Остановите войну!
for scientists:
default search action
Jin Cao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j93]Zhenyang Guo, Jin Cao, Xinyi Wang, Yinghui Zhang, Ben Niu, Hui Li:
UAVA: Unmanned Aerial Vehicle Assisted Vehicular Authentication Scheme in Edge Computing Networks. IEEE Internet Things J. 11(12): 22091-22106 (2024) - [j92]Jin Cao, Ta Zhou, Shaohua Zhi, Saikit Lam, Ge Ren, Yuanpeng Zhang, Yongqiang Wang, Yanjing Dong, Jing Cai:
Fuzzy inference system with interpretable fuzzy rules: Advancing explainable artificial intelligence for disease diagnosis - A comprehensive review. Inf. Sci. 662: 120212 (2024) - [j91]Xinyin Xiang, Jin Cao, Weiguo Fan:
Lightweight privacy-preserving authentication mechanism in 5G-enabled industrial cyber physical systems. Inf. Sci. 666: 120391 (2024) - [j90]Li Cai, Jin Cao, Feifei Jing, Yongheng Wang:
A fast time integral finite difference method for a space-time fractional FitzHugh-Nagumo monodomain model in irregular domains. J. Comput. Phys. 501: 112744 (2024) - [j89]Qiao Liu, Qi Han, Guangze Luo, Jin Cao, Hui Li, Yong Wang:
Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles. Microprocess. Microsystems 104: 104965 (2024) - [j88]Chao Shang, Jin Cao, Tong Zhu, Yinghui Zhang, Ben Niu, Hui Li:
CADFA: A Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices. IEEE Syst. J. 18(1): 590-599 (2024) - [j87]Chao Shang, Jin Cao, Jiajia Liu, Yinghui Zhang, Ben Niu, Hui Li:
CEAMP: A Cross-Domain Entity Authentication and Message Protection Framework for Intra-Vehicle Network. IEEE Trans. Intell. Transp. Syst. 25(7): 6780-6795 (2024) - [j86]Ruhui Ma, Jin Cao, Shiyang He, Yinghui Zhang, Ben Niu, Hui Li:
A UAV-Assisted UE Access Authentication Scheme for 5G/6G Network. IEEE Trans. Netw. Serv. Manag. 21(2): 2426-2444 (2024) - [i22]Xiongpeng Ren, Jin Cao, Hui Li, Yinghui Zhang:
Novel_Authentication_Protocols_Tailored_for_Ambient_IoT_Devices_in_3GPP_5G_Networks. CoRR abs/2404.02425 (2024) - [i21]Shijie Liu, Kang Yan, Feiwei Qin, Changmiao Wang, Ruiquan Ge, Kai Zhang, Jie Huang, Yong Peng, Jin Cao:
Infrared Image Super-Resolution via Lightweight Information Split Network. CoRR abs/2405.10561 (2024) - [i20]Chang Zhou, Yang Zhao, Jin Cao, Yi Shen, Xiaoling Cui, Chiyu Cheng:
Optimizing Search Advertising Strategies: Integrating Reinforcement Learning with Generalized Second-Price Auctions for Enhanced Ad Ranking and Bidding. CoRR abs/2405.13381 (2024) - [i19]Jingyu Zhang, Jin Cao, Jinghao Chang, Xinjin Li, Houze Liu, Zhenglin Li:
Research on the Application of Computer Vision Based on Deep Learning in Autonomous Driving Technology. CoRR abs/2406.00490 (2024) - [i18]Chang Yu, Yongshun Xu, Jin Cao, Ye Zhang, Yinxin Jin, Mengran Zhu:
Credit Card Fraud Detection Using Advanced Transformer Model. CoRR abs/2406.03733 (2024) - [i17]Jin Cao, Yanhui Jiang, Chang Yu, Feiwei Qin, Zekun Jiang:
Rough Set improved Therapy-Based Metaverse Assisting System. CoRR abs/2406.04465 (2024) - [i16]Yanhui Jiang, Jin Cao, Chang Yu:
Dog Heart Rate and Blood Oxygen Metaverse Interaction System. CoRR abs/2406.04466 (2024) - [i15]Qi Zheng, Chang Yu, Jin Cao, Yongshun Xu, Qianwen Xing, Yinxin Jin:
Advanced Payment Security System:XGBoost, CatBoost and SMOTE Integrated. CoRR abs/2406.04658 (2024) - [i14]Chang Zhou, Yang Zhao, Yuelin Zou, Jin Cao, Wenhan Fan, Yi Zhao, Chiyu Cheng:
Predict Click-Through Rates with Deep Interest Network Model in E-commerce Advertising. CoRR abs/2406.10239 (2024) - 2023
- [j85]Yuanyuan Yang, Jin Cao, Xiongpeng Ren, Ben Niu, Yinghui Zhang, Hui Li:
LK-AKA: A lightweight location key-based authentication and key agreement protocol for S2S communication. Comput. Commun. 197: 214-229 (2023) - [j84]Yanan Dong, Yupeng Li, Jin Cao, Na Zhang, Kaixin Sha:
Identification and evaluation of competitive products based on online user-generated content. Expert Syst. Appl. 225: 120168 (2023) - [j83]Wei Liu, Yinghui Zhang, Gang Han, Jin Cao, Hui Cui, Dong Zheng:
Secure and Efficient Smart Healthcare System Based on Federated Learning. Int. J. Intell. Syst. 2023: 1-12 (2023) - [j82]Yuanyuan Yang, Jin Cao, Ruhui Ma, Lifu Cheng, Lilan Chen, Ben Niu, Hui Li:
FHAP: Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks. IEEE Internet Things J. 10(15): 13959-13973 (2023) - [j81]Ben Chen, Feiwei Qin, Yanli Shao, Jin Cao, Yong Peng, Ruiquan Ge:
Fine-grained imbalanced leukocyte classification with global-local attention transformer. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101661 (2023) - [j80]Jin Cao, Ran Xu, Xinnan Lin, Feiwei Qin, Yong Peng, Yanli Shao:
Adaptive receptive field U-shaped temporal convolutional network for vulgar action segmentation. Neural Comput. Appl. 35(13): 9593-9606 (2023) - [j79]Yinghui Zhang, Tian Zhu, Rui Guo, Shengmin Xu, Hui Cui, Jin Cao:
Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data. IEEE Trans. Cloud Comput. 11(1): 971-983 (2023) - [j78]Jin Cao, Tong Zhu, Ruhui Ma, Zhenyang Guo, Yinghui Zhang, Hui Li:
A Software-Based Remote Attestation Scheme for Internet of Things Devices. IEEE Trans. Dependable Secur. Comput. 20(2): 1422-1434 (2023) - [j77]Xiongpeng Ren, Jin Cao, Ruhui Ma, Yurong Luo, Jian Guan, Yinghui Zhang, Hui Li:
A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G. IEEE Trans. Netw. Serv. Manag. 20(3): 3880-3899 (2023) - [c79]Jonathan J. Hüser, Judith Gaspers, Thomas Gueudré, Chandana Satya Prakash, Jin Cao, Daniil Sorokin, Quynh Do, Nicolas Anastassacos, Tobias Falke, Turan Gojayev:
Sharing Encoder Representations across Languages, Domains and Tasks in Large-Scale Spoken Language Understanding. ACL (industry) 2023: 447-456 - [c78]Yinghui Zhang, Hao Du, Jin Cao, Gang Han, Dong Zheng:
DP-Loc: A Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection. Inscrypt (2) 2023: 293-304 - [c77]Ben Niu, Xindi Wang, Likun Zhang, Shoukun Guo, Jin Cao, Fenghua Li:
A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning. GLOBECOM 2023: 4259-4264 - [c76]Jiahui Wang, Yulong Fu, Mengru Liu, Jin Cao, Hui Li, Zheng Yan:
Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics. ISPEC 2023: 52-73 - [c75]Junyi Shen, Dayvid V. R. Oliveira, Jin Cao, Brian Knott, Goodman Gu, Sindhu Vijaya Raghavan, Yunye Jin, Nikita Sudan, Rob Monarch:
Identifying Controversial Pairs in Item-to-Item Recommendations. RecSys 2023: 671-674 - [c74]Likun Zhang, Yahong Chen, Ang Li, Binghui Wang, Yiran Chen, Fenghua Li, Jin Cao, Ben Niu:
Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation. WACV 2023: 4690-4698 - 2022
- [j76]Jin Cao, Bo Li, Mengni Fan, Huiyu Liu:
Inference Acceleration with Adaptive Distributed DNN Partition over Dynamic Video Stream. Algorithms 15(7): 244 (2022) - [j75]Jin Cao, Liwei Lin, Ruhui Ma, Haibing Guan, Mengke Tian, Yong Wang:
An Efficient Deep Learning Approach To IoT Intrusion Detection. Comput. J. 65(11): 2870-2879 (2022) - [j74]Xiongpeng Ren, Jin Cao, Maode Ma, Hui Li, Yinghui Zhang:
A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. IEEE Internet Things J. 9(5): 3642-3656 (2022) - [j73]Jin Cao, Sheng Li, Ruhui Ma, Yuxi Han, Yueyu Zhang, Hui Li:
RPRIA: Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices. IEEE Internet Things J. 9(19): 19174-19187 (2022) - [j72]Gang Han, Tiantian Zhang, Yinghui Zhang, Guowen Xu, Jianfei Sun, Jin Cao:
Verifiable and privacy preserving federated learning without fully trusted centers. J. Ambient Intell. Humaniz. Comput. 13(3): 1431-1441 (2022) - [j71]Yinghui Zhang, Xuanni Wei, Jin Cao, Jianting Ning, Zuobin Ying, Dong Zheng:
Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part A): 8350-8361 (2022) - [j70]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Xiaowei Li, Yang Xu:
A robust authentication scheme for remote diagnosis and maintenance in 5G V2N. J. Netw. Comput. Appl. 198: 103281 (2022) - [j69]Xinyin Xiang, Jin Cao, Weiguo Fan:
Decentralized authentication and access control protocol for blockchain-based e-health systems. J. Netw. Comput. Appl. 207: 103512 (2022) - [j68]Yunqing Sun, Jin Cao, Maode Ma, Yinghui Zhang, Hui Li, Ben Niu:
EAP-DDBA: Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive D2D Communication Devices in 3GPP 5G HetNet. IEEE Trans. Dependable Secur. Comput. 19(1): 370-387 (2022) - [j67]Ruhui Ma, Jin Cao, Yinghui Zhang, Chao Shang, Lihui Xiong, Hui Li:
A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X. IEEE Trans. Intell. Transp. Syst. 23(12): 23976-23992 (2022) - [c73]Jack FitzGerald, Shankar Ananthakrishnan, Konstantine Arkoudas, Davide Bernardi, Abhishek Bhagia, Claudio Delli Bovi, Jin Cao, Rakesh Chada, Amit Chauhan, Luoxin Chen, Anurag Dwarakanath, Satyam Dwivedi, Turan Gojayev, Karthik Gopalakrishnan, Thomas Gueudré, Dilek Hakkani-Tur, Wael Hamza, Jonathan J. Hüser, Kevin Martin Jose, Haidar Khan, Beiye Liu, Jianhua Lu, Alessandro Manzotti, Pradeep Natarajan, Karolina Owczarzak, Gokmen Oz, Enrico Palumbo, Charith Peris, Chandana Satya Prakash, Stephen Rawls, Andy Rosenbaum, Anjali Shenoy, Saleh Soltan, Mukund Harakere Sridhar, Lizhen Tan, Fabian Triefenbach, Pan Wei, Haiyang Yu, Shuai Zheng, Gökhan Tür, Prem Natarajan:
Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems. KDD 2022: 2893-2902 - [c72]Shuyang Li, Mukund Sridhar, Chandana Satya Prakash, Jin Cao, Wael Hamza, Julian J. McAuley:
Instilling Type Knowledge in Language Models via Multi-Task QA. NAACL-HLT (Findings) 2022: 594-603 - [c71]Jin Cao, Chandana Satya Prakash, Wael Hamza:
Attention Fusion: a light yet efficient late fusion mechanism for task adaptation in NLU. NAACL-HLT (Findings) 2022: 857-866 - [c70]Minqiu Tian, Zifu Li, Fenghua Li, Jin Cao, Chao Guo:
A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT. TrustCom 2022: 299-306 - [c69]Haiyang Luo, Zhe Sun, Yunqing Sun, Ang Li, Binghui Wang, Jin Cao, Ben Niu:
SmartCircles: A Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing. SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022: 2340-2347 - [c68]Ben Niu, Zejun Zhou, Yahong Chen, Jin Cao, Fenghua Li:
DP-Opt: Identify High Differential Privacy Violation by Optimization. WASA (2) 2022: 406-416 - [c67]Mohamed Trabelsi, Jeff Heflin, Jin Cao:
DAME: Domain Adaptation for Matching Entities. WSDM 2022: 1016-1024 - [i13]Mohamed Trabelsi, Jeff Heflin, Jin Cao:
DAME: Domain Adaptation for Matching Entities. CoRR abs/2204.09244 (2022) - [i12]Shuyang Li, Mukund Sridhar, Chandana Satya Prakash, Jin Cao, Wael Hamza, Julian J. McAuley:
Instilling Type Knowledge in Language Models via Multi-Task QA. CoRR abs/2204.13796 (2022) - [i11]Jack FitzGerald, Shankar Ananthakrishnan, Konstantine Arkoudas, Davide Bernardi, Abhishek Bhagia, Claudio Delli Bovi, Jin Cao, Rakesh Chada, Amit Chauhan, Luoxin Chen, Anurag Dwarakanath, Satyam Dwivedi, Turan Gojayev, Karthik Gopalakrishnan, Thomas Gueudré, Dilek Hakkani-Tur, Wael Hamza, Jonathan J. Hüser, Kevin Martin Jose, Haidar Khan, Beiye Liu, Jianhua Lu, Alessandro Manzotti, Pradeep Natarajan, Karolina Owczarzak, Gokmen Oz, Enrico Palumbo, Charith Peris, Chandana Satya Prakash, Stephen Rawls, Andy Rosenbaum, Anjali Shenoy, Saleh Soltan, Mukund Harakere Sridhar, Liz Tan, Fabian Triefenbach, Pan Wei, Haiyang Yu, Shuai Zheng, Gökhan Tür, Prem Natarajan:
Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems. CoRR abs/2206.07808 (2022) - 2021
- [j66]Yinghui Zhang, Axin Wu, Zhenwei Chen, Dong Zheng, Jin Cao, Xiaohong Jiang:
Flexible and anonymous network slicing selection for C-RAN enabled 5G service authentication. Comput. Commun. 166: 165-173 (2021) - [j65]Yupeng Li, Meng Liu, Jin Cao, Xiaolin Wang, Na Zhang:
Multi-attribute group decision-making considering opinion dynamics. Expert Syst. Appl. 184: 115479 (2021) - [j64]Jing Jiang, Qiudi Wu, Jin Cao, Xin Xia, Li Zhang:
Recommending tags for pull requests in GitHub. Inf. Softw. Technol. 129: 106394 (2021) - [j63]Haifeng Fang, Jin Cao, Lihua Cai, Ta Zhou, MingQiang Wang:
The recognition of plastic bottle using linear multi hierarchical SVM classifier. J. Intell. Fuzzy Syst. 40(6): 11509-11522 (2021) - [j62]Yiheng Tu, Jin Cao, Seyhmus Guler, Thalia Chai-Zhang, Joan A. Camprodon, Mark G. Vangel, Randy L. Gollub, Darin D. Dougherty, Jian Kong:
Perturbing fMRI brain dynamics using transcranial direct current stimulation. NeuroImage 237: 118100 (2021) - [j61]Haowei Jiang, Feiwei Qin, Jin Cao, Yong Peng, Yanli Shao:
Recurrent neural network from adder's perspective: Carry-lookahead RNN. Neural Networks 144: 297-306 (2021) - [j60]Xinyin Xiang, Jin Cao, Weiguo Fan:
Scalable Attestation Protocol Resilient to Physical Attacks for IoT Environments. IEEE Syst. J. 15(3): 4566-4577 (2021) - [j59]Canguang Li, Guohua Wang, Jin Cao, Yi Cai:
A Multi-Agent Communication Based Model for Nested Named Entity Recognition. IEEE ACM Trans. Audio Speech Lang. Process. 29: 2123-2136 (2021) - [j58]Jin Cao, Maode Ma, Yulong Fu, Hui Li, Yinghui Zhang:
CPPHA: Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets. IEEE Trans. Dependable Secur. Comput. 18(3): 1182-1195 (2021) - [c66]Canguang Li, Guohua Wang, Jin Cao, Yi Cai:
A Nested Named Entity Recognition Model Based on Multi-agent Communication Mechanism (Student Abstract). AAAI 2021: 15823-15824 - [c65]Jin Cao, Rui Hu:
Scalable Outlier Detection Using Distance Projections. IEEE BigData 2021: 4431-4440 - [c64]Shuyang Li, Jin Cao, Mukund Sridhar, Henghui Zhu, Shang-Wen Li, Wael Hamza, Julian J. McAuley:
Zero-shot Generalization in Dialog State Tracking through Generative Question Answering. EACL 2021: 1063-1074 - [c63]Mohamed Trabelsi, Jin Cao, Jeff Heflin:
SeLaB: Semantic Labeling with BERT. IJCNN 2021: 1-8 - [c62]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - [c61]Qiao Sun, Lei Du, Jie Bai, Jin Cao, Lifang Wang, Yang Su:
Implementation of national comparison of optical speed meters in China. MetroAutomotive 2021: 93-97 - [i10]Shuyang Li, Jin Cao, Mukund Sridhar, Henghui Zhu, Shang-Wen Li, Wael Hamza, Julian J. McAuley:
Zero-shot Generalization in Dialog State Tracking through Generative Question Answering. CoRR abs/2101.08333 (2021) - [i9]Haowei Jiang, Feiwei Qin, Jin Cao, Yong Peng, Yanli Shao:
Recurrent Neural Network from Adder's Perspective: Carry-lookahead RNN. CoRR abs/2106.12901 (2021) - 2020
- [j57]Xi Chen, Ping Yang, Jin Cao, Xinyang Li, Yusheng Peng, Songrong Wu, Guohua Zhou:
Adaptive on Time Controlled Double-Line- Frequency Ripple Suppressor With Fast Dynamic Response and High Efficiency. IEEE Access 8: 179692-179701 (2020) - [j56]Jin Cao, Maode Ma, Hui Li, Ruhui Ma, Yunqing Sun, Pu Yu, Lihui Xiong:
A Survey on Security Aspects for 3GPP 5G Networks. IEEE Commun. Surv. Tutorials 22(1): 170-195 (2020) - [j55]Weihao Li, Ben Niu, Jin Cao, Yurong Luo, Hui Li:
A personalized range-sensitive privacy-preserving scheme in LBSs. Concurr. Comput. Pract. Exp. 32(5) (2020) - [j54]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li:
LAA: Lattice-Based Access Authentication Scheme for IoT in Space Information Networks. IEEE Internet Things J. 7(4): 2791-2805 (2020) - [j53]Jin Cao, Zheng Yan, Ruhui Ma, Yinghui Zhang, Yulong Fu, Hui Li:
LSAA: A Lightweight and Secure Access Authentication Scheme for Both UE and mMTC Devices in 5G Networks. IEEE Internet Things J. 7(6): 5329-5344 (2020) - [j52]Yulong Fu, Hanlu Chen, Qinghua Zheng, Zheng Yan, Raimo Kantola, Xuyang Jing, Jin Cao, Hui Li:
An Adaptive Security Data Collection and Composition Recognition method for security measurement over LTE/LTE-A networks. J. Netw. Comput. Appl. 155: 102549 (2020) - [j51]Siyi Yu, Wen Li, Wei Shen, Robert R. Edwards, Randy L. Gollub, Georgia Wilson, Joel Park, Ana Ortiz, Jin Cao, Jessica Gerber, Ishtiaq Mawla, Suk-Tak Chan, Jeungchan Lee, Ajay D. Wasan, Vitaly Napadow, Ted J. Kaptchuk, Bruce R. Rosen, Jian Kong:
Impaired mesocorticolimbic connectivity underlies increased pain sensitivity in chronic low back pain. NeuroImage 218: 116969 (2020) - [j50]Jin Cao, Yiheng Tu, Georgia Wilson, Scott P. Orr, Jian Kong:
Characterizing the analgesic effects of real and imagined acupuncture using functional and structure MRI. NeuroImage 221: 117176 (2020) - [j49]Chaofan Zhou, Huili Gong, Beibei Chen, Mingliang Gao, Qun Cao, Jin Cao, Li Duan, Junjie Zuo, Min Shi:
Land Subsidence Response to Different Land Use Types and Water Resource Utilization in Beijing-Tianjin-Hebei, China. Remote. Sens. 12(3): 457 (2020) - [j48]Li Duan, Huili Gong, Beibei Chen, Chaofan Zhou, Kunchao Lei, Mingliang Gao, Hairuo Yu, Qun Cao, Jin Cao:
An Improved Multi-Sensor MTI Time-Series Fusion Method to Monitor the Subsidence of Beijing Subway Network during the Past 15 Years. Remote. Sens. 12(13): 2125 (2020) - [j47]Ping Yang, Jin Cao, Zerong Shang, Yaping Cai, Jianping Xu:
Double-Line Frequency Ripple Suppression of a Quasi-Single Stage AC-DC Converter. IEEE Trans. Circuits Syst. II Express Briefs 67-II(10): 2074-2078 (2020) - [j46]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Shiyang He:
FTGPHA: Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks. IEEE Trans. Veh. Technol. 69(2): 2126-2140 (2020) - [c60]Jin Cao, Guohua Wang, Canguang Li, Haopeng Ren, Yi Cai, Raymond Chi-Wing Wong, Qing Li:
Incorporating Boundary and Category Feature for Nested Named Entity Recognition. DASFAA (2) 2020: 209-226 - [c59]Ben Niu, Likun Zhang, Yahong Chen, Ang Li, Wei Du, Jin Cao, Fenghua Li:
A Framework to Preserve User Privacy for Machine Learning as a Service. GLOBECOM 2020: 1-6 - [c58]Yunchuan Guo, Han Zhang, Zifu Li, Fenghua Li, Liang Fang, Lihua Yin, Jin Cao:
Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long? ICC 2020: 1-6 - [c57]Jingcheng Liu, Yaping Zhang, Yuze Li, Yongheng Jia, Yao Chen, Jin Cao:
Detecting Local Machine Data Leakage in Real Time. IFIP Int. Conf. Digital Forensics 2020: 291-308 - [c56]Jin Cao, Jun Wang, Wael Hamza, Kelly Vanee, Shang-Wen Li:
Style Attuned Pre-Training and Parameter Efficient Fine-Tuning for Spoken Language Understanding. INTERSPEECH 2020: 1570-1574 - [c55]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Ben Niu, Fenghua Li, Lihua Yin:
A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles. WCNC 2020: 1-7 - [c54]Ben Niu, Yahong Chen, Boyang Wang, Jin Cao, Fenghua Li:
Utility-aware Exponential Mechanism for Personalized Differential Privacy. WCNC 2020: 1-6 - [i8]Jin Cao, Dewei Zhong:
A Fast Randomized Algorithm for Finding the Maximal Common Subsequences. CoRR abs/2009.03352 (2020) - [i7]Jin Cao, Yibo Zhao, Linjun Zhang, Jason Li:
A Lightweight Algorithm to Uncover Deep Relationships in Data Tables. CoRR abs/2009.03358 (2020) - [i6]Jin Cao, Jun Wang, Wael Hamza, Kelly Vanee, Shang-Wen Li:
Style Attuned Pre-training and Parameter Efficient Fine-tuning for Spoken Language Understanding. CoRR abs/2010.04355 (2020) - [i5]Mohamed Trabelsi, Jin Cao, Jeff Heflin:
Semantic Labeling Using a Deep Contextualized Language Model. CoRR abs/2010.16037 (2020) - [i4]Cheng-I Lai, Jin Cao, Sravan Bodapati, Shang-Wen Li:
Towards Semi-Supervised Semantics Understanding from Speech. CoRR abs/2011.06195 (2020)
2010 – 2019
- 2019
- [j45]Sheng Ding, Jin Cao, Chen Li, Kai Fan, Hui Li:
A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT. IEEE Access 7: 38431-38441 (2019) - [j44]Yinghui Zhang, Fangyuan Ren, Axin Wu, Tiantian Zhang, Jin Cao, Dong Zheng:
Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks. IEEE Access 7: 114721-114730 (2019) - [j43]Ruhui Ma, Jin Cao, Dengguo Feng, Hui Li, Yinghui Zhang, Xixiang Lv:
PPSHA: Privacy preserving secure handover authentication scheme for all application scenarios in LTE-A networks. Ad Hoc Networks 87: 49-60 (2019) - [j42]Yue Zhai, Ke Chen, Jason X. Zhou, Jin Cao, Zhongyuan Lyu, Xin Jin, Geoffrey Q. P. Shen, Weisheng Lu, George Q. Huang:
An Internet of Things-enabled BIM platform for modular integrated construction: A case study in Hong Kong. Adv. Eng. Informatics 42 (2019) - [j41]Rui Yao, Jin Cao, Lunche Wang, Wenwen Zhang, Xiaojun Wu:
Urbanization effects on vegetation cover in major African cities during 2001-2017. Int. J. Appl. Earth Obs. Geoinformation 75: 44-53 (2019) - [j40]Weifeng Gao, Zhifang Wei, Yuting Luo, Jin Cao:
Artificial bee colony algorithm based on Parzen window method. Appl. Soft Comput. 74: 679-692 (2019) - [j39]Jin Cao, Maode Ma, Hui Li:
LPPA: Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation (5G) cellular networks. Int. J. Commun. Syst. 32(3) (2019) - [j38]Jin Cao, Pu Yu, Maode Ma, Weifeng Gao:
Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network. IEEE Internet Things J. 6(2): 1561-1575 (2019) - [j37]Jin Cao, Lei Yang, Jiannong Cao:
Revisiting Computation Partitioning in Future 5G-Based Edge Computing Environments. IEEE Internet Things J. 6(2): 2427-2438 (2019) - [j36]Jin Cao, Pu Yu, Xinyin Xiang, Maode Ma, Hui Li:
Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System. IEEE Internet Things J. 6(6): 9794-9805 (2019) - [j35]Yiheng Tu, Joel Park, Seppo P. Ahlfors, Sheraz Khan, Natalia Egorova, Courtney Amanda Lang, Jin Cao, Jian Kong:
A neural mechanism of direct and observational conditioning for placebo and nocebo responses. NeuroImage 184: 954-963 (2019) - [j34]Yiheng Tu, Binlong Zhang, Jin Cao, Georgia Wilson, Zhiguo Zhang, Jian Kong:
Identifying inter-individual differences in pain threshold using brain connectome: a test-retest reproducible study. NeuroImage 202 (2019) - [j33]Yinghui Zhang, Robert H. Deng, Dong Zheng, Jin Li, Pengfei Wu, Jin Cao:
Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT. IEEE Trans. Ind. Informatics 15(9): 5099-5108 (2019) - [c53]Chuqiao Xu, Xin Liu, Junliang Wang, Jie Zhang, Jin Cao, Wei Qin:
An Improved GA-KRR Nested Learning Approach for Refrigeration Compressor Performance Forecasting*. CASE 2019: 622-627 - [c52]Fenghua Li, Zhe Sun, Ben Niu, Jin Cao, Hui Li:
An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks. ICNC 2019: 390-394 - [c51]Yurong Luo, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
DIAM: Diversified Identity Authentication Mechanism for 5G Multi-Service System. ICNC 2019: 418-424 - [c50]Yunqing Sun, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Privacy-Preserving Device Discovery and Authentication Scheme for D2D Communication in 3GPP 5G HetNet. ICNC 2019: 425-431 - [c49]Chitra Phadke, Paishun Ting, Jin Cao, Hüseyin Uzunalioglu:
CLUES: Detection of User Intent through Interactive Comparison. ICDM (Posters) 2019: 173-184 - [c48]Ran He, Jin Cao, Lisa Zhang, Denny Lee:
Statistical Enrichment Models for Activity Inference from Imprecise Location Data. INFOCOM 2019: 946-954 - [c47]Yibo Zhao, Jin Cao, Ran He:
Two-Sample Tests for High Dimensional Distributions Using One-Dimensional Random Projections. MLDM (2) 2019: 718-732 - [c46]Yulong Fu, Guoquan Li, Mohammed Atiquzzaman, Zheng Yan, Jin Cao, Hui Li:
A Study and Enhancement to the Security of MANET AODV Protocol Against Black Hole Attacks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 1431-1436 - [c45]Pu Yu, Jin Cao, Maode Ma, Hui Li, Ben Niu, Fenghua Li:
Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks. WCNC 2019: 1-7 - [p1]Wangsu Hu, Ran He, Jin Cao, Lisa Zhang, Hüseyin Uzunalioglu, Ahmet A. Akyamaç, Chitra Phadke:
Quantified Understanding of Syrian Refugee Integration in Turkey. Data for Refugees Challenge 2019: 201-221 - [i3]Hüseyin Uzunalioglu, Jin Cao, Chitra Phadke, Gerald Lehmann, Ahmet A. Akyamaç, Ran He, Jeongran Lee, Maria Able:
Augmented Data Science: Towards Industrialization and Democratization of Data Science. CoRR abs/1909.05682 (2019) - 2018
- [j32]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Xuefeng Liu:
EGHR: Efficient group-based handover authentication protocols for mMTC in 5G wireless networks. J. Netw. Comput. Appl. 102: 1-16 (2018) - [j31]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UPPGHA: Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in LTE-A Networks. Secur. Commun. Networks 2018: 6854612:1-6854612:16 (2018) - [c44]Fenghua Li, Yahong Chen, Ben Niu, Yuanyuan He, Kui Geng, Jin Cao:
Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services. GLOBECOM 2018: 1-6 - [c43]Ran He, Sen Yang, Jingyuan Yang, Jin Cao:
Automated Mining of Approximate Periodicity on Numeric Data: A Statistical Approach. ICCDA 2018: 20-27 - [c42]Jingyuan Yang, Jin Cao, Ran He, Lisa Zhang:
A unified clustering approach for identifying functional zones in suburban and urban areas. INFOCOM Workshops 2018: 94-99 - 2017
- [j30]Yulong Fu, Zheng Yan, Hui Li, Xiao-Long Xin, Jin Cao:
A secure SDN based multi-RANs architecture for future 5G networks. Comput. Secur. 70: 648-662 (2017) - [j29]Yulong Fu, Zheng Yan, Jin Cao, Ousmane Koné, Xuefei Cao:
An Automata Based Intrusion Detection Method for Internet of Things. Mob. Inf. Syst. 2017: 1750637:1-1750637:13 (2017) - [j28]Jin Cao, Maode Ma, Hui Li:
G2RHA: Group-to-Route Handover Authentication Scheme for Mobile Relays in LTE-A High-Speed Rail Networks. IEEE Trans. Veh. Technol. 66(11): 9689-9701 (2017) - [j27]Jin Cao, Maode Ma, Xilei Wang, Haochen Liu:
A Selective Re-Query Case Sensitive Encoding Scheme Against DNS Cache Poisoning Attacks. Wirel. Pers. Commun. 94(3): 1263-1279 (2017) - [c41]Jin Cao, Maode Ma, Hui Li, Yulong Fu, Ben Niu, Fenghua Li:
Trajectory prediction-based handover authentication mechanism for mobile relays in LTE-A high-speed rail networks. ICC 2017: 1-6 - [c40]Jin Cao, Sining Chen, W. Sean Kennedy, Nicolas Kim, Lisa Zhang:
Extracting mobile user behavioral similarity via cell-level location trace. INFOCOM Workshops 2017: 378-383 - [c39]Jin Cao, Lawrence M. Drabeck, Ran He:
Statistical network behavior based threat detection. INFOCOM Workshops 2017: 420-425 - [c38]Jin Cao, Hesheng Wang, Weidong Chen, Jingchuan Wang, Ruimin Wu:
Uncalibrated peg-hole alignment using visual servoing. RCAR 2017: 549-554 - [i2]Maryam Fazel-Zarandi, Shang-Wen Li, Jin Cao, Jared Casale, Peter Henderson, David Whitney, Alborz Geramifard:
Learning Robust Dialog Policies in Noisy Environments. CoRR abs/1712.04034 (2017) - 2016
- [c37]Lisa Zhang, Matthew Andrews, Jin Cao:
Computing road signatures from cell sequences with minimum inconsistencies. INFOCOM Workshops 2016: 227-232 - [c36]Jin Cao, Hao Zhong, Buvaneswari Ramanan, Peter Schott:
Online activities categorization of mobile users. INFOCOM Workshops 2016: 473-478 - 2015
- [j26]Chengzhe Lai, Hui Li, Xiaoqing Li, Jin Cao:
A novel group access authentication and key agreement protocol for machine-type communication. Trans. Emerg. Telecommun. Technol. 26(3): 414-431 (2015) - [j25]Jin Cao, Li Zhang, Bangjun Wang, Fanzhang Li, Jiwen Yang:
A fast gene selection method for multi-cancer classification using multiple support vector data description. J. Biomed. Informatics 53: 381-389 (2015) - [j24]Jin Cao, Maode Ma, Hui Li:
GBAAM: group-based access authentication for MTC in LTE networks. Secur. Commun. Networks 8(17): 3282-3299 (2015) - [c35]Jin Cao, Hui Li, Maode Ma:
GAHAP: A group-based anonymity handover authentication protocol for MTC in LTE-A networks. ICC 2015: 3020-3025 - [c34]Jin Cao, Hui Li, Maode Ma, Fenghua Li:
UGHA: Uniform group-based handover authentication for MTC within E-UTRAN in LTE-A networks. ICC 2015: 7246-7251 - 2014
- [j23]Sining Chen, Tin Kam Ho, Avinash Vyas, Jin Cao, Jeffrey Spiess:
A Multi-Layer Dynamic Model for Customer Experience Analytics. Bell Labs Tech. J. 18(4): 19-32 (2014) - [j22]Brian D. Friedman, Michael J. Burns, Jin Cao:
Enterprise Social Networking Data Analytics Within Alcatel-Lucent. Bell Labs Tech. J. 18(4): 89-109 (2014) - [j21]Jin Cao, Maode Ma, Hui Li, Yueyu Zhang, Zhenxing Luo:
A Survey on Security Aspects for LTE and LTE-A Networks. IEEE Commun. Surv. Tutorials 16(1): 283-302 (2014) - [j20]Wenhui Xiong, Jin Cao, Shaoqian Li:
Sparse signal recovery with unknown signal sparsity. EURASIP J. Adv. Signal Process. 2014: 178 (2014) - [j19]Yueyu Zhang, Jie Chen, Hui Li, Jin Cao, Chengzhe Lai:
Group-based authentication and key agreement for machine-type communication. Int. J. Grid Util. Comput. 5(2): 87-95 (2014) - [j18]Jin Cao, Maode Ma, Hui Li:
Access Authentication of Mass Device Connections for MTC in LTE Networks. Smart Comput. Rev. 4(4): 262-277 (2014) - [c33]Mingming Zhao, Jian Qin, Shao-Ming Li, Zhe Liu, Jin Cao, Xiaochuang Yao, Sijing Ye, Lin Li:
An Automatic Counting Method of Maize Ear Grain Based on Image Processing. CCTA 2014: 521-533 - 2013
- [j17]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao:
A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card. KSII Trans. Internet Inf. Syst. 7(5): 1313-1327 (2013) - [j16]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A New Roaming Authentication Framework For Wireless Communication. KSII Trans. Internet Inf. Syst. 7(8): 2061-2080 (2013) - [c32]Kangzhou Wang, Zhibin Jiang, Guowei Li, Jin Cao:
Integrated capacity allocation policies for a production service system with two-class customers and items. CASE 2013: 83-88 - [c31]Jin Cao, Hongyu Gao, Li Erran Li, Brian D. Friedman:
Enterprise social network analysis and modeling: A tale of two graphs. INFOCOM 2013: 2382-2390 - 2012
- [j15]Jin Cao, Hui Li, Maode Ma, Yueyu Zhang, Chengzhe Lai:
A simple and robust handover authentication between HeNB and eNB in LTE networks. Comput. Networks 56(8): 2119-2131 (2012) - [j14]Boyang Wang, Hui Li, Jin Cao:
An efficient MAC scheme for secure network coding with probabilistic detection. Frontiers Comput. Sci. 6(4): 429-441 (2012) - [j13]Chengzhe Lai, Hui Li, Yueyu Zhang, Jin Cao:
Security Issues on Machine to Machine Communications. KSII Trans. Internet Inf. Syst. 6(2): 198-514 (2012) - [j12]Jin Cao, Maode Ma, Hui Li:
An Uniform Handover Authentication between E-UTRAN and Non-3GPP Access Networks. IEEE Trans. Wirel. Commun. 11(10): 3644-3650 (2012) - [c30]Li Jiang, Jin Cao, Peifeng Li, Qiaoming Zhu:
A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application. APSCC 2012: 295-300 - [c29]Jin Cao, Maode Ma, Hui Li:
A group-based authentication and key agreement for MTC in LTE networks. GLOBECOM 2012: 1017-1022 - [c28]Xiaowei Li, Yuqing Zhang, Xuefeng Liu, Jin Cao, Qianqian Zhao:
A lightweight roaming authentication protocol for anonymous wireless communication. GLOBECOM 2012: 1029-1034 - [c27]Jin Cao, Maode Ma, Hui Li:
Unified handover authentication between heterogeneous access systems in LTE networks. GLOBECOM 2012: 5308-5313 - [c26]Yueyu Zhang, Jie Chen, Hui Li, Wujun Zhang, Jin Cao, Chengzhe Lai:
Dynamic Group Based Authentication Protocol for Machine Type Communications. INCoS 2012: 334-341 - 2011
- [c25]Jin Cao, Aiyou Chen, Patrick P. C. Lee:
Modeling time correlation in passive network loss tomography. DSN 2011: 550-561 - [i1]Aiyou Chen, Jin Cao, Larry Shepp, Tuan Nguyen:
Distinct counting with a self-learning bitmap. CoRR abs/1107.1697 (2011) - 2010
- [j11]Tian Bu, Jin Cao, Aiyou Chen, Patrick P. C. Lee:
Sequential hashing: A flexible approach for unveiling significant patterns in high speed networks. Comput. Networks 54(18): 3309-3326 (2010) - [j10]Aiyou Chen, Jin Cao, Tian Bu:
Network Tomography: Identifiability and Fourier Domain Estimation. IEEE Trans. Signal Process. 58(12): 6029-6039 (2010) - [c24]Nan Jiang, Jin Cao, Yu Jin, Li Erran Li, Zhi-Li Zhang:
Identifying suspicious activities through DNS failure graph analysis. ICNP 2010: 144-153 - [c23]Aiyou Chen, Yu Jin, Jin Cao:
Tracking Long Duration Flows in Network Traffic. INFOCOM 2010: 206-210 - [c22]Jin Cao, Li Erran Li, Aiyou Chen, Tian Bu:
Tracking Quantiles of Network Data Streams with Dynamic Operations. INFOCOM 2010: 211-215
2000 – 2009
- 2009
- [c21]Aiyou Chen, Jin Cao:
Distinct Counting with a Self-Learning Bitmap. ICDE 2009: 1171-1174 - [c20]Aiyou Chen, Li Erran Li, Jin Cao:
Tracking Cardinality Distributions in Network Traffic. INFOCOM 2009: 819-827 - [c19]Jin Cao, Aiyou Chen, Tian Bu, Arumugam Buvaneswari:
Monitoring Time-Varying Network Streams Using State-Space Models. INFOCOM 2009: 2721-2725 - 2008
- [j9]Nilton Bila, Jin Cao, Robert Dinoff, Tin Kam Ho, Bharat Kumar, Daniel F. Lieuwen, Paulo Santos:
Intuitive network applications: Learning user context and behavior. Bell Labs Tech. J. 13(2): 31-47 (2008) - [j8]Lei Guo, Xingwei Wang, Jin Cao, Lemin Li:
Traffic recovery time constrained shared sub-path protection algorithm in survivable WDM networks. Comput. Networks 52(7): 1492-1505 (2008) - [c18]Jin Cao, Aiyou Chen, Indra Widjaja, Nengfeng Zhou:
Online Identification of Applications Using Statistical Behavior Analysis. GLOBECOM 2008: 1468-1473 - [c17]Lei Guo, Xingwei Wang, Jin Cao, Lemin Li, Ting Yang, Fei Yang:
Shared Sub-Path Protection Algorithm with Recovery Time Constraint in WDM Networks. ICNS 2008: 153-158 - [c16]Jin Cao, Aiyou Chen, Tian Bu:
A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network. INFOCOM 2008: 21-25 - [c15]Nilton Bila, Jin Cao, Robert Dinoff, Tin Kam Ho, Richard Hull, Bharat Kumar, Paulo Santos:
Mobile User Profile Acquisition through Network Observables and Explicit User Queries. MDM 2008: 98-107 - [c14]Aiyou Chen, Li Li, Jin Cao:
Estimating cardinality distributions in network traffic: extended abstract. SIGMETRICS 2008: 459-460 - 2007
- [j7]M. A. Khan, Wei Xu, Jin Cao, Yu Bai, W. Q. Zhu, X. Y. Jiang, Zh. L. Zhang:
Spectral studies of white organic light-emitting devices based on multi-emitting layers. Displays 28(1): 26-30 (2007) - [j6]Fuxiang Wei, Xiaobo Zhang, Jin Cao, M. A. Khan, Wenqing Zhu, Xueyin Jiang, Zhilin Zhang:
Highly efficient styrylamine-doped blue and white organic electroluminescent devices. Displays 28(4-5): 186-190 (2007) - [j5]Lei Guo, Lemin Li, Hongfang Yu, Jin Cao:
Optical Communications New and enhanced protection scheme in survivable meshed WDM optical networks. Eur. Trans. Telecommun. 18(2): 163-168 (2007) - [j4]Lei Guo, Jin Cao, Hongfang Yu, Lemin Li:
A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in WDM optical networks. J. Netw. Comput. Appl. 30(2): 650-661 (2007) - [j3]Jin Cao, Lei Guo, Hongfang Yu, Lemin Li:
A novel recursive shared segment protection algorithm in survivable WDM networks. J. Netw. Comput. Appl. 30(2): 677-694 (2007) - [c13]Aiyou Chen, Jin Cao, Tian Bu:
Network Tomography: Identifiability and Fourier Domain Estimation. INFOCOM 2007: 1875-1883 - [c12]Tian Bu, Jin Cao, Aiyou Chen, Patrick P. C. Lee:
A Fast and Compact Method for Unveiling Significant Patterns in High Speed Networks. INFOCOM 2007: 1893-1901 - [c11]Aiyou Chen, Jin Cao, Tian Bu:
A Simple and Efficient Estimation Method for Stream Expression Cardinalities. VLDB 2007: 171-182 - 2006
- [j2]Lei Guo, Lemin Li, Hongfang Yu, Jin Cao:
Dynamic survivable routing heuristic for shared protected WDM optical networks. IEEE Commun. Lett. 10(9): 676-678 (2006) - [j1]Fuxiang Wei, Xiaobo Zhang, Jin Cao, M. A. Khan, Wenqing Zhu, Xueyin Jiang, Zhilin Zhang:
Enhancement of red organic light-emitting diodes via cascade energy transfer. Microelectron. J. 37(11): 1325-1328 (2006) - [c10]Lei Guo, Lemin Li, Jin Cao, Hongfang Yu, Xuetao Wei:
Dynamic Path Shared Protection for Survivable Differentiated Reliable WDM Optical Networks. ICDCN 2006: 479-490 - [c9]Matthew Andrews, Jin Cao, Jim McGowan:
Measuring Human Satisfaction in Data Networks. INFOCOM 2006 - [c8]Song Xing, Jin Cao, Yonggao Yang:
Nonlinear 3-D Motion Simulation Using Multi-Sensor Data Fusion. MSV 2006: 56-62 - 2004
- [c7]Jin Cao, Janos Gertler:
Partial PCA-based optimal structured residual design for fault isolation. ACC 2004: 4420-4425 - [c6]Jin Cao, Janos Gertler:
Fault diagnosis in a class of nonlinear systems using identification and GLR testing. ACC 2004: 5052-5057 - [c5]Jin Cao, William S. Cleveland, Yuan Gao, Kevin Jeffay, F. Donelson Smith, Michele C. Weigle:
Stochastic Models for Generating Synthetic HTTP Source Traffic. INFOCOM 2004: 1546-1557 - 2002
- [c4]Jin Cao, Janos Gertler:
The effect of insufficient excitation in PCA estimation. ACC 2002: 2707-2712 - [c3]Kavita Ramanan, Jin Cao:
A Poisson Limit for Buffer Overflow Probabilities. INFOCOM 2002: 994-1003 - 2001
- [c2]Jin Cao, Janos Gertler:
Noise-induced bias in PCA modeling of linear system. ACC 2001: 3660-3665 - [c1]Jin Cao, William S. Cleveland, Dong Lin, Don X. Sun:
On the nonstationarity of Internet traffic. SIGMETRICS/Performance 2001: 102-112
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-17 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint