Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Jin Cao
@article{DBLP:journals/jcphy/CaiCJW24, author = {Li Cai and Jin Cao and Feifei Jing and Yongheng Wang}, title = {A fast time integral finite difference method for a space-time fractional FitzHugh-Nagumo monodomain model in irregular domains}, journal = {J. Comput. Phys.}, volume = {501}, pages = {112744}, year = {2024}, url = {https://doi.org/10.1016/j.jcp.2023.112744}, doi = {10.1016/J.JCP.2023.112744}, timestamp = {Sun, 25 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcphy/CaiCJW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mam/0002HLC0W24, author = {Qiao Liu and Qi Han and Guangze Luo and Jin Cao and Hui Li and Yong Wang}, title = {Wiretap resisting and privacy preserving data exchange with physical layer security and blockchain based authentication in Internet of Vehicles}, journal = {Microprocess. Microsystems}, volume = {104}, pages = {104965}, year = {2024}, url = {https://doi.org/10.1016/j.micpro.2023.104965}, doi = {10.1016/J.MICPRO.2023.104965}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mam/0002HLC0W24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/ShangCZZNL24, author = {Chao Shang and Jin Cao and Tong Zhu and Yinghui Zhang and Ben Niu and Hui Li}, title = {{CADFA:} {A} Clock Skew-Based Active Device Fingerprint Authentication Scheme for Class-1 IoT Devices}, journal = {{IEEE} Syst. J.}, volume = {18}, number = {1}, pages = {590--599}, year = {2024}, url = {https://doi.org/10.1109/JSYST.2024.3351222}, doi = {10.1109/JSYST.2024.3351222}, timestamp = {Mon, 01 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/ShangCZZNL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/YangCRNZL23, author = {Yuanyuan Yang and Jin Cao and Xiongpeng Ren and Ben Niu and Yinghui Zhang and Hui Li}, title = {{LK-AKA:} {A} lightweight location key-based authentication and key agreement protocol for {S2S} communication}, journal = {Comput. Commun.}, volume = {197}, pages = {214--229}, year = {2023}, url = {https://doi.org/10.1016/j.comcom.2022.10.028}, doi = {10.1016/J.COMCOM.2022.10.028}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/YangCRNZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/DongLCZS23, author = {Yanan Dong and Yupeng Li and Jin Cao and Na Zhang and Kaixin Sha}, title = {Identification and evaluation of competitive products based on online user-generated content}, journal = {Expert Syst. Appl.}, volume = {225}, pages = {120168}, year = {2023}, url = {https://doi.org/10.1016/j.eswa.2023.120168}, doi = {10.1016/J.ESWA.2023.120168}, timestamp = {Tue, 02 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/DongLCZS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/Liu0HC0023, author = {Wei Liu and Yinghui Zhang and Gang Han and Jin Cao and Hui Cui and Dong Zheng}, title = {Secure and Efficient Smart Healthcare System Based on Federated Learning}, journal = {Int. J. Intell. Syst.}, volume = {2023}, pages = {1--12}, year = {2023}, url = {https://doi.org/10.1155/2023/8017489}, doi = {10.1155/2023/8017489}, timestamp = {Thu, 29 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/Liu0HC0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/YangCMCCNL23, author = {Yuanyuan Yang and Jin Cao and Ruhui Ma and Lifu Cheng and Lilan Chen and Ben Niu and Hui Li}, title = {{FHAP:} Fast Handover Authentication Protocol for High-Speed Mobile Terminals in 5G Satellite-Terrestrial-Integrated Networks}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {15}, pages = {13959--13973}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3262933}, doi = {10.1109/JIOT.2023.3262933}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/YangCMCCNL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ChenQSCPG23, author = {Ben Chen and Feiwei Qin and Yanli Shao and Jin Cao and Yong Peng and Ruiquan Ge}, title = {Fine-grained imbalanced leukocyte classification with global-local attention transformer}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {35}, number = {8}, pages = {101661}, year = {2023}, url = {https://doi.org/10.1016/j.jksuci.2023.101661}, doi = {10.1016/J.JKSUCI.2023.101661}, timestamp = {Fri, 10 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/ChenQSCPG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nca/CaoXLQPS23, author = {Jin Cao and Ran Xu and Xinnan Lin and Feiwei Qin and Yong Peng and Yanli Shao}, title = {Adaptive receptive field U-shaped temporal convolutional network for vulgar action segmentation}, journal = {Neural Comput. Appl.}, volume = {35}, number = {13}, pages = {9593--9606}, year = {2023}, url = {https://doi.org/10.1007/s00521-022-08190-5}, doi = {10.1007/S00521-022-08190-5}, timestamp = {Mon, 01 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/nca/CaoXLQPS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/ZhangZGXCC23, author = {Yinghui Zhang and Tian Zhu and Rui Guo and Shengmin Xu and Hui Cui and Jin Cao}, title = {Multi-Keyword Searchable and Verifiable Attribute-Based Encryption Over Cloud Data}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {1}, pages = {971--983}, year = {2023}, url = {https://doi.org/10.1109/TCC.2021.3119407}, doi = {10.1109/TCC.2021.3119407}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/ZhangZGXCC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoZMGZL23, author = {Jin Cao and Tong Zhu and Ruhui Ma and Zhenyang Guo and Yinghui Zhang and Hui Li}, title = {A Software-Based Remote Attestation Scheme for Internet of Things Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {2}, pages = {1422--1434}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3154887}, doi = {10.1109/TDSC.2022.3154887}, timestamp = {Sun, 22 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoZMGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/RenCMLGZL23, author = {Xiongpeng Ren and Jin Cao and Ruhui Ma and Yurong Luo and Jian Guan and Yinghui Zhang and Hui Li}, title = {A Novel Access and Handover Authentication Scheme in UAV-Aided Satellite-Terrestrial Integration Networks Enabling 5G}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {3}, pages = {3880--3899}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3246732}, doi = {10.1109/TNSM.2023.3246732}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnsm/RenCMLGZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acl/HuserGGPCSDAFG23, author = {Jonathan J. H{\"{u}}ser and Judith Gaspers and Thomas Gueudr{\'{e}} and Chandana Satya Prakash and Jin Cao and Daniil Sorokin and Quynh Do and Nicolas Anastassacos and Tobias Falke and Turan Gojayev}, editor = {Sunayana Sitaram and Beata Beigman Klebanov and Jason D. Williams}, title = {Sharing Encoder Representations across Languages, Domains and Tasks in Large-Scale Spoken Language Understanding}, booktitle = {Proceedings of the The 61st Annual Meeting of the Association for Computational Linguistics: Industry Track, {ACL} 2023, Toronto, Canada, July 9-14, 2023}, pages = {447--456}, publisher = {Association for Computational Linguistics}, year = {2023}, url = {https://doi.org/10.18653/v1/2023.acl-industry.43}, doi = {10.18653/V1/2023.ACL-INDUSTRY.43}, timestamp = {Thu, 10 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acl/HuserGGPCSDAFG23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cisc/ZhangDCHZ23, author = {Yinghui Zhang and Hao Du and Jin Cao and Gang Han and Dong Zheng}, editor = {Chunpeng Ge and Moti Yung}, title = {DP-Loc: {A} Differential Privacy-Based Indoor Localization Scheme with Bilateral Privacy Protection}, booktitle = {Information Security and Cryptology - 19th International Conference, Inscrypt 2023, Hangzhou, China, December 9-10, 2023, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {14527}, pages = {293--304}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-97-0945-8\_16}, doi = {10.1007/978-981-97-0945-8\_16}, timestamp = {Mon, 11 Mar 2024 15:20:47 +0100}, biburl = {https://dblp.org/rec/conf/cisc/ZhangDCHZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/NiuWZGCL23, author = {Ben Niu and Xindi Wang and Likun Zhang and Shoukun Guo and Jin Cao and Fenghua Li}, title = {A Sensitivity-aware and Block-wise Pruning Method for Privacy-preserving Federated Learning}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2023, Kuala Lumpur, Malaysia, December 4-8, 2023}, pages = {4259--4264}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/GLOBECOM54140.2023.10437766}, doi = {10.1109/GLOBECOM54140.2023.10437766}, timestamp = {Sun, 10 Mar 2024 10:39:12 +0100}, biburl = {https://dblp.org/rec/conf/globecom/NiuWZGCL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WangFLCLY23, author = {Jiahui Wang and Yulong Fu and Mengru Liu and Jin Cao and Hui Li and Zheng Yan}, editor = {Weizhi Meng and Zheng Yan and Vincenzo Piuri}, title = {Privacy-Preserving Authentication Scheme for 5G Cloud-Fog Hybrid with Soft Biometrics}, booktitle = {Information Security Practice and Experience - 18th International Conference, {ISPEC} 2023, Copenhagen, Denmark, August 24-25, 2023, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {14341}, pages = {52--73}, publisher = {Springer}, year = {2023}, url = {https://doi.org/10.1007/978-981-99-7032-2\_4}, doi = {10.1007/978-981-99-7032-2\_4}, timestamp = {Wed, 15 Nov 2023 10:18:14 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WangFLCLY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/recsys/ShenOCKGRJSM23, author = {Junyi Shen and Dayvid V. R. Oliveira and Jin Cao and Brian Knott and Goodman Gu and Sindhu Vijaya Raghavan and Yunye Jin and Nikita Sudan and Rob Monarch}, editor = {Jie Zhang and Li Chen and Shlomo Berkovsky and Min Zhang and Tommaso Di Noia and Justin Basilico and Luiz Pizzato and Yang Song}, title = {Identifying Controversial Pairs in Item-to-Item Recommendations}, booktitle = {Proceedings of the 17th {ACM} Conference on Recommender Systems, RecSys 2023, Singapore, Singapore, September 18-22, 2023}, pages = {671--674}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3604915.3608871}, doi = {10.1145/3604915.3608871}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/recsys/ShenOCKGRJSM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wacv/ZhangCLWCLCN23, author = {Likun Zhang and Yahong Chen and Ang Li and Binghui Wang and Yiran Chen and Fenghua Li and Jin Cao and Ben Niu}, title = {Interpreting Disparate Privacy-Utility Tradeoff in Adversarial Learning via Attribute Correlation}, booktitle = {{IEEE/CVF} Winter Conference on Applications of Computer Vision, {WACV} 2023, Waikoloa, HI, USA, January 2-7, 2023}, pages = {4690--4698}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/WACV56688.2023.00468}, doi = {10.1109/WACV56688.2023.00468}, timestamp = {Tue, 14 Feb 2023 22:26:55 +0100}, biburl = {https://dblp.org/rec/conf/wacv/ZhangCLWCLCN23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/algorithms/CaoLFL22, author = {Jin Cao and Bo Li and Mengni Fan and Huiyu Liu}, title = {Inference Acceleration with Adaptive Distributed {DNN} Partition over Dynamic Video Stream}, journal = {Algorithms}, volume = {15}, number = {7}, pages = {244}, year = {2022}, url = {https://doi.org/10.3390/a15070244}, doi = {10.3390/A15070244}, timestamp = {Mon, 26 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/algorithms/CaoLFL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/CaoLMGTW22, author = {Jin Cao and Liwei Lin and Ruhui Ma and Haibing Guan and Mengke Tian and Yong Wang}, title = {An Efficient Deep Learning Approach To IoT Intrusion Detection}, journal = {Comput. J.}, volume = {65}, number = {11}, pages = {2870--2879}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxac119}, doi = {10.1093/COMJNL/BXAC119}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/CaoLMGTW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/RenCMLZ22, author = {Xiongpeng Ren and Jin Cao and Maode Ma and Hui Li and Yinghui Zhang}, title = {A Novel PUF-Based Group Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {5}, pages = {3642--3656}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2021.3098224}, doi = {10.1109/JIOT.2021.3098224}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/RenCMLZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoLMHZL22, author = {Jin Cao and Sheng Li and Ruhui Ma and Yuxi Han and Yueyu Zhang and Hui Li}, title = {{RPRIA:} Reputation and PUF-Based Remote Identity Attestation Protocol for Massive IoT Devices}, journal = {{IEEE} Internet Things J.}, volume = {9}, number = {19}, pages = {19174--19187}, year = {2022}, url = {https://doi.org/10.1109/JIOT.2022.3164174}, doi = {10.1109/JIOT.2022.3164174}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoLMHZL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/HanZZXSC22, author = {Gang Han and Tiantian Zhang and Yinghui Zhang and Guowen Xu and Jianfei Sun and Jin Cao}, title = {Verifiable and privacy preserving federated learning without fully trusted centers}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {13}, number = {3}, pages = {1431--1441}, year = {2022}, url = {https://doi.org/10.1007/s12652-020-02664-x}, doi = {10.1007/S12652-020-02664-X}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/HanZZXSC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jksucis/ZhangWCNYZ22, author = {Yinghui Zhang and Xuanni Wei and Jin Cao and Jianting Ning and Zuobin Ying and Dong Zheng}, title = {Blockchain-Enabled decentralized Attribute-Based access control with policy hiding for smart healthcare}, journal = {J. King Saud Univ. Comput. Inf. Sci.}, volume = {34}, number = {10 Part {A}}, pages = {8350--8361}, year = {2022}, url = {https://doi.org/10.1016/j.jksuci.2022.08.015}, doi = {10.1016/J.JKSUCI.2022.08.015}, timestamp = {Fri, 17 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jksucis/ZhangWCNYZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MaCFLLX22, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Xiaowei Li and Yang Xu}, title = {A robust authentication scheme for remote diagnosis and maintenance in 5G {V2N}}, journal = {J. Netw. Comput. Appl.}, volume = {198}, pages = {103281}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2021.103281}, doi = {10.1016/J.JNCA.2021.103281}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/MaCFLLX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/XiangCF22, author = {Xinyin Xiang and Jin Cao and Weiguo Fan}, title = {Decentralized authentication and access control protocol for blockchain-based e-health systems}, journal = {J. Netw. Comput. Appl.}, volume = {207}, pages = {103512}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2022.103512}, doi = {10.1016/J.JNCA.2022.103512}, timestamp = {Wed, 12 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/XiangCF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/SunCMZLN22, author = {Yunqing Sun and Jin Cao and Maode Ma and Yinghui Zhang and Hui Li and Ben Niu}, title = {{EAP-DDBA:} Efficient Anonymity Proximity Device Discovery and Batch Authentication Mechanism for Massive {D2D} Communication Devices in 3GPP 5G HetNet}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {370--387}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.2989784}, doi = {10.1109/TDSC.2020.2989784}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/SunCMZLN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/MaCZSXL22, author = {Ruhui Ma and Jin Cao and Yinghui Zhang and Chao Shang and Lihui Xiong and Hui Li}, title = {A Group-Based Multicast Service Authentication and Data Transmission Scheme for 5G-V2X}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {23}, number = {12}, pages = {23976--23992}, year = {2022}, url = {https://doi.org/10.1109/TITS.2022.3197767}, doi = {10.1109/TITS.2022.3197767}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/MaCZSXL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/kdd/FitzGeraldAABBB22, author = {Jack FitzGerald and Shankar Ananthakrishnan and Konstantine Arkoudas and Davide Bernardi and Abhishek Bhagia and Claudio Delli Bovi and Jin Cao and Rakesh Chada and Amit Chauhan and Luoxin Chen and Anurag Dwarakanath and Satyam Dwivedi and Turan Gojayev and Karthik Gopalakrishnan and Thomas Gueudr{\'{e}} and Dilek Hakkani{-}Tur and Wael Hamza and Jonathan J. H{\"{u}}ser and Kevin Martin Jose and Haidar Khan and Beiye Liu and Jianhua Lu and Alessandro Manzotti and Pradeep Natarajan and Karolina Owczarzak and Gokmen Oz and Enrico Palumbo and Charith Peris and Chandana Satya Prakash and Stephen Rawls and Andy Rosenbaum and Anjali Shenoy and Saleh Soltan and Mukund Harakere Sridhar and Lizhen Tan and Fabian Triefenbach and Pan Wei and Haiyang Yu and Shuai Zheng and G{\"{o}}khan T{\"{u}}r and Prem Natarajan}, editor = {Aidong Zhang and Huzefa Rangwala}, title = {Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems}, booktitle = {{KDD} '22: The 28th {ACM} {SIGKDD} Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14 - 18, 2022}, pages = {2893--2902}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3534678.3539173}, doi = {10.1145/3534678.3539173}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/kdd/FitzGeraldAABBB22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/naacl/LiSPCHM22, author = {Shuyang Li and Mukund Sridhar and Chandana Satya Prakash and Jin Cao and Wael Hamza and Julian J. McAuley}, editor = {Marine Carpuat and Marie{-}Catherine de Marneffe and Iv{\'{a}}n Vladimir Meza Ru{\'{\i}}z}, title = {Instilling Type Knowledge in Language Models via Multi-Task {QA}}, booktitle = {Findings of the Association for Computational Linguistics: {NAACL} 2022, Seattle, WA, United States, July 10-15, 2022}, pages = {594--603}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-naacl.45}, doi = {10.18653/V1/2022.FINDINGS-NAACL.45}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/naacl/LiSPCHM22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/naacl/CaoPH22, author = {Jin Cao and Chandana Satya Prakash and Wael Hamza}, editor = {Marine Carpuat and Marie{-}Catherine de Marneffe and Iv{\'{a}}n Vladimir Meza Ru{\'{\i}}z}, title = {Attention Fusion: a light yet efficient late fusion mechanism for task adaptation in {NLU}}, booktitle = {Findings of the Association for Computational Linguistics: {NAACL} 2022, Seattle, WA, United States, July 10-15, 2022}, pages = {857--866}, publisher = {Association for Computational Linguistics}, year = {2022}, url = {https://doi.org/10.18653/v1/2022.findings-naacl.64}, doi = {10.18653/V1/2022.FINDINGS-NAACL.64}, timestamp = {Mon, 01 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/naacl/CaoPH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/TianLLCG22, author = {Minqiu Tian and Zifu Li and Fenghua Li and Jin Cao and Chao Guo}, title = {A Terminal Security Authentication Protocol for Zero-Trust Satellite IoT}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {299--306}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00049}, doi = {10.1109/TRUSTCOM56396.2022.00049}, timestamp = {Mon, 27 Mar 2023 16:44:39 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/TianLLCG22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/LuoSSLWCN22, author = {Haiyang Luo and Zhe Sun and Yunqing Sun and Ang Li and Binghui Wang and Jin Cao and Ben Niu}, title = {SmartCircles: {A} Benefit-Evaluation-Based Privacy Policy Recommender for Customized Photo Sharing}, booktitle = {{IEEE} Smartworld, Ubiquitous Intelligence {\&} Computing, Scalable Computing {\&} Communications, Digital Twin, Privacy Computing, Metaverse, Autonomous {\&} Trusted Vehicles, SmartWorld/UIC/ScalCom/DigitalTwin/PriComp/Meta 2022, Haikou, China, December 15-18, 2022}, pages = {2340--2347}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-ScalCom-DigitalTwin-PriComp-Metaverse56740.2022.00331}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-DIGITALTWIN-PRICOMP-METAVERSE56740.2022.00331}, timestamp = {Fri, 04 Aug 2023 17:34:39 +0200}, biburl = {https://dblp.org/rec/conf/uic/LuoSSLWCN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/NiuZCCL22, author = {Ben Niu and Zejun Zhou and Yahong Chen and Jin Cao and Fenghua Li}, editor = {Lei Wang and Michael Segal and Jenhui Chen and Tie Qiu}, title = {DP-Opt: Identify High Differential Privacy Violation by Optimization}, booktitle = {Wireless Algorithms, Systems, and Applications - 17th International Conference, {WASA} 2022, Dalian, China, November 24-26, 2022, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {13472}, pages = {406--416}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-19214-2\_34}, doi = {10.1007/978-3-031-19214-2\_34}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wasa/NiuZCCL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wsdm/TrabelsiHC22, author = {Mohamed Trabelsi and Jeff Heflin and Jin Cao}, editor = {K. Selcuk Candan and Huan Liu and Leman Akoglu and Xin Luna Dong and Jiliang Tang}, title = {{DAME:} Domain Adaptation for Matching Entities}, booktitle = {{WSDM} '22: The Fifteenth {ACM} International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21 - 25, 2022}, pages = {1016--1024}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3488560.3498486}, doi = {10.1145/3488560.3498486}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wsdm/TrabelsiHC22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-09244, author = {Mohamed Trabelsi and Jeff Heflin and Jin Cao}, title = {{DAME:} Domain Adaptation for Matching Entities}, journal = {CoRR}, volume = {abs/2204.09244}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.09244}, doi = {10.48550/ARXIV.2204.09244}, eprinttype = {arXiv}, eprint = {2204.09244}, timestamp = {Mon, 25 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-09244.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2204-13796, author = {Shuyang Li and Mukund Sridhar and Chandana Satya Prakash and Jin Cao and Wael Hamza and Julian J. McAuley}, title = {Instilling Type Knowledge in Language Models via Multi-Task {QA}}, journal = {CoRR}, volume = {abs/2204.13796}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2204.13796}, doi = {10.48550/ARXIV.2204.13796}, eprinttype = {arXiv}, eprint = {2204.13796}, timestamp = {Mon, 02 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2204-13796.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2206-07808, author = {Jack FitzGerald and Shankar Ananthakrishnan and Konstantine Arkoudas and Davide Bernardi and Abhishek Bhagia and Claudio Delli Bovi and Jin Cao and Rakesh Chada and Amit Chauhan and Luoxin Chen and Anurag Dwarakanath and Satyam Dwivedi and Turan Gojayev and Karthik Gopalakrishnan and Thomas Gueudr{\'{e}} and Dilek Hakkani{-}Tur and Wael Hamza and Jonathan J. H{\"{u}}ser and Kevin Martin Jose and Haidar Khan and Beiye Liu and Jianhua Lu and Alessandro Manzotti and Pradeep Natarajan and Karolina Owczarzak and Gokmen Oz and Enrico Palumbo and Charith Peris and Chandana Satya Prakash and Stephen Rawls and Andy Rosenbaum and Anjali Shenoy and Saleh Soltan and Mukund Harakere Sridhar and Liz Tan and Fabian Triefenbach and Pan Wei and Haiyang Yu and Shuai Zheng and G{\"{o}}khan T{\"{u}}r and Prem Natarajan}, title = {Alexa Teacher Model: Pretraining and Distilling Multi-Billion-Parameter Encoders for Natural Language Understanding Systems}, journal = {CoRR}, volume = {abs/2206.07808}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2206.07808}, doi = {10.48550/ARXIV.2206.07808}, eprinttype = {arXiv}, eprint = {2206.07808}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2206-07808.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangWCZCJ21, author = {Yinghui Zhang and Axin Wu and Zhenwei Chen and Dong Zheng and Jin Cao and Xiaohong Jiang}, title = {Flexible and anonymous network slicing selection for {C-RAN} enabled 5G service authentication}, journal = {Comput. Commun.}, volume = {166}, pages = {165--173}, year = {2021}, url = {https://doi.org/10.1016/j.comcom.2020.12.014}, doi = {10.1016/J.COMCOM.2020.12.014}, timestamp = {Fri, 20 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhangWCZCJ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/LiLCWZ21, author = {Yupeng Li and Meng Liu and Jin Cao and Xiaolin Wang and Na Zhang}, title = {Multi-attribute group decision-making considering opinion dynamics}, journal = {Expert Syst. Appl.}, volume = {184}, pages = {115479}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2021.115479}, doi = {10.1016/J.ESWA.2021.115479}, timestamp = {Wed, 29 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LiLCWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/infsof/JiangWCXZ21, author = {Jing Jiang and Qiudi Wu and Jin Cao and Xin Xia and Li Zhang}, title = {Recommending tags for pull requests in GitHub}, journal = {Inf. Softw. Technol.}, volume = {129}, pages = {106394}, year = {2021}, url = {https://doi.org/10.1016/j.infsof.2020.106394}, doi = {10.1016/J.INFSOF.2020.106394}, timestamp = {Wed, 16 Mar 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/infsof/JiangWCXZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/FangCCZW21, author = {Haifeng Fang and Jin Cao and Lihua Cai and Ta Zhou and MingQiang Wang}, title = {The recognition of plastic bottle using linear multi hierarchical {SVM} classifier}, journal = {J. Intell. Fuzzy Syst.}, volume = {40}, number = {6}, pages = {11509--11522}, year = {2021}, url = {https://doi.org/10.3233/JIFS-202729}, doi = {10.3233/JIFS-202729}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jifs/FangCCZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/TuCGCCVGDK21, author = {Yiheng Tu and Jin Cao and Seyhmus Guler and Thalia Chai{-}Zhang and Joan A. Camprodon and Mark G. Vangel and Randy L. Gollub and Darin D. Dougherty and Jian Kong}, title = {Perturbing fMRI brain dynamics using transcranial direct current stimulation}, journal = {NeuroImage}, volume = {237}, pages = {118100}, year = {2021}, url = {https://doi.org/10.1016/j.neuroimage.2021.118100}, doi = {10.1016/J.NEUROIMAGE.2021.118100}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/TuCGCCVGDK21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/nn/JiangQCPS21, author = {Haowei Jiang and Feiwei Qin and Jin Cao and Yong Peng and Yanli Shao}, title = {Recurrent neural network from adder's perspective: Carry-lookahead {RNN}}, journal = {Neural Networks}, volume = {144}, pages = {297--306}, year = {2021}, url = {https://doi.org/10.1016/j.neunet.2021.08.032}, doi = {10.1016/J.NEUNET.2021.08.032}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/nn/JiangQCPS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sj/XiangCF21, author = {Xinyin Xiang and Jin Cao and Weiguo Fan}, title = {Scalable Attestation Protocol Resilient to Physical Attacks for IoT Environments}, journal = {{IEEE} Syst. J.}, volume = {15}, number = {3}, pages = {4566--4577}, year = {2021}, url = {https://doi.org/10.1109/JSYST.2020.3040739}, doi = {10.1109/JSYST.2020.3040739}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sj/XiangCF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/taslp/LiWCC21, author = {Canguang Li and Guohua Wang and Jin Cao and Yi Cai}, title = {A Multi-Agent Communication Based Model for Nested Named Entity Recognition}, journal = {{IEEE} {ACM} Trans. Audio Speech Lang. Process.}, volume = {29}, pages = {2123--2136}, year = {2021}, url = {https://doi.org/10.1109/TASLP.2021.3086978}, doi = {10.1109/TASLP.2021.3086978}, timestamp = {Fri, 13 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/taslp/LiWCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/CaoMFLZ21, author = {Jin Cao and Maode Ma and Yulong Fu and Hui Li and Yinghui Zhang}, title = {{CPPHA:} Capability-Based Privacy-Protection Handover Authentication Mechanism for SDN-Based 5G HetNets}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {3}, pages = {1182--1195}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2019.2916593}, doi = {10.1109/TDSC.2019.2916593}, timestamp = {Fri, 17 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/CaoMFLZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aaai/LiWCC21, author = {Canguang Li and Guohua Wang and Jin Cao and Yi Cai}, title = {A Nested Named Entity Recognition Model Based on Multi-agent Communication Mechanism (Student Abstract)}, booktitle = {Thirty-Fifth {AAAI} Conference on Artificial Intelligence, {AAAI} 2021, Thirty-Third Conference on Innovative Applications of Artificial Intelligence, {IAAI} 2021, The Eleventh Symposium on Educational Advances in Artificial Intelligence, {EAAI} 2021, Virtual Event, February 2-9, 2021}, pages = {15823--15824}, publisher = {{AAAI} Press}, year = {2021}, url = {https://doi.org/10.1609/aaai.v35i18.17908}, doi = {10.1609/AAAI.V35I18.17908}, timestamp = {Mon, 04 Sep 2023 12:29:24 +0200}, biburl = {https://dblp.org/rec/conf/aaai/LiWCC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/CaoH21, author = {Jin Cao and Rui Hu}, editor = {Yixin Chen and Heiko Ludwig and Yicheng Tu and Usama M. Fayyad and Xingquan Zhu and Xiaohua Hu and Suren Byna and Xiong Liu and Jianping Zhang and Shirui Pan and Vagelis Papalexakis and Jianwu Wang and Alfredo Cuzzocrea and Carlos Ordonez}, title = {Scalable Outlier Detection Using Distance Projections}, booktitle = {2021 {IEEE} International Conference on Big Data (Big Data), Orlando, FL, USA, December 15-18, 2021}, pages = {4431--4440}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/BigData52589.2021.9671856}, doi = {10.1109/BIGDATA52589.2021.9671856}, timestamp = {Fri, 13 Jan 2023 17:06:49 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/CaoH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eacl/LiCSZLHM21, author = {Shuyang Li and Jin Cao and Mukund Sridhar and Henghui Zhu and Shang{-}Wen Li and Wael Hamza and Julian J. McAuley}, editor = {Paola Merlo and J{\"{o}}rg Tiedemann and Reut Tsarfaty}, title = {Zero-shot Generalization in Dialog State Tracking through Generative Question Answering}, booktitle = {Proceedings of the 16th Conference of the European Chapter of the Association for Computational Linguistics: Main Volume, {EACL} 2021, Online, April 19 - 23, 2021}, pages = {1063--1074}, publisher = {Association for Computational Linguistics}, year = {2021}, url = {https://doi.org/10.18653/v1/2021.eacl-main.91}, doi = {10.18653/V1/2021.EACL-MAIN.91}, timestamp = {Thu, 20 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eacl/LiCSZLHM21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/TrabelsiCH21, author = {Mohamed Trabelsi and Jin Cao and Jeff Heflin}, title = {SeLaB: Semantic Labeling with {BERT}}, booktitle = {International Joint Conference on Neural Networks, {IJCNN} 2021, Shenzhen, China, July 18-22, 2021}, pages = {1--8}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/IJCNN52387.2021.9534408}, doi = {10.1109/IJCNN52387.2021.9534408}, timestamp = {Sun, 03 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/TrabelsiCH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/NiuCWWLC21, author = {Ben Niu and Yahong Chen and Boyang Wang and Zhibo Wang and Fenghua Li and Jin Cao}, title = {AdaPDP: Adaptive Personalized Differential Privacy}, booktitle = {40th {IEEE} Conference on Computer Communications, {INFOCOM} 2021, Vancouver, BC, Canada, May 10-13, 2021}, pages = {1--10}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/INFOCOM42981.2021.9488825}, doi = {10.1109/INFOCOM42981.2021.9488825}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/NiuCWWLC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/metroauto/SunDBCWS21, author = {Qiao Sun and Lei Du and Jie Bai and Jin Cao and Lifang Wang and Yang Su}, title = {Implementation of national comparison of optical speed meters in China}, booktitle = {{IEEE} International Workshop on Metrology for Automotive, MetroAutomotive 2021, Bologna, Italy, July 1-2, 2021}, pages = {93--97}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/MetroAutomotive50197.2021.9502854}, doi = {10.1109/METROAUTOMOTIVE50197.2021.9502854}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/metroauto/SunDBCWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2101-08333, author = {Shuyang Li and Jin Cao and Mukund Sridhar and Henghui Zhu and Shang{-}Wen Li and Wael Hamza and Julian J. McAuley}, title = {Zero-shot Generalization in Dialog State Tracking through Generative Question Answering}, journal = {CoRR}, volume = {abs/2101.08333}, year = {2021}, url = {https://arxiv.org/abs/2101.08333}, eprinttype = {arXiv}, eprint = {2101.08333}, timestamp = {Sat, 30 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2101-08333.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2106-12901, author = {Haowei Jiang and Feiwei Qin and Jin Cao and Yong Peng and Yanli Shao}, title = {Recurrent Neural Network from Adder's Perspective: Carry-lookahead {RNN}}, journal = {CoRR}, volume = {abs/2106.12901}, year = {2021}, url = {https://arxiv.org/abs/2106.12901}, eprinttype = {arXiv}, eprint = {2106.12901}, timestamp = {Tue, 20 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2106-12901.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ChenYCLPWZ20, author = {Xi Chen and Ping Yang and Jin Cao and Xinyang Li and Yusheng Peng and Songrong Wu and Guohua Zhou}, title = {Adaptive on Time Controlled Double-Line- Frequency Ripple Suppressor With Fast Dynamic Response and High Efficiency}, journal = {{IEEE} Access}, volume = {8}, pages = {179692--179701}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3021710}, doi = {10.1109/ACCESS.2020.3021710}, timestamp = {Wed, 25 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/ChenYCLPWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaoMLMSYX20, author = {Jin Cao and Maode Ma and Hui Li and Ruhui Ma and Yunqing Sun and Pu Yu and Lihui Xiong}, title = {A Survey on Security Aspects for 3GPP 5G Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {22}, number = {1}, pages = {170--195}, year = {2020}, url = {https://doi.org/10.1109/COMST.2019.2951818}, doi = {10.1109/COMST.2019.2951818}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/CaoMLMSYX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LiNCLL20, author = {Weihao Li and Ben Niu and Jin Cao and Yurong Luo and Hui Li}, title = {A personalized range-sensitive privacy-preserving scheme in LBSs}, journal = {Concurr. Comput. Pract. Exp.}, volume = {32}, number = {5}, year = {2020}, url = {https://doi.org/10.1002/cpe.5462}, doi = {10.1002/CPE.5462}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/LiNCLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/MaCFL20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li}, title = {{LAA:} Lattice-Based Access Authentication Scheme for IoT in Space Information Networks}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {2791--2805}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2962553}, doi = {10.1109/JIOT.2019.2962553}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/MaCFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYMZFL20, author = {Jin Cao and Zheng Yan and Ruhui Ma and Yinghui Zhang and Yulong Fu and Hui Li}, title = {{LSAA:} {A} Lightweight and Secure Access Authentication Scheme for Both {UE} and mMTC Devices in 5G Networks}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {6}, pages = {5329--5344}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2020.2976740}, doi = {10.1109/JIOT.2020.2976740}, timestamp = {Fri, 09 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYMZFL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/FuCZYKJCL20, author = {Yulong Fu and Hanlu Chen and Qinghua Zheng and Zheng Yan and Raimo Kantola and Xuyang Jing and Jin Cao and Hui Li}, title = {An Adaptive Security Data Collection and Composition Recognition method for security measurement over {LTE/LTE-A} networks}, journal = {J. Netw. Comput. Appl.}, volume = {155}, pages = {102549}, year = {2020}, url = {https://doi.org/10.1016/j.jnca.2020.102549}, doi = {10.1016/J.JNCA.2020.102549}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/FuCZYKJCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/YuLSEGWPOCGMCLW20, author = {Siyi Yu and Wen Li and Wei Shen and Robert R. Edwards and Randy L. Gollub and Georgia Wilson and Joel Park and Ana Ortiz and Jin Cao and Jessica Gerber and Ishtiaq Mawla and Suk{-}Tak Chan and Jeungchan Lee and Ajay D. Wasan and Vitaly Napadow and Ted J. Kaptchuk and Bruce R. Rosen and Jian Kong}, title = {Impaired mesocorticolimbic connectivity underlies increased pain sensitivity in chronic low back pain}, journal = {NeuroImage}, volume = {218}, pages = {116969}, year = {2020}, url = {https://doi.org/10.1016/j.neuroimage.2020.116969}, doi = {10.1016/J.NEUROIMAGE.2020.116969}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/YuLSEGWPOCGMCLW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/CaoTWOK20, author = {Jin Cao and Yiheng Tu and Georgia Wilson and Scott P. Orr and Jian Kong}, title = {Characterizing the analgesic effects of real and imagined acupuncture using functional and structure {MRI}}, journal = {NeuroImage}, volume = {221}, pages = {117176}, year = {2020}, url = {https://doi.org/10.1016/j.neuroimage.2020.117176}, doi = {10.1016/J.NEUROIMAGE.2020.117176}, timestamp = {Fri, 25 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neuroimage/CaoTWOK20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhouGCGCCDZS20, author = {Chaofan Zhou and Huili Gong and Beibei Chen and Mingliang Gao and Qun Cao and Jin Cao and Li Duan and Junjie Zuo and Min Shi}, title = {Land Subsidence Response to Different Land Use Types and Water Resource Utilization in Beijing-Tianjin-Hebei, China}, journal = {Remote. Sens.}, volume = {12}, number = {3}, pages = {457}, year = {2020}, url = {https://doi.org/10.3390/rs12030457}, doi = {10.3390/RS12030457}, timestamp = {Mon, 11 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhouGCGCCDZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/DuanGCZLGYCC20, author = {Li Duan and Huili Gong and Beibei Chen and Chaofan Zhou and Kunchao Lei and Mingliang Gao and Hairuo Yu and Qun Cao and Jin Cao}, title = {An Improved Multi-Sensor {MTI} Time-Series Fusion Method to Monitor the Subsidence of Beijing Subway Network during the Past 15 Years}, journal = {Remote. Sens.}, volume = {12}, number = {13}, pages = {2125}, year = {2020}, url = {https://doi.org/10.3390/rs12132125}, doi = {10.3390/RS12132125}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/remotesensing/DuanGCZLGYCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcas/YangCSCX20, author = {Ping Yang and Jin Cao and Zerong Shang and Yaping Cai and Jianping Xu}, title = {Double-Line Frequency Ripple Suppression of a Quasi-Single Stage {AC-DC} Converter}, journal = {{IEEE} Trans. Circuits Syst. {II} Express Briefs}, volume = {67-II}, number = {10}, pages = {2074--2078}, year = {2020}, url = {https://doi.org/10.1109/TCSII.2019.2948942}, doi = {10.1109/TCSII.2019.2948942}, timestamp = {Thu, 08 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcas/YangCSCX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/MaCFLH20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Shiyang He}, title = {{FTGPHA:} Fixed-Trajectory Group Pre-Handover Authentication Mechanism for Mobile Relays in 5G High-Speed Rail Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {69}, number = {2}, pages = {2126--2140}, year = {2020}, url = {https://doi.org/10.1109/TVT.2019.2960313}, doi = {10.1109/TVT.2019.2960313}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/MaCFLH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasfaa/CaoWLRCWL20, author = {Jin Cao and Guohua Wang and Canguang Li and Haopeng Ren and Yi Cai and Raymond Chi{-}Wing Wong and Qing Li}, editor = {Yunmook Nah and Bin Cui and Sang{-}Won Lee and Jeffrey Xu Yu and Yang{-}Sae Moon and Steven Euijong Whang}, title = {Incorporating Boundary and Category Feature for Nested Named Entity Recognition}, booktitle = {Database Systems for Advanced Applications - 25th International Conference, {DASFAA} 2020, Jeju, South Korea, September 24-27, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12113}, pages = {209--226}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-59416-9\_13}, doi = {10.1007/978-3-030-59416-9\_13}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasfaa/CaoWLRCWL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/0001ZCLDCL20, author = {Ben Niu and Likun Zhang and Yahong Chen and Ang Li and Wei Du and Jin Cao and Fenghua Li}, title = {A Framework to Preserve User Privacy for Machine Learning as a Service}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2020, Virtual Event, Taiwan, December 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/GLOBECOM42002.2020.9322322}, doi = {10.1109/GLOBECOM42002.2020.9322322}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/0001ZCLDCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GuoZLLFYC20, author = {Yunchuan Guo and Han Zhang and Zifu Li and Fenghua Li and Liang Fang and Lihua Yin and Jin Cao}, title = {Decision-Making for Intrusion Response: Which, Where, in What Order, and How Long?}, booktitle = {2020 {IEEE} International Conference on Communications, {ICC} 2020, Dublin, Ireland, June 7-11, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/ICC40277.2020.9149083}, doi = {10.1109/ICC40277.2020.9149083}, timestamp = {Tue, 04 Aug 2020 10:37:23 +0200}, biburl = {https://dblp.org/rec/conf/icc/GuoZLLFYC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip11-9/0003ZLJCC20, author = {Jingcheng Liu and Yaping Zhang and Yuze Li and Yongheng Jia and Yao Chen and Jin Cao}, editor = {Gilbert L. Peterson and Sujeet Shenoi}, title = {Detecting Local Machine Data Leakage in Real Time}, booktitle = {Advances in Digital Forensics {XVI} - 16th {IFIP} {WG} 11.9 International Conference, New Delhi, India, January 6-8, 2020, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {589}, pages = {291--308}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-56223-6\_16}, doi = {10.1007/978-3-030-56223-6\_16}, timestamp = {Thu, 17 Sep 2020 14:12:05 +0200}, biburl = {https://dblp.org/rec/conf/ifip11-9/0003ZLJCC20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/interspeech/CaoWHVL20, author = {Jin Cao and Jun Wang and Wael Hamza and Kelly Vanee and Shang{-}Wen Li}, editor = {Helen Meng and Bo Xu and Thomas Fang Zheng}, title = {Style Attuned Pre-Training and Parameter Efficient Fine-Tuning for Spoken Language Understanding}, booktitle = {Interspeech 2020, 21st Annual Conference of the International Speech Communication Association, Virtual Event, Shanghai, China, 25-29 October 2020}, pages = {1570--1574}, publisher = {{ISCA}}, year = {2020}, url = {https://doi.org/10.21437/Interspeech.2020-2907}, doi = {10.21437/INTERSPEECH.2020-2907}, timestamp = {Fri, 29 Jan 2021 17:40:16 +0100}, biburl = {https://dblp.org/rec/conf/interspeech/CaoWHVL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/MaCF0NLY20, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Ben Niu and Fenghua Li and Lihua Yin}, title = {A Secure Authentication Scheme for Remote Diagnosis and Maintenance in Internet of Vehicles}, booktitle = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2020, Seoul, Korea (South), May 25-28, 2020}, pages = {1--7}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WCNC45663.2020.9120719}, doi = {10.1109/WCNC45663.2020.9120719}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/MaCF0NLY20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/NiuCWCL20, author = {Ben Niu and Yahong Chen and Boyang Wang and Jin Cao and Fenghua Li}, title = {Utility-aware Exponential Mechanism for Personalized Differential Privacy}, booktitle = {2020 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2020, Seoul, Korea (South), May 25-28, 2020}, pages = {1--6}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/WCNC45663.2020.9120532}, doi = {10.1109/WCNC45663.2020.9120532}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/NiuCWCL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-03352, author = {Jin Cao and Dewei Zhong}, title = {A Fast Randomized Algorithm for Finding the Maximal Common Subsequences}, journal = {CoRR}, volume = {abs/2009.03352}, year = {2020}, url = {https://arxiv.org/abs/2009.03352}, eprinttype = {arXiv}, eprint = {2009.03352}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-03352.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2009-03358, author = {Jin Cao and Yibo Zhao and Linjun Zhang and Jason Li}, title = {A Lightweight Algorithm to Uncover Deep Relationships in Data Tables}, journal = {CoRR}, volume = {abs/2009.03358}, year = {2020}, url = {https://arxiv.org/abs/2009.03358}, eprinttype = {arXiv}, eprint = {2009.03358}, timestamp = {Thu, 17 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2009-03358.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-04355, author = {Jin Cao and Jun Wang and Wael Hamza and Kelly Vanee and Shang{-}Wen Li}, title = {Style Attuned Pre-training and Parameter Efficient Fine-tuning for Spoken Language Understanding}, journal = {CoRR}, volume = {abs/2010.04355}, year = {2020}, url = {https://arxiv.org/abs/2010.04355}, eprinttype = {arXiv}, eprint = {2010.04355}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-04355.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-16037, author = {Mohamed Trabelsi and Jin Cao and Jeff Heflin}, title = {Semantic Labeling Using a Deep Contextualized Language Model}, journal = {CoRR}, volume = {abs/2010.16037}, year = {2020}, url = {https://arxiv.org/abs/2010.16037}, eprinttype = {arXiv}, eprint = {2010.16037}, timestamp = {Tue, 03 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-16037.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2011-06195, author = {Cheng{-}I Lai and Jin Cao and Sravan Bodapati and Shang{-}Wen Li}, title = {Towards Semi-Supervised Semantics Understanding from Speech}, journal = {CoRR}, volume = {abs/2011.06195}, year = {2020}, url = {https://arxiv.org/abs/2011.06195}, eprinttype = {arXiv}, eprint = {2011.06195}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2011-06195.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DingCLFL19, author = {Sheng Ding and Jin Cao and Chen Li and Kai Fan and Hui Li}, title = {A Novel Attribute-Based Access Control Scheme Using Blockchain for IoT}, journal = {{IEEE} Access}, volume = {7}, pages = {38431--38441}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2905846}, doi = {10.1109/ACCESS.2019.2905846}, timestamp = {Fri, 02 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DingCLFL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangRWZCZ19, author = {Yinghui Zhang and Fangyuan Ren and Axin Wu and Tiantian Zhang and Jin Cao and Dong Zheng}, title = {Certificateless Multi-Party Authenticated Encryption for NB-IoT Terminals in 5G Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {114721--114730}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2936123}, doi = {10.1109/ACCESS.2019.2936123}, timestamp = {Sat, 21 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangRWZCZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/MaCFLZL19, author = {Ruhui Ma and Jin Cao and Dengguo Feng and Hui Li and Yinghui Zhang and Xixiang Lv}, title = {{PPSHA:} Privacy preserving secure handover authentication scheme for all application scenarios in {LTE-A} networks}, journal = {Ad Hoc Networks}, volume = {87}, pages = {49--60}, year = {2019}, url = {https://doi.org/10.1016/j.adhoc.2018.11.012}, doi = {10.1016/J.ADHOC.2018.11.012}, timestamp = {Wed, 15 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/adhoc/MaCFLZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aei/ZhaiCZCLJSLH19, author = {Yue Zhai and Ke Chen and Jason X. Zhou and Jin Cao and Zhongyuan Lyu and Xin Jin and Geoffrey Q. P. Shen and Weisheng Lu and George Q. Huang}, title = {An Internet of Things-enabled {BIM} platform for modular integrated construction: {A} case study in Hong Kong}, journal = {Adv. Eng. Informatics}, volume = {42}, year = {2019}, url = {https://doi.org/10.1016/j.aei.2019.100997}, doi = {10.1016/J.AEI.2019.100997}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aei/ZhaiCZCLJSLH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/aeog/YaoCWZW19, author = {Rui Yao and Jin Cao and Lunche Wang and Wenwen Zhang and Xiaojun Wu}, title = {Urbanization effects on vegetation cover in major African cities during 2001-2017}, journal = {Int. J. Appl. Earth Obs. Geoinformation}, volume = {75}, pages = {44--53}, year = {2019}, url = {https://doi.org/10.1016/j.jag.2018.10.011}, doi = {10.1016/J.JAG.2018.10.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/aeog/YaoCWZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/asc/GaoWLC19, author = {Weifeng Gao and Zhifang Wei and Yuting Luo and Jin Cao}, title = {Artificial bee colony algorithm based on Parzen window method}, journal = {Appl. Soft Comput.}, volume = {74}, pages = {679--692}, year = {2019}, url = {https://doi.org/10.1016/j.asoc.2018.10.024}, doi = {10.1016/J.ASOC.2018.10.024}, timestamp = {Thu, 03 Jan 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/GaoWLC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/CaoML19, author = {Jin Cao and Maode Ma and Hui Li}, title = {{LPPA:} Lightweight privacy-preservation access authentication scheme for massive devices in fifth Generation {(5G)} cellular networks}, journal = {Int. J. Commun. Syst.}, volume = {32}, number = {3}, year = {2019}, url = {https://doi.org/10.1002/dac.3860}, doi = {10.1002/DAC.3860}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/CaoML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYMG19, author = {Jin Cao and Pu Yu and Maode Ma and Weifeng Gao}, title = {Fast Authentication and Data Transfer Scheme for Massive NB-IoT Devices in 3GPP 5G Network}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {1561--1575}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2846803}, doi = {10.1109/JIOT.2018.2846803}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYMG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYC19, author = {Jin Cao and Lei Yang and Jiannong Cao}, title = {Revisiting Computation Partitioning in Future 5G-Based Edge Computing Environments}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {2}, pages = {2427--2438}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2018.2869750}, doi = {10.1109/JIOT.2018.2869750}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoYXML19, author = {Jin Cao and Pu Yu and Xinyin Xiang and Maode Ma and Hui Li}, title = {Anti-Quantum Fast Authentication and Data Transmission Scheme for Massive Devices in 5G NB-IoT System}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {6}, pages = {9794--9805}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2931724}, doi = {10.1109/JIOT.2019.2931724}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoYXML19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/TuPAKELCK19, author = {Yiheng Tu and Joel Park and Seppo P. Ahlfors and Sheraz Khan and Natalia Egorova and Courtney Amanda Lang and Jin Cao and Jian Kong}, title = {A neural mechanism of direct and observational conditioning for placebo and nocebo responses}, journal = {NeuroImage}, volume = {184}, pages = {954--963}, year = {2019}, url = {https://doi.org/10.1016/j.neuroimage.2018.10.020}, doi = {10.1016/J.NEUROIMAGE.2018.10.020}, timestamp = {Fri, 18 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/neuroimage/TuPAKELCK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/neuroimage/TuZCWZK19, author = {Yiheng Tu and Binlong Zhang and Jin Cao and Georgia Wilson and Zhiguo Zhang and Jian Kong}, title = {Identifying inter-individual differences in pain threshold using brain connectome: a test-retest reproducible study}, journal = {NeuroImage}, volume = {202}, year = {2019}, url = {https://doi.org/10.1016/j.neuroimage.2019.116049}, doi = {10.1016/J.NEUROIMAGE.2019.116049}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/neuroimage/TuZCWZK19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/ZhangDZLWC19, author = {Yinghui Zhang and Robert H. Deng and Dong Zheng and Jin Li and Pengfei Wu and Jin Cao}, title = {Efficient and Robust Certificateless Signature for Data Crowdsensing in Cloud-Assisted Industrial IoT}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {15}, number = {9}, pages = {5099--5108}, year = {2019}, url = {https://doi.org/10.1109/TII.2019.2894108}, doi = {10.1109/TII.2019.2894108}, timestamp = {Sat, 09 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/ZhangDZLWC19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/case/XuLWZCQ19, author = {Chuqiao Xu and Xin Liu and Junliang Wang and Jie Zhang and Jin Cao and Wei Qin}, title = {An Improved {GA-KRR} Nested Learning Approach for Refrigeration Compressor Performance Forecasting\({}^{\mbox{*}}\)}, booktitle = {15th {IEEE} International Conference on Automation Science and Engineering, {CASE} 2019, Vancouver, BC, Canada, August 22-26, 2019}, pages = {622--627}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/COASE.2019.8843001}, doi = {10.1109/COASE.2019.8843001}, timestamp = {Thu, 15 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/case/XuLWZCQ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LiS0CL19, author = {Fenghua Li and Zhe Sun and Ben Niu and Jin Cao and Hui Li}, title = {An Extended Control Framework for Privacy-Preserving Photo Sharing across Different Social Networks}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {390--394}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685488}, doi = {10.1109/ICCNC.2019.8685488}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/LiS0CL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/LuoCMLNL19, author = {Yurong Luo and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {{DIAM:} Diversified Identity Authentication Mechanism for 5G Multi-Service System}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {418--424}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685543}, doi = {10.1109/ICCNC.2019.8685543}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/LuoCMLNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/SunCMLNL19, author = {Yunqing Sun and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {Privacy-Preserving Device Discovery and Authentication Scheme for {D2D} Communication in 3GPP 5G HetNet}, booktitle = {International Conference on Computing, Networking and Communications, {ICNC} 2019, Honolulu, HI, USA, February 18-21, 2019}, pages = {425--431}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICCNC.2019.8685499}, doi = {10.1109/ICCNC.2019.8685499}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/SunCMLNL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incdm/PhadkeTCU19, author = {Chitra Phadke and Paishun Ting and Jin Cao and H{\"{u}}seyin Uzunalioglu}, editor = {Petra Perner}, title = {{CLUES:} Detection of User Intent through Interactive Comparison}, booktitle = {Advances in Data Mining - Applications and Theoretical Aspects, 19th Industrial Conference, {ICDM} 2019, New York, USA, July 17 - July 21, 2019, Poster Proceedings}, pages = {173--184}, publisher = {ibai Publishing}, year = {2019}, timestamp = {Sat, 21 Aug 2021 13:54:13 +0200}, biburl = {https://dblp.org/rec/conf/incdm/PhadkeTCU19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/HeCZL19, author = {Ran He and Jin Cao and Lisa Zhang and Denny Lee}, title = {Statistical Enrichment Models for Activity Inference from Imprecise Location Data}, booktitle = {2019 {IEEE} Conference on Computer Communications, {INFOCOM} 2019, Paris, France, April 29 - May 2, 2019}, pages = {946--954}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/INFOCOM.2019.8737535}, doi = {10.1109/INFOCOM.2019.8737535}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/HeCZL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mldm/ZhaoCH19, author = {Yibo Zhao and Jin Cao and Ran He}, editor = {Petra Perner}, title = {Two-Sample Tests for High Dimensional Distributions Using One-Dimensional Random Projections}, booktitle = {Machine Learning and Data Mining in Pattern Recognition, 15th International Conference on Machine Learning and Data Mining, {MLDM} 2019, New York, NY, USA, July 20-25, 2019, Proceedings, Volume {II}}, pages = {718--732}, publisher = {ibai Publishing}, year = {2019}, timestamp = {Sat, 21 Aug 2021 13:54:13 +0200}, biburl = {https://dblp.org/rec/conf/mldm/ZhaoCH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/FuLA0CL19, author = {Yulong Fu and Guoquan Li and Mohammed Atiquzzaman and Zheng Yan and Jin Cao and Hui Li}, title = {A Study and Enhancement to the Security of {MANET} {AODV} Protocol Against Black Hole Attacks}, booktitle = {2019 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019, Leicester, United Kingdom, August 19-23, 2019}, pages = {1431--1436}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/SmartWorld-UIC-ATC-SCALCOM-IOP-SCI.2019.00259}, doi = {10.1109/SMARTWORLD-UIC-ATC-SCALCOM-IOP-SCI.2019.00259}, timestamp = {Wed, 16 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/FuLA0CL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/YuCM0NL19, author = {Pu Yu and Jin Cao and Maode Ma and Hui Li and Ben Niu and Fenghua Li}, title = {Quantum-Resistance Authentication and Data Transmission Scheme for NB-IoT in 3GPP 5G Networks}, booktitle = {2019 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2019, Marrakesh, Morocco, April 15-18, 2019}, pages = {1--7}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/WCNC.2019.8885686}, doi = {10.1109/WCNC.2019.8885686}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/wcnc/YuCM0NL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/19/HuHCZUAP19, author = {Wangsu Hu and Ran He and Jin Cao and Lisa Zhang and H{\"{u}}seyin Uzunalioglu and Ahmet A. Akyama{\c{c}} and Chitra Phadke}, editor = {Albert Ali Salah and Alex Pentland and Bruno Lepri and Emmanuel Letouz{\'{e}}}, title = {Quantified Understanding of Syrian Refugee Integration in Turkey}, booktitle = {Guide to Mobile Data Analytics in Refugee Scenarios, The 'Data for Refugees Challenge' Study}, pages = {201--221}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-12554-7\_11}, doi = {10.1007/978-3-030-12554-7\_11}, timestamp = {Mon, 05 Feb 2024 20:35:55 +0100}, biburl = {https://dblp.org/rec/books/sp/19/HuHCZUAP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1909-05682, author = {H{\"{u}}seyin Uzunalioglu and Jin Cao and Chitra Phadke and Gerald Lehmann and Ahmet A. Akyama{\c{c}} and Ran He and Jeongran Lee and Maria Able}, title = {Augmented Data Science: Towards Industrialization and Democratization of Data Science}, journal = {CoRR}, volume = {abs/1909.05682}, year = {2019}, url = {http://arxiv.org/abs/1909.05682}, eprinttype = {arXiv}, eprint = {1909.05682}, timestamp = {Wed, 18 Sep 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1909-05682.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CaoMLFL18, author = {Jin Cao and Maode Ma and Hui Li and Yulong Fu and Xuefeng Liu}, title = {{EGHR:} Efficient group-based handover authentication protocols for mMTC in 5G wireless networks}, journal = {J. Netw. Comput. Appl.}, volume = {102}, pages = {1--16}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2017.11.009}, doi = {10.1016/J.JNCA.2017.11.009}, timestamp = {Fri, 28 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CaoMLFL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoLML18, author = {Jin Cao and Hui Li and Maode Ma and Fenghua Li}, title = {{UPPGHA:} Uniform Privacy Preservation Group Handover Authentication Mechanism for mMTC in {LTE-A} Networks}, journal = {Secur. Commun. Networks}, volume = {2018}, pages = {6854612:1--6854612:16}, year = {2018}, url = {https://doi.org/10.1155/2018/6854612}, doi = {10.1155/2018/6854612}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoLML18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiCNHGC18, author = {Fenghua Li and Yahong Chen and Ben Niu and Yuanyuan He and Kui Geng and Jin Cao}, title = {Achieving Personalized k-Anonymity against Long-Term Observation in Location-Based Services}, booktitle = {{IEEE} Global Communications Conference, {GLOBECOM} 2018, Abu Dhabi, United Arab Emirates, December 9-13, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/GLOCOM.2018.8647719}, doi = {10.1109/GLOCOM.2018.8647719}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiCNHGC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccda/HeYYC18, author = {Ran He and Sen Yang and Jingyuan Yang and Jin Cao}, title = {Automated Mining of Approximate Periodicity on Numeric Data: {A} Statistical Approach}, booktitle = {Proceedings of the 2nd International Conference on Compute and Data Analysis, {ICCDA} 2018, DeKalb, IL, USA, March 23-25, 2018}, pages = {20--27}, publisher = {{ACM}}, year = {2018}, url = {https://doi.org/10.1145/3193077.3194509}, doi = {10.1145/3193077.3194509}, timestamp = {Thu, 28 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccda/HeYYC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/YangCHZ18, author = {Jingyuan Yang and Jin Cao and Ran He and Lisa Zhang}, title = {A unified clustering approach for identifying functional zones in suburban and urban areas}, booktitle = {{IEEE} {INFOCOM} 2018 - {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2018, Honolulu, HI, USA, April 15-19, 2018}, pages = {94--99}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/INFCOMW.2018.8406847}, doi = {10.1109/INFCOMW.2018.8406847}, timestamp = {Thu, 28 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/YangCHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/FuYLXC17, author = {Yulong Fu and Zheng Yan and Hui Li and Xiao{-}Long Xin and Jin Cao}, title = {A secure {SDN} based multi-RANs architecture for future 5G networks}, journal = {Comput. Secur.}, volume = {70}, pages = {648--662}, year = {2017}, url = {https://doi.org/10.1016/j.cose.2017.08.013}, doi = {10.1016/J.COSE.2017.08.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/FuYLXC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mis/FuYCKC17, author = {Yulong Fu and Zheng Yan and Jin Cao and Ousmane Kon{\'{e}} and Xuefei Cao}, title = {An Automata Based Intrusion Detection Method for Internet of Things}, journal = {Mob. Inf. Syst.}, volume = {2017}, pages = {1750637:1--1750637:13}, year = {2017}, url = {https://doi.org/10.1155/2017/1750637}, doi = {10.1155/2017/1750637}, timestamp = {Thu, 01 Oct 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/mis/FuYCKC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/CaoML17, author = {Jin Cao and Maode Ma and Hui Li}, title = {{G2RHA:} Group-to-Route Handover Authentication Scheme for Mobile Relays in {LTE-A} High-Speed Rail Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {66}, number = {11}, pages = {9689--9701}, year = {2017}, url = {https://doi.org/10.1109/TVT.2017.2750219}, doi = {10.1109/TVT.2017.2750219}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/CaoML17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wpc/CaoMWL17, author = {Jin Cao and Maode Ma and Xilei Wang and Haochen Liu}, title = {A Selective Re-Query Case Sensitive Encoding Scheme Against {DNS} Cache Poisoning Attacks}, journal = {Wirel. Pers. Commun.}, volume = {94}, number = {3}, pages = {1263--1279}, year = {2017}, url = {https://doi.org/10.1007/s11277-016-3681-2}, doi = {10.1007/S11277-016-3681-2}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wpc/CaoMWL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoMLFNL17, author = {Jin Cao and Maode Ma and Hui Li and Yulong Fu and Ben Niu and Fenghua Li}, title = {Trajectory prediction-based handover authentication mechanism for mobile relays in {LTE-A} high-speed rail networks}, booktitle = {{IEEE} International Conference on Communications, {ICC} 2017, Paris, France, May 21-25, 2017}, pages = {1--6}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/ICC.2017.7997254}, doi = {10.1109/ICC.2017.7997254}, timestamp = {Thu, 15 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icc/CaoMLFNL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoCKKZ17, author = {Jin Cao and Sining Chen and W. Sean Kennedy and Nicolas Kim and Lisa Zhang}, title = {Extracting mobile user behavioral similarity via cell-level location trace}, booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Atlanta, GA, USA, May 1-4, 2017}, pages = {378--383}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFCOMW.2017.8116406}, doi = {10.1109/INFCOMW.2017.8116406}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoCKKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoDH17, author = {Jin Cao and Lawrence M. Drabeck and Ran He}, title = {Statistical network behavior based threat detection}, booktitle = {2017 {IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops, Atlanta, GA, USA, May 1-4, 2017}, pages = {420--425}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/INFCOMW.2017.8116413}, doi = {10.1109/INFCOMW.2017.8116413}, timestamp = {Thu, 30 Nov 2017 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/CaoDH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/rcar/CaoWCWW17, author = {Jin Cao and Hesheng Wang and Weidong Chen and Jingchuan Wang and Ruimin Wu}, title = {Uncalibrated peg-hole alignment using visual servoing}, booktitle = {2017 {IEEE} International Conference on Real-time Computing and Robotics, {RCAR} 2017, Okinawa, Japan, July 14-18, 2017}, pages = {549--554}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/RCAR.2017.8311920}, doi = {10.1109/RCAR.2017.8311920}, timestamp = {Thu, 06 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/rcar/CaoWCWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1712-04034, author = {Maryam Fazel{-}Zarandi and Shang{-}Wen Li and Jin Cao and Jared Casale and Peter Henderson and David Whitney and Alborz Geramifard}, title = {Learning Robust Dialog Policies in Noisy Environments}, journal = {CoRR}, volume = {abs/1712.04034}, year = {2017}, url = {http://arxiv.org/abs/1712.04034}, eprinttype = {arXiv}, eprint = {1712.04034}, timestamp = {Wed, 18 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1712-04034.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ZhangAC16, author = {Lisa Zhang and Matthew Andrews and Jin Cao}, title = {Computing road signatures from cell sequences with minimum inconsistencies}, booktitle = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {227--232}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFCOMW.2016.7562077}, doi = {10.1109/INFCOMW.2016.7562077}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ZhangAC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoZRS16, author = {Jin Cao and Hao Zhong and Buvaneswari Ramanan and Peter Schott}, title = {Online activities categorization of mobile users}, booktitle = {{IEEE} Conference on Computer Communications Workshops, {INFOCOM} Workshops 2016, San Francisco, CA, USA, April 10-14, 2016}, pages = {473--478}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/INFCOMW.2016.7562123}, doi = {10.1109/INFCOMW.2016.7562123}, timestamp = {Tue, 18 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoZRS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/LaiLLC15, author = {Chengzhe Lai and Hui Li and Xiaoqing Li and Jin Cao}, title = {A novel group access authentication and key agreement protocol for machine-type communication}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {26}, number = {3}, pages = {414--431}, year = {2015}, url = {https://doi.org/10.1002/ett.2635}, doi = {10.1002/ETT.2635}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/LaiLLC15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jbi/CaoZWLY15, author = {Jin Cao and Li Zhang and Bangjun Wang and Fanzhang Li and Jiwen Yang}, title = {A fast gene selection method for multi-cancer classification using multiple support vector data description}, journal = {J. Biomed. Informatics}, volume = {53}, pages = {381--389}, year = {2015}, url = {https://doi.org/10.1016/j.jbi.2014.12.009}, doi = {10.1016/J.JBI.2014.12.009}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jbi/CaoZWLY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/CaoML15, author = {Jin Cao and Maode Ma and Hui Li}, title = {{GBAAM:} group-based access authentication for {MTC} in {LTE} networks}, journal = {Secur. Commun. Networks}, volume = {8}, number = {17}, pages = {3282--3299}, year = {2015}, url = {https://doi.org/10.1002/sec.1252}, doi = {10.1002/SEC.1252}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/CaoML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoLM15, author = {Jin Cao and Hui Li and Maode Ma}, title = {{GAHAP:} {A} group-based anonymity handover authentication protocol for {MTC} in {LTE-A} networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {3020--3025}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7248787}, doi = {10.1109/ICC.2015.7248787}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/icc/CaoLM15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/CaoLML15, author = {Jin Cao and Hui Li and Maode Ma and Fenghua Li}, title = {{UGHA:} Uniform group-based handover authentication for {MTC} within {E-UTRAN} in {LTE-A} networks}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7246--7251}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249483}, doi = {10.1109/ICC.2015.7249483}, timestamp = {Thu, 25 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/CaoLML15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/ChenHVCS14, author = {Sining Chen and Tin Kam Ho and Avinash Vyas and Jin Cao and Jeffrey Spiess}, title = {A Multi-Layer Dynamic Model for Customer Experience Analytics}, journal = {Bell Labs Tech. J.}, volume = {18}, number = {4}, pages = {19--32}, year = {2014}, url = {https://doi.org/10.1002/bltj.21643}, doi = {10.1002/BLTJ.21643}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/ChenHVCS14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/FriedmanBC14, author = {Brian D. Friedman and Michael J. Burns and Jin Cao}, title = {Enterprise Social Networking Data Analytics Within Alcatel-Lucent}, journal = {Bell Labs Tech. J.}, volume = {18}, number = {4}, pages = {89--109}, year = {2014}, url = {https://doi.org/10.1002/bltj.21648}, doi = {10.1002/BLTJ.21648}, timestamp = {Thu, 27 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bell/FriedmanBC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/CaoMLZL14, author = {Jin Cao and Maode Ma and Hui Li and Yueyu Zhang and Zhenxing Luo}, title = {A Survey on Security Aspects for {LTE} and {LTE-A} Networks}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {1}, pages = {283--302}, year = {2014}, url = {https://doi.org/10.1109/SURV.2013.041513.00174}, doi = {10.1109/SURV.2013.041513.00174}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/CaoMLZL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejasp/XiongCL14, author = {Wenhui Xiong and Jin Cao and Shaoqian Li}, title = {Sparse signal recovery with unknown signal sparsity}, journal = {{EURASIP} J. Adv. Signal Process.}, volume = {2014}, pages = {178}, year = {2014}, url = {https://doi.org/10.1186/1687-6180-2014-178}, doi = {10.1186/1687-6180-2014-178}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ejasp/XiongCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijguc/ZhangCLCL14, author = {Yueyu Zhang and Jie Chen and Hui Li and Jin Cao and Chengzhe Lai}, title = {Group-based authentication and key agreement for machine-type communication}, journal = {Int. J. Grid Util. Comput.}, volume = {5}, number = {2}, pages = {87--95}, year = {2014}, url = {https://doi.org/10.1504/IJGUC.2014.060189}, doi = {10.1504/IJGUC.2014.060189}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijguc/ZhangCLCL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/smartcr/CaoM014, author = {Jin Cao and Maode Ma and Hui Li}, title = {Access Authentication of Mass Device Connections for {MTC} in {LTE} Networks}, journal = {Smart Comput. Rev.}, volume = {4}, number = {4}, pages = {262--277}, year = {2014}, url = {https://doi.org/10.6029/smartcr.2014.04.003}, doi = {10.6029/SMARTCR.2014.04.003}, timestamp = {Fri, 23 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/smartcr/CaoM014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifip12/ZhaoQL0CYYL14, author = {Mingming Zhao and Jian Qin and Shao{-}Ming Li and Zhe Liu and Jin Cao and Xiaochuang Yao and Sijing Ye and Lin Li}, editor = {Daoliang Li and Yingyi Chen}, title = {An Automatic Counting Method of Maize Ear Grain Based on Image Processing}, booktitle = {Computer and Computing Technologies in Agriculture {VIII} - 8th {IFIP} {WG} 5.14 International Conference, {CCTA} 2014, Beijing, China, September 16-19, 2014, Revised Selected Papers}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {452}, pages = {521--533}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-19620-6\_59}, doi = {10.1007/978-3-319-19620-6\_59}, timestamp = {Thu, 27 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifip12/ZhaoQL0CYYL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZLC13, author = {Xiaowei Li and Yuqing Zhang and Xuefeng Liu and Jin Cao}, title = {A Lightweight Three-Party Privacy-preserving Authentication Key Exchange Protocol Using Smart Card}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {5}, pages = {1313--1327}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.05.021}, doi = {10.3837/TIIS.2013.05.021}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiZLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LiZLCZ13, author = {Xiaowei Li and Yuqing Zhang and Xuefeng Liu and Jin Cao and Qianqian Zhao}, title = {A New Roaming Authentication Framework For Wireless Communication}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {7}, number = {8}, pages = {2061--2080}, year = {2013}, url = {https://doi.org/10.3837/tiis.2013.08.018}, doi = {10.3837/TIIS.2013.08.018}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LiZLCZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/case/WangJLC13, author = {Kangzhou Wang and Zhibin Jiang and Guowei Li and Jin Cao}, title = {Integrated capacity allocation policies for a production service system with two-class customers and items}, booktitle = {2013 {IEEE} International Conference on Automation Science and Engineering, {CASE} 2013, Madison, WI, USA, August 17-20, 2013}, pages = {83--88}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/CoASE.2013.6653943}, doi = {10.1109/COASE.2013.6653943}, timestamp = {Wed, 16 Oct 2019 14:14:53 +0200}, biburl = {https://dblp.org/rec/conf/case/WangJLC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoGLF13, author = {Jin Cao and Hongyu Gao and Li Erran Li and Brian D. Friedman}, title = {Enterprise social network analysis and modeling: {A} tale of two graphs}, booktitle = {Proceedings of the {IEEE} {INFOCOM} 2013, Turin, Italy, April 14-19, 2013}, pages = {2382--2390}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/INFCOM.2013.6567043}, doi = {10.1109/INFCOM.2013.6567043}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoGLF13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/CaoLMZL12, author = {Jin Cao and Hui Li and Maode Ma and Yueyu Zhang and Chengzhe Lai}, title = {A simple and robust handover authentication between HeNB and eNB in {LTE} networks}, journal = {Comput. Networks}, volume = {56}, number = {8}, pages = {2119--2131}, year = {2012}, url = {https://doi.org/10.1016/j.comnet.2012.02.012}, doi = {10.1016/J.COMNET.2012.02.012}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/CaoLMZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/WangLC12, author = {Boyang Wang and Hui Li and Jin Cao}, title = {An efficient {MAC} scheme for secure network coding with probabilistic detection}, journal = {Frontiers Comput. Sci.}, volume = {6}, number = {4}, pages = {429--441}, year = {2012}, url = {https://doi.org/10.1007/s11704-012-1068-4}, doi = {10.1007/S11704-012-1068-4}, timestamp = {Mon, 19 Feb 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fcsc/WangLC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/LaiLZC12, author = {Chengzhe Lai and Hui Li and Yueyu Zhang and Jin Cao}, title = {Security Issues on Machine to Machine Communications}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {6}, number = {2}, pages = {198--514}, year = {2012}, url = {https://doi.org/10.3837/tiis.2012.02.003}, doi = {10.3837/TIIS.2012.02.003}, timestamp = {Tue, 16 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/itiis/LaiLZC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/CaoML12, author = {Jin Cao and Maode Ma and Hui Li}, title = {An Uniform Handover Authentication between {E-UTRAN} and Non-3GPP Access Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {11}, number = {10}, pages = {3644--3650}, year = {2012}, url = {https://doi.org/10.1109/TWC.2012.081612.112070}, doi = {10.1109/TWC.2012.081612.112070}, timestamp = {Sun, 06 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/CaoML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/apscc/JiangCLZ12, author = {Li Jiang and Jin Cao and Peifeng Li and Qiaoming Zhu}, title = {A Mixed Multi-tenancy Data Model and Its Migration Approach for the SaaS Application}, booktitle = {2012 {IEEE} Asia-Pacific Services Computing Conference, {APSCC} 2012, Guilin, China, December 6-8, 2012}, pages = {295--300}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/APSCC.2012.16}, doi = {10.1109/APSCC.2012.16}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/apscc/JiangCLZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CaoML12, author = {Jin Cao and Maode Ma and Hui Li}, title = {A group-based authentication and key agreement for {MTC} in {LTE} networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {1017--1022}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503246}, doi = {10.1109/GLOCOM.2012.6503246}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CaoML12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/LiZLCZ12, author = {Xiaowei Li and Yuqing Zhang and Xuefeng Liu and Jin Cao and Qianqian Zhao}, title = {A lightweight roaming authentication protocol for anonymous wireless communication}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {1029--1034}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503248}, doi = {10.1109/GLOCOM.2012.6503248}, timestamp = {Fri, 03 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/LiZLCZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CaoML12a, author = {Jin Cao and Maode Ma and Hui Li}, title = {Unified handover authentication between heterogeneous access systems in {LTE} networks}, booktitle = {2012 {IEEE} Global Communications Conference, {GLOBECOM} 2012, Anaheim, CA, USA, December 3-7, 2012}, pages = {5308--5313}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/GLOCOM.2012.6503964}, doi = {10.1109/GLOCOM.2012.6503964}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CaoML12a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/incos/ZhangCLZCL12, author = {Yueyu Zhang and Jie Chen and Hui Li and Wujun Zhang and Jin Cao and Chengzhe Lai}, editor = {Fatos Xhafa and Leonard Barolli and Florin Pop and Xiaofeng Chen and Valentin Cristea}, title = {Dynamic Group Based Authentication Protocol for Machine Type Communications}, booktitle = {2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, INCoS 2012, Bucharest, Romania, September 19-21, 2012}, pages = {334--341}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/iNCoS.2012.86}, doi = {10.1109/INCOS.2012.86}, timestamp = {Wed, 09 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/incos/ZhangCLZCL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dsn/CaoCL11, author = {Jin Cao and Aiyou Chen and Patrick P. C. Lee}, title = {Modeling time correlation in passive network loss tomography}, booktitle = {Proceedings of the 2011 {IEEE/IFIP} International Conference on Dependable Systems and Networks, {DSN} 2011, Hong Kong, China, June 27-30 2011}, pages = {550--561}, publisher = {{IEEE} Compute Society}, year = {2011}, url = {https://doi.org/10.1109/DSN.2011.5958267}, doi = {10.1109/DSN.2011.5958267}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dsn/CaoCL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1107-1697, author = {Aiyou Chen and Jin Cao and Larry Shepp and Tuan Nguyen}, title = {Distinct counting with a self-learning bitmap}, journal = {CoRR}, volume = {abs/1107.1697}, year = {2011}, url = {http://arxiv.org/abs/1107.1697}, eprinttype = {arXiv}, eprint = {1107.1697}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1107-1697.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/BuCCL10, author = {Tian Bu and Jin Cao and Aiyou Chen and Patrick P. C. Lee}, title = {Sequential hashing: {A} flexible approach for unveiling significant patterns in high speed networks}, journal = {Comput. Networks}, volume = {54}, number = {18}, pages = {3309--3326}, year = {2010}, url = {https://doi.org/10.1016/j.comnet.2010.06.018}, doi = {10.1016/J.COMNET.2010.06.018}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/BuCCL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsp/ChenCB10, author = {Aiyou Chen and Jin Cao and Tian Bu}, title = {Network Tomography: Identifiability and Fourier Domain Estimation}, journal = {{IEEE} Trans. Signal Process.}, volume = {58}, number = {12}, pages = {6029--6039}, year = {2010}, url = {https://doi.org/10.1109/TSP.2010.2068294}, doi = {10.1109/TSP.2010.2068294}, timestamp = {Tue, 10 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsp/ChenCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icnp/JiangCJLZ10, author = {Nan Jiang and Jin Cao and Yu Jin and Li Erran Li and Zhi{-}Li Zhang}, title = {Identifying suspicious activities through {DNS} failure graph analysis}, booktitle = {Proceedings of the 18th annual {IEEE} International Conference on Network Protocols, {ICNP} 2010, Kyoto, Japan, 5-8 October, 2010}, pages = {144--153}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICNP.2010.5762763}, doi = {10.1109/ICNP.2010.5762763}, timestamp = {Wed, 27 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icnp/JiangCJLZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenJC10, author = {Aiyou Chen and Yu Jin and Jin Cao}, title = {Tracking Long Duration Flows in Network Traffic}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {206--210}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462244}, doi = {10.1109/INFCOM.2010.5462244}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenJC10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoLCB10, author = {Jin Cao and Li Erran Li and Aiyou Chen and Tian Bu}, title = {Tracking Quantiles of Network Data Streams with Dynamic Operations}, booktitle = {{INFOCOM} 2010. 29th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 15-19 March 2010, San Diego, CA, {USA}}, pages = {211--215}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/INFCOM.2010.5462241}, doi = {10.1109/INFCOM.2010.5462241}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoLCB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icde/ChenC09, author = {Aiyou Chen and Jin Cao}, editor = {Yannis E. Ioannidis and Dik Lun Lee and Raymond T. Ng}, title = {Distinct Counting with a Self-Learning Bitmap}, booktitle = {Proceedings of the 25th International Conference on Data Engineering, {ICDE} 2009, March 29 2009 - April 2 2009, Shanghai, China}, pages = {1171--1174}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICDE.2009.193}, doi = {10.1109/ICDE.2009.193}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icde/ChenC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenLC09, author = {Aiyou Chen and Li Erran Li and Jin Cao}, title = {Tracking Cardinality Distributions in Network Traffic}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {819--827}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5061991}, doi = {10.1109/INFCOM.2009.5061991}, timestamp = {Fri, 29 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenLC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoCBB09, author = {Jin Cao and Aiyou Chen and Tian Bu and Arumugam Buvaneswari}, title = {Monitoring Time-Varying Network Streams Using State-Space Models}, booktitle = {{INFOCOM} 2009. 28th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 19-25 April 2009, Rio de Janeiro, Brazil}, pages = {2721--2725}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/INFCOM.2009.5062219}, doi = {10.1109/INFCOM.2009.5062219}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoCBB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bell/BilaCDHKLS08, author = {Nilton Bila and Jin Cao and Robert Dinoff and Tin Kam Ho and Bharat Kumar and Daniel F. Lieuwen and Paulo Santos}, title = {Intuitive network applications: Learning user context and behavior}, journal = {Bell Labs Tech. J.}, volume = {13}, number = {2}, pages = {31--47}, year = {2008}, url = {https://doi.org/10.1002/bltj.20301}, doi = {10.1002/BLTJ.20301}, timestamp = {Mon, 06 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/bell/BilaCDHKLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/GuoWCL08, author = {Lei Guo and Xingwei Wang and Jin Cao and Lemin Li}, title = {Traffic recovery time constrained shared sub-path protection algorithm in survivable {WDM} networks}, journal = {Comput. Networks}, volume = {52}, number = {7}, pages = {1492--1505}, year = {2008}, url = {https://doi.org/10.1016/j.comnet.2008.01.014}, doi = {10.1016/J.COMNET.2008.01.014}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/GuoWCL08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/CaoCWZ08, author = {Jin Cao and Aiyou Chen and Indra Widjaja and Nengfeng Zhou}, title = {Online Identification of Applications Using Statistical Behavior Analysis}, booktitle = {Proceedings of the Global Communications Conference, 2008. {GLOBECOM} 2008, New Orleans, LA, USA, 30 November - 4 December 2008}, pages = {1468--1473}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/GLOCOM.2008.ECP.287}, doi = {10.1109/GLOCOM.2008.ECP.287}, timestamp = {Tue, 23 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/CaoCWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icns/GuoWCLYY08, author = {Lei Guo and Xingwei Wang and Jin Cao and Lemin Li and Ting Yang and Fei Yang}, editor = {Jun Bi and Kim Chin and Cosmin Dini and Leo Lehmann and David C. Pheanis}, title = {Shared Sub-Path Protection Algorithm with Recovery Time Constraint in {WDM} Networks}, booktitle = {Fourth International Conference on Networking and Services, {ICNS} 2008, 16-21 March 2008, Gosier, Guadeloupe}, pages = {153--158}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICNS.2008.12}, doi = {10.1109/ICNS.2008.12}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icns/GuoWCLYY08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoCB08, author = {Jin Cao and Aiyou Chen and Tian Bu}, title = {A Quasi-Likelihood Approach for Accurate Traffic Matrix Estimation in a High Speed Network}, booktitle = {{INFOCOM} 2008. 27th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 13-18 April 2008, Phoenix, AZ, {USA}}, pages = {21--25}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/INFOCOM.2008.13}, doi = {10.1109/INFOCOM.2008.13}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoCB08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mdm/BilaCDHHKS08, author = {Nilton Bila and Jin Cao and Robert Dinoff and Tin Kam Ho and Richard Hull and Bharat Kumar and Paulo Santos}, editor = {Xiaofeng Meng and Hui Lei and St{\'{e}}phane Grumbach and Hong Va Leong}, title = {Mobile User Profile Acquisition through Network Observables and Explicit User Queries}, booktitle = {9th International Conference on Mobile Data Management {(MDM} 2008), Beijing, China, April 27-30, 2008}, pages = {98--107}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/MDM.2008.34}, doi = {10.1109/MDM.2008.34}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mdm/BilaCDHHKS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/ChenLC08, author = {Aiyou Chen and Li Li and Jin Cao}, editor = {Zhen Liu and Vishal Misra and Prashant J. Shenoy}, title = {Estimating cardinality distributions in network traffic: extended abstract}, booktitle = {Proceedings of the 2008 {ACM} {SIGMETRICS} International Conference on Measurement and Modeling of Computer Systems, {SIGMETRICS} 2008, Annapolis, MD, USA, June 2-6, 2008}, pages = {459--460}, publisher = {{ACM}}, year = {2008}, url = {https://doi.org/10.1145/1375457.1375520}, doi = {10.1145/1375457.1375520}, timestamp = {Fri, 30 Jul 2021 16:13:32 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/ChenLC08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/KhanXCBZJZ07, author = {M. A. Khan and Wei Xu and Jin Cao and Yu Bai and W. Q. Zhu and X. Y. Jiang and Zh. L. Zhang}, title = {Spectral studies of white organic light-emitting devices based on multi-emitting layers}, journal = {Displays}, volume = {28}, number = {1}, pages = {26--30}, year = {2007}, url = {https://doi.org/10.1016/j.displa.2006.11.003}, doi = {10.1016/J.DISPLA.2006.11.003}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/KhanXCBZJZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/displays/WeiZCKZJZ07, author = {Fuxiang Wei and Xiaobo Zhang and Jin Cao and M. A. Khan and Wenqing Zhu and Xueyin Jiang and Zhilin Zhang}, title = {Highly efficient styrylamine-doped blue and white organic electroluminescent devices}, journal = {Displays}, volume = {28}, number = {4-5}, pages = {186--190}, year = {2007}, url = {https://doi.org/10.1016/j.displa.2007.07.006}, doi = {10.1016/J.DISPLA.2007.07.006}, timestamp = {Wed, 17 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/displays/WeiZCKZJZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/GuoLYC07, author = {Lei Guo and Lemin Li and Hongfang Yu and Jin Cao}, title = {Optical Communications New and enhanced protection scheme in survivable meshed {WDM} optical networks}, journal = {Eur. Trans. Telecommun.}, volume = {18}, number = {2}, pages = {163--168}, year = {2007}, url = {https://doi.org/10.1002/ett.1115}, doi = {10.1002/ETT.1115}, timestamp = {Mon, 18 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ett/GuoLYC07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuoCYL07, author = {Lei Guo and Jin Cao and Hongfang Yu and Lemin Li}, title = {A new shared-risk link groups (SRLG)-disjoint path provisioning with shared protection in {WDM} optical networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {650--661}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.005}, doi = {10.1016/J.JNCA.2005.12.005}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuoCYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/CaoGYL07, author = {Jin Cao and Lei Guo and Hongfang Yu and Lemin Li}, title = {A novel recursive shared segment protection algorithm in survivable {WDM} networks}, journal = {J. Netw. Comput. Appl.}, volume = {30}, number = {2}, pages = {677--694}, year = {2007}, url = {https://doi.org/10.1016/j.jnca.2005.12.003}, doi = {10.1016/J.JNCA.2005.12.003}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/CaoGYL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/ChenCB07, author = {Aiyou Chen and Jin Cao and Tian Bu}, title = {Network Tomography: Identifiability and Fourier Domain Estimation}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1875--1883}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.218}, doi = {10.1109/INFCOM.2007.218}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/ChenCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/BuCCL07, author = {Tian Bu and Jin Cao and Aiyou Chen and Patrick P. C. Lee}, title = {A Fast and Compact Method for Unveiling Significant Patterns in High Speed Networks}, booktitle = {{INFOCOM} 2007. 26th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 6-12 May 2007, Anchorage, Alaska, {USA}}, pages = {1893--1901}, publisher = {{IEEE}}, year = {2007}, url = {https://doi.org/10.1109/INFCOM.2007.220}, doi = {10.1109/INFCOM.2007.220}, timestamp = {Tue, 16 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infocom/BuCCL07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vldb/ChenCB07, author = {Aiyou Chen and Jin Cao and Tian Bu}, editor = {Christoph Koch and Johannes Gehrke and Minos N. Garofalakis and Divesh Srivastava and Karl Aberer and Anand Deshpande and Daniela Florescu and Chee Yong Chan and Venkatesh Ganti and Carl{-}Christian Kanne and Wolfgang Klas and Erich J. Neuhold}, title = {A Simple and Efficient Estimation Method for Stream Expression Cardinalities}, booktitle = {Proceedings of the 33rd International Conference on Very Large Data Bases, University of Vienna, Austria, September 23-27, 2007}, pages = {171--182}, publisher = {{ACM}}, year = {2007}, url = {http://www.vldb.org/conf/2007/papers/research/p171-chen.pdf}, timestamp = {Thu, 12 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/vldb/ChenCB07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/GuoLYC06, author = {Lei Guo and Lemin Li and Hongfang Yu and Jin Cao}, title = {Dynamic survivable routing heuristic for shared protected {WDM} optical networks}, journal = {{IEEE} Commun. Lett.}, volume = {10}, number = {9}, pages = {676--678}, year = {2006}, url = {https://doi.org/10.1109/LCOMM.2006.1714542}, doi = {10.1109/LCOMM.2006.1714542}, timestamp = {Thu, 20 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/GuoLYC06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/mj/WeiZCKZJZ06, author = {Fuxiang Wei and Xiaobo Zhang and Jin Cao and M. A. Khan and Wenqing Zhu and Xueyin Jiang and Zhilin Zhang}, title = {Enhancement of red organic light-emitting diodes via cascade energy transfer}, journal = {Microelectron. J.}, volume = {37}, number = {11}, pages = {1325--1328}, year = {2006}, url = {https://doi.org/10.1016/j.mejo.2006.07.012}, doi = {10.1016/J.MEJO.2006.07.012}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/mj/WeiZCKZJZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcn/GuoLCYW06, author = {Lei Guo and Lemin Li and Jin Cao and Hongfang Yu and Xuetao Wei}, editor = {Soma Chaudhuri and Samir R. Das and Himadri S. Paul and Srikanta Tirthapura}, title = {Dynamic Path Shared Protection for Survivable Differentiated Reliable {WDM} Optical Networks}, booktitle = {Distributed Computing and Networking, 8th International Conference, {ICDCN} 2006, Guwahati, India, December 27-30, 2006}, series = {Lecture Notes in Computer Science}, volume = {4308}, pages = {479--490}, publisher = {Springer}, year = {2006}, url = {https://doi.org/10.1007/11947950\_52}, doi = {10.1007/11947950\_52}, timestamp = {Tue, 14 May 2019 10:00:42 +0200}, biburl = {https://dblp.org/rec/conf/icdcn/GuoLCYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/AndrewsCM06, author = {Matthew Andrews and Jin Cao and Jim McGowan}, title = {Measuring Human Satisfaction in Data Networks}, booktitle = {{INFOCOM} 2006. 25th {IEEE} International Conference on Computer Communications, Joint Conference of the {IEEE} Computer and Communications Societies, 23-29 April 2006, Barcelona, Catalunya, Spain}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/INFOCOM.2006.310}, doi = {10.1109/INFOCOM.2006.310}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/AndrewsCM06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/msv/XingCY06, author = {Song Xing and Jin Cao and Yonggao Yang}, editor = {Hamid R. Arabnia}, title = {Nonlinear 3-D Motion Simulation Using Multi-Sensor Data Fusion}, booktitle = {Proceedings of the 2006 International Conference on Modeling, Simulation {\&} Visualization Methods, {MSV} 2006, Las Vegas, Nevada, USA, June 26-29, 2006}, pages = {56--62}, publisher = {{CSREA} Press}, year = {2006}, timestamp = {Tue, 02 Jan 2007 14:01:12 +0100}, biburl = {https://dblp.org/rec/conf/msv/XingCY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/CaoG04, author = {Jin Cao and Janos Gertler}, title = {Partial PCA-based optimal structured residual design for fault isolation}, booktitle = {Proceedings of the 2004 American Control Conference, {ACC} 2004, Boston, MA, USA, June 30 - July 2, 2004}, pages = {4420--4425}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.23919/ACC.2004.1384005}, doi = {10.23919/ACC.2004.1384005}, timestamp = {Thu, 24 Nov 2022 09:21:27 +0100}, biburl = {https://dblp.org/rec/conf/amcc/CaoG04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/CaoG04a, author = {Jin Cao and Janos Gertler}, title = {Fault diagnosis in a class of nonlinear systems using identification and {GLR} testing}, booktitle = {Proceedings of the 2004 American Control Conference, {ACC} 2004, Boston, MA, USA, June 30 - July 2, 2004}, pages = {5052--5057}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.23919/ACC.2004.1384651}, doi = {10.23919/ACC.2004.1384651}, timestamp = {Thu, 24 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/amcc/CaoG04a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/CaoCGJSW04, author = {Jin Cao and William S. Cleveland and Yuan Gao and Kevin Jeffay and F. Donelson Smith and Michele C. Weigle}, title = {Stochastic Models for Generating Synthetic {HTTP} Source Traffic}, booktitle = {Proceedings {IEEE} {INFOCOM} 2004, The 23rd Annual Joint Conference of the {IEEE} Computer and Communications Societies, Hong Kong, China, March 7-11, 2004}, pages = {1546--1557}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/INFCOM.2004.1354568}, doi = {10.1109/INFCOM.2004.1354568}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/infocom/CaoCGJSW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/CaoG02, author = {Jin Cao and Janos Gertler}, title = {The effect of insufficient excitation in {PCA} estimation}, booktitle = {American Control Conference, {ACC} 2002, Anchorage, Alaska, USA, May 8-10 2002}, pages = {2707--2712}, publisher = {{IEEE}}, year = {2002}, url = {https://doi.org/10.1109/ACC.2002.1025196}, doi = {10.1109/ACC.2002.1025196}, timestamp = {Wed, 27 Jul 2022 14:28:37 +0200}, biburl = {https://dblp.org/rec/conf/amcc/CaoG02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infocom/RamananC02, author = {Kavita Ramanan and Jin Cao}, title = {A Poisson Limit for Buffer Overflow Probabilities}, booktitle = {Proceedings {IEEE} {INFOCOM} 2002, The 21st Annual Joint Conference of the {IEEE} Computer and Communications Societies, New York, USA, June 23-27, 2002}, pages = {994--1003}, publisher = {{IEEE} Computer Society}, year = {2002}, url = {https://doi.org/10.1109/INFCOM.2002.1019347}, doi = {10.1109/INFCOM.2002.1019347}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/infocom/RamananC02.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/amcc/CaoG01, author = {Jin Cao and Janos Gertler}, title = {Noise-induced bias in {PCA} modeling of linear system}, booktitle = {American Control Conference, {ACC} 2001, Arlington, VA, USA, 25-27 June, 2001}, pages = {3660--3665}, publisher = {{IEEE}}, year = {2001}, url = {https://doi.org/10.1109/ACC.2001.946203}, doi = {10.1109/ACC.2001.946203}, timestamp = {Wed, 05 Jan 2022 10:14:49 +0100}, biburl = {https://dblp.org/rec/conf/amcc/CaoG01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigmetrics/CaoCLS01, author = {Jin Cao and William S. Cleveland and Dong Lin and Don X. Sun}, editor = {Mary K. Vernon}, title = {On the nonstationarity of Internet traffic}, booktitle = {Proceedings of the Joint International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS/Performance 2001, June 16-20, 2001, Cambridge, MA, {USA}}, pages = {102--112}, publisher = {{ACM}}, year = {2001}, url = {https://doi.org/10.1145/378420.378440}, doi = {10.1145/378420.378440}, timestamp = {Fri, 30 Jul 2021 16:13:33 +0200}, biburl = {https://dblp.org/rec/conf/sigmetrics/CaoCLS01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.