Trust mechanisms for cloud computing J Huang, DM Nicol Journal of Cloud Computing: Advances, Systems and Applications 2, 1-14, 2013 | 366 | 2013 |
An ontology of trust: formal semantics and transitivity J Huang, MS Fox Proceedings of the 8th international conference on Electronic commerce: The …, 2006 | 184 | 2006 |
A calculus of trust and its application to PKI and identity management J Huang, D Nicol Proceedings of the 8th Symposium on Identity and Trust on the Internet, 23-37, 2009 | 126 | 2009 |
A framework integrating attribute-based policies into role-based access control J Huang, DM Nicol, R Bobba, JH Huh Proceedings of the 17th ACM symposium on Access Control Models and …, 2012 | 109 | 2012 |
A formal-semantics-based calculus of trust J Huang, D Nicol IEEE Internet Computing 14 (5), 38-46, 2010 | 93 | 2010 |
Knowledge provenance in enterprise information MS Fox*, J Huang International Journal of Production Research 43 (20), 4471-4492, 2005 | 47 | 2005 |
Knowledge discovery from big data for intrusion detection using LDA J Huang, Z Kalbarczyk, DM Nicol 2014 IEEE International Congress on Big Data, 760-761, 2014 | 42 | 2014 |
Towards digital engineering: the advent of digital systems engineering J Huang, A Gheorghe, H Handley, P Pazos, A Pinto, S Kovacic, A Collins, ... International Journal of System of Systems Engineering 10 (3), 234-261, 2020 | 41 | 2020 |
Uncertainty in knowledge provenance J Huang, MS Fox European Semantic Web Symposium, 372-387, 2004 | 40 | 2004 |
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge MS Fox, J Huang University of Toronto, 2003 | 36 | 2003 |
Towards trustworthy smart cyber-physical-social systems in the era of internet of things J Huang, MD Seck, A Gheorghe 2016 11th System of Systems Engineering Conference (SoSE), 1-6, 2016 | 34 | 2016 |
Knowledge provenance: An approach to modeling and maintaining the evolution and validity of knowledge J Huang University of Toronto, 2008 | 31 | 2008 |
Next-generation access control for distributed control systems JH Huh, RB Bobba, T Markham, DM Nicol, J Hull, A Chernoguzov, ... IEEE Internet Computing 20 (5), 28-37, 2016 | 30 | 2016 |
Cluster resource scheduling in cloud computing: literature review and research challenges W Khallouli, J Huang The Journal of supercomputing 78 (5), 6898-6943, 2022 | 29 | 2022 |
Reinforcement learning for automatic quadrilateral mesh generation: A soft actor–critic approach J Pan, J Huang, G Cheng, Y Zeng Neural Networks 157, 288-304, 2023 | 26 | 2023 |
Denial-of-service threat to Hadoop/YARN clusters with multi-tenancy J Huang, DM Nicol, RH Campbell 2014 IEEE International Congress on Big Data, 48-55, 2014 | 26 | 2014 |
Machine learning in requirements elicitation: A literature review C Cheligeer, J Huang, G Wu, N Bhuiyan, Y Xu, Y Zeng AI EDAM 36, e32, 2022 | 22 | 2022 |
Trust judgment in knowledge provenance J Huang, MS Fox 16th International Workshop on Database and Expert Systems Applications …, 2005 | 22 | 2005 |
Dynamic knowledge provenance J Huang, MS Fox Proceedings of business agents and semantic web workshop, 11-20, 2004 | 22 | 2004 |
From Big Data to Knowledge: Issues of Provenance, Trust, and Scientific Computing Integrity J Huang 2018 IEEE International Conference on Big Data, 2018 | 19 | 2018 |