bi-Channel Insider Threat Detection.
Proceedings of the Network and System Security - 16th International Conference, 2022

2021
A fast local community detection algorithm in complex networks.
World Wide Web, 2021

Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments.
IEEE Trans. Ind. Informatics, 2021

Distributed Memetic Algorithm for Outsourced Database Fragmentation.
IEEE Trans. Cybern., 2021

Knowledge transfer-based distributed differential evolution for dynamic database fragmentation.
Knowl. Based Syst., 2021

Set-Based Adaptive Distributed Differential Evolution for Anonymity-Driven Database Fragmentation.
Data Sci. Eng., 2021

A Minority Class Boosted Framework for Adaptive Access Control Decision-Making.
Proceedings of the Web Information Systems Engineering - WISE 2021, 2021

2020
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description.
Knowl. Based Syst., 2020

Diversity measure as a new drift detection method in data streaming.
Knowl. Based Syst., 2020

Adaptive Online Learning for Vulnerability Exploitation Time Prediction.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Distributed Differential Evolution for Anonymity-Driven Vertical Fragmentation in Outsourced Data Storage.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group.
Proceedings of the Databases Theory and Applications, 2020

Access Control Management in Cloud Environments
Springer, ISBN: 978-3-030-31728-7, 2020

2019
Unobtrusive Mattress-Based Identification of Hypertension by Integrating Classification and Association Rule Mining.
Sensors, 2019

An Integrated MCI Detection Framework Based on Spectral-temporal Analysis.
Int. J. Autom. Comput., 2019

Arrhythmias Classification by Integrating Stacked Bidirectional LSTM and Two-Dimensional CNN.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2019

An Attention-based Hybrid LSTM-CNN Model for Arrhythmias Classification.
Proceedings of the International Joint Conference on Neural Networks, 2019

A LSTM and CNN Based Assemble Neural Network Framework for Arrhythmias Classification.
Proceedings of the IEEE International Conference on Acoustics, 2019

A benefit-driven genetic algorithm for balancing privacy and utility in database fragmentation.
Proceedings of the Genetic and Evolutionary Computation Conference, 2019

Graph-Based Semantic Query Optimization for Intensional XML Data.
Proceedings of the Complex, Intelligent, and Software Intensive Systems, 2019

2018
MtMR: Ensuring MapReduce Computation Integrity with Merkle Tree-Based Verifications.
IEEE Trans. Big Data, 2018

Dynamic feature weighting based on user preference sensitivity for recommender systems.
Knowl. Based Syst., 2018

A computer aided analysis scheme for detecting epileptic seizure from EEG data.
Int. J. Comput. Intell. Syst., 2018

Exploring instances for matching heterogeneous database schemas utilizing Google similarity and regular expression.
Comput. Sci. Inf. Syst., 2018

Preserving Data Privacy and Security in Australian My Health Record System: A Quality Health Care Implication.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

Graph Database Indexing Layer for Logic-Based Tree Pattern Matching Over Intensional XML Document Databases.
Proceedings of the Computational Science and Its Applications - ICCSA 2018, 2018

Combination of information entropy and ensemble classification for detecting concept drift in data stream.
Proceedings of the Australasian Computer Science Week Multiconference, 2018

2017
A probabilistic method for emerging topic tracking in Microblog stream.
World Wide Web, 2017

Quantifying textual terms of items for similarity measurement.
Inf. Sci., 2017

A Study on Securing Software Defined Networks.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

2016
Answering skyline queries on probabilistic data using the dominance of probabilistic skyline tuples.
Inf. Sci., 2016

Weighted Visibility Graph With Complex Network Features in the Detection of Epilepsy.
IEEE Access, 2016

Taxonomy Tree Based Similarity Measurement of Textual Attributes of Items for Recommender Systems.
Proceedings of the Web Information Systems Engineering - WISE 2016, 2016

Access control management with provenance in healthcare environments.
Proceedings of the 20th IEEE International Conference on Computer Supported Cooperative Work in Design, 2016

Top-k Dominance Range-Based Uncertain Queries.
Proceedings of the Databases Theory and Applications, 2016

2015
Structured content-based query answers for improving information quality.
World Wide Web, 2015

Trustworthy answers for top-k queries on uncertain Big Data in decision making.
Inf. Sci., 2015

Preference-Based Top-k Representative Skyline Queries on Uncertain Databases.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Simulation Application for Improving the Efficiency of New Distribution Centers.
Proceedings of the 19th IEEE/ACM International Symposium on Distributed Simulation and Real Time Applications, 2015

2014
Web-based real-time decision support system active XML-based metadata.
Proceedings of the Global Summit on Computer & Information Technology, 2014

2013
Structured content-aware discovery for improving XML data consistency.
Inf. Sci., 2013

Scheduling para-virtualized virtual machines based on events.
Future Gener. Comput. Syst., 2013

Top-k best probability queries and semantics ranking properties on probabilistic databases.
Data Knowl. Eng., 2013

2012
Top-k answers for XML keyword queries.
World Wide Web, 2012

A novel QoS model and computation framework in web service selection.
World Wide Web, 2012

A smart web service based on the context of things.
ACM Trans. Internet Techn., 2012

Top-K data source selection for keyword queries over multiple XML data sources.
J. Inf. Sci., 2012

Top-k Best Probability Queries on Probabilistic Data.
Proceedings of the Database Systems for Advanced Applications, 2012

Feature-based recommendation framework on OLAP.
Proceedings of the Twenty-Third Australasian Database Conference, 2012

FEAS: A full-time event aware scheduler for improving responsiveness.
Proceedings of the Thirty-Fifth Australasian Computer Science Conference, 2012

2011
A frequency domain subspace blind channel estimation method for trailing zero OFDM systems.
J. Netw. Comput. Appl., 2011

Fault Tolerance in Data Gathering Wireless Sensor Networks.
Comput. J., 2011

K-Graphs: Selecting Top-k Data Sources for XML Keyword Queries.
Proceedings of the Database and Expert Systems Applications, 2011

Discovering Conditional Functional Dependencies in XML Data.
Proceedings of the Twenty-Second Australasian Database Conference, 2011

2010
Efficiently supporting secure and reliable collaboration in scientific workflows.
J. Comput. Syst. Sci., 2010

Web services discovery and rank: An information retrieval approach.
Future Gener. Comput. Syst., 2010

Effective pruning for XML structural match queries.
Data Knowl. Eng., 2010

Relevant Answers for XML Keyword Search: A Skyline Approach.
Proceedings of the Web Information Systems Engineering - WISE 2010, 2010

Coordinating business web services.
Proceedings of the iiWAS'2010, 2010

Exploit keyword query semantics and structure of data for effective XML keyword search.
Proceedings of the Database Technologies 2010, 2010

2009
Effective Collaboration with Information Sharing in Virtual Universities.
IEEE Trans. Knowl. Data Eng., 2009

Delegating revocations and authorizations in collaborative business environments.
Inf. Syst. Frontiers, 2009

High-dimensional indexing with oriented cluster representation for multimedia databases.
Proceedings of the 2009 IEEE International Conference on Multimedia and Expo, 2009

Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks.
Proceedings of the Database Systems for Advanced Applications, 2009

Efficient IR-Style Search over Web Services.
Proceedings of the Advanced Information Systems Engineering, 21st International Conference, 2009

2008
Access control management for ubiquitous computing.
Future Gener. Comput. Syst., 2008

Efficient power management for Wireless Sensor Networks: A data-driven approach.
Proceedings of the LCN 2008, 2008

A Glance on Current XML Twig Pattern Matching Algorithms.
Proceedings of the Computational Science and Its Applications - ICCSA 2008, International Conference, Perugia, Italy, June 30, 2008

Flexible and Semantics-Based Support for Web Services Transaction Protocols.
Proceedings of the Advances in Grid and Pervasive Computing, 2008

An energy-efficient data-driven power management for wireless sensor networks.
Proceedings of the 5th Workshop on Data Management for Sensor Networks, 2008

Semantic-Enabled Organization of Web Services.
Proceedings of the Progress in WWW Research and Development, 2008

2007
A probabilistic semantic approach for discovering web services.
Proceedings of the 16th International Conference on World Wide Web, 2007

Towards Dynamic Integration of Heterogeneous Web Services Transaction Partners.
Proceedings of the iiWAS'2007, 2007

Optimization on distributed user management in Wireless Sensor Networks.
Proceedings of the 13th International Conference on Parallel and Distributed Systems, 2007

Web Services Semantic Searching enhanced by Case Reasoning.
Proceedings of the 18th International Workshop on Database and Expert Systems Applications (DEXA 2007), 2007

WSXplorer: Searching for Desired Web Services.
Proceedings of the Advanced Information Systems Engineering, 19th International Conference, 2007

Delegating Revocations and Authorizations.
Proceedings of the Business Process Management Workshops, 2007

2006
Cost based web services transaction management.
Int. J. Web Grid Serv., 2006

Ubiquitous computing environments and its usage access control.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

A dynamic mechanism for handling mobile computing environmental changes.
Proceedings of the 1st International Conference on Scalable Information Systems, 2006

Role-Based Delegation with Negative Authorization.
Proceedings of the Frontiers of WWW Research and Development, 2006

2005
On Optimal Replication of Data Object at Hierarchical and Transparent Web Proxies.
IEEE Trans. Parallel Distributed Syst., 2005

A Flexible Payment Scheme and Its Role-Based Access Control.
IEEE Trans. Knowl. Data Eng., 2005

A Cost Based Coordination Model for Long Running Transactions in Web Services.
Proceedings of the iiWAS'2005, 2005

Towards Secure XML Document with Usage Control.
Proceedings of the Web Technologies Research and Development - APWeb 2005, 7th Asia-Pacific Web Conference, Shanghai, China, March 29, 2005

Authorization Algorithms for the Mobility of User-Role Relationship.
Proceedings of the Computer Science 2005, 2005

2004
A Global Ticket-Based Access Scheme for Mobile Users.
Inf. Syst. Frontiers, 2004

An Electronic Cash Scheme and its Management.
Concurr. Eng. Res. Appl., 2004

Mining more Gold From Web Page Hyperlinks.
Proceedings of the iiWAS'2004, 2004

Specifying Role-Based Access Constraints with Object Constraint Language.
Proceedings of the Advanced Web Technologies and Applications, 2004

Anonymous Access Scheme for Electronic Services.
Proceedings of the Computer Science 2004, 2004

2003
Achieving secure and flexible M-services through tickets.
IEEE Trans. Syst. Man Cybern. Part A, 2003

Web Page Clustering: A Hyperlink-Based Similarity and Matrix-Based Hierarchical Algorithms.
Proceedings of the Web Technologies and Applications, 5th Asian-Pacific Web Conference, 2003

Formal Authorisation Allocation Approaches for Permission-role Assignment Using Relational Algebra Operations.
Proceedings of the Database Technologies 2003, 2003

A Flexible Payment Scheme and its Permission-Role Assignment.
Proceedings of the Computer Science 2003, 2003

2002
Formal Authorization Allocation Approaches for Role-Based Access Control Based on Relational Algebra Operations.
Proceedings of the 3rd International Conference on Web Information Systems Engineering, 2002

Building consumer self-anonymity scalable payment protocol for Internet purchase.
Proceedings of the 12th International Workshop on Research Issues in Data Engineering: Engineering E-Commerce/E-Business Systems, 2002

Ticket-Based Service Access Scheme for Mobile Users.
Proceedings of the Computer Science 2002, 2002

2001
A Consumer Scalable Anonymity Payment Scheme with Role-Based Access Control.
Proceedings of the 2nd International Conference on Web Information Systems Engineering, 2001

2000
Visual Support for Text Information Retrieval based on Matrix's Singular Value Decomposition.
Proceedings of the WISE 2000, 2000

1999
Natural Language Query Optimization and Translation in Chinese Database Systems.
Proceedings of the Proceedings of the Second International Symposium on Cooperative Database Systems for Advanced Applications, 1999


  Loading...