Follow
Jingwei Huang
Title
Cited by
Cited by
Year
Trust mechanisms for cloud computing
J Huang, DM Nicol
Journal of Cloud Computing: Advances, Systems and Applications 2, 1-14, 2013
3842013
An ontology of trust: formal semantics and transitivity
J Huang, MS Fox
Proceedings of the 8th international conference on Electronic commerce: The …, 2006
1872006
A calculus of trust and its application to PKI and identity management
J Huang, D Nicol
Proceedings of the 8th Symposium on Identity and Trust on the Internet, 23-37, 2009
1282009
A framework integrating attribute-based policies into role-based access control
J Huang, DM Nicol, R Bobba, JH Huh
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
1122012
A formal-semantics-based calculus of trust
J Huang, D Nicol
IEEE Internet Computing 14 (5), 38-46, 2010
962010
Knowledge provenance in enterprise information
MS Fox*, J Huang
International Journal of Production Research 43 (20), 4471-4492, 2005
492005
Towards digital engineering: the advent of digital systems engineering
J Huang, A Gheorghe, H Handley, P Pazos, A Pinto, S Kovacic, A Collins, ...
International Journal of System of Systems Engineering 10 (3), 234-261, 2020
462020
Knowledge discovery from big data for intrusion detection using LDA
J Huang, Z Kalbarczyk, DM Nicol
2014 IEEE International Congress on Big Data, 760-761, 2014
432014
Uncertainty in knowledge provenance
J Huang, MS Fox
European Semantic Web Symposium, 372-387, 2004
402004
Towards trustworthy smart cyber-physical-social systems in the era of internet of things
J Huang, MD Seck, A Gheorghe
2016 11th System of Systems Engineering Conference (SoSE), 1-6, 2016
362016
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge
MS Fox, J Huang
University of Toronto, 2003
362003
Reinforcement learning for automatic quadrilateral mesh generation: A soft actor–critic approach
J Pan, J Huang, G Cheng, Y Zeng
Neural Networks 157, 288-304, 2023
342023
Cluster resource scheduling in cloud computing: literature review and research challenges
W Khallouli, J Huang
The Journal of supercomputing 78 (5), 6898-6943, 2022
342022
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge
J Huang
University of Toronto, 2008
312008
Machine learning in requirements elicitation: A literature review
C Cheligeer, J Huang, G Wu, N Bhuiyan, Y Xu, Y Zeng
AI EDAM 36, e32, 2022
302022
Next-generation access control for distributed control systems
JH Huh, RB Bobba, T Markham, DM Nicol, J Hull, A Chernoguzov, ...
IEEE Internet Computing 20 (5), 28-37, 2016
302016
A critical assessment of using ChatGPT for extracting structured data from clinical notes
J Huang, DM Yang, R Rong, K Nezafati, C Treager, Z Chi, S Wang, ...
npj Digital Medicine 7 (1), 106, 2024
272024
Denial-of-service threat to Hadoop/YARN clusters with multi-tenancy
J Huang, DM Nicol, RH Campbell
2014 IEEE International Congress on Big Data, 48-55, 2014
262014
Trust judgment in knowledge provenance
J Huang, MS Fox
16th International Workshop on Database and Expert Systems Applications …, 2005
222005
Dynamic knowledge provenance
J Huang, MS Fox
Proceedings of business agents and semantic web workshop, 11-20, 2004
222004
The system can't perform the operation now. Try again later.
Articles 1–20