Adapting an agile manufacturing concept to the reference architecture model industry 4.0: A survey and case study

M Yli-Ojanperä, S Sierla, N Papakonstantinou… - Journal of industrial …, 2019 - Elsevier
Industry 4.0 architecture has been studied in a large number of publications in the fields of
Industrial Internet of Things, Cyber Physical Production Systems, Enterprise Architectures …

Gpt, ontology, and caabac: A tripartite personalized access control model anchored by compliance, context and attribute

R Nowrozy, K Ahmed, H Wang - PloS one, 2025 - journals.plos.org
As digital healthcare evolves, the security of electronic health records (EHR) becomes
increasingly crucial. This study presents the GPT-Onto-CAABAC framework, integrating …

Graph intelligence enhanced bi-channel insider threat detection

W Hong, J Yin, M You, H Wang, J Cao, J Li… - … Conference on Network …, 2022 - Springer
For an organization, insider intrusion generally poses far more detrimental threats than
outsider intrusion. Traditionally, insider threat is detected by analyzing logged user …

A flexible payment scheme and its role-based access control

H Wang, J Cao, Y Zhang - IEEE Transactions on knowledge …, 2005 - ieeexplore.ieee.org
This work proposes a practical payment protocol with scalable anonymity for Internet
purchases, and analyzes its role-based access control (RBAC). The protocol uses electronic …

Insider Threat Detection: A Review

P Manoharan, J Yin, H Wang… - … on Networking and …, 2024 - ieeexplore.ieee.org
In the cyber world, insider threats significantly challenge organizational security. These
threats originate from malicious or negligent employees with authorized access, making …

Insider threat detection using supervised machine learning algorithms

P Manoharan, J Yin, H Wang, Y Zhang… - Telecommunication …, 2023 - Springer
Insider threats refer to abnormal actions taken by individuals with privileged access,
compromising system data's confidentiality, integrity, and availability. They pose significant …

Effective collaboration with information sharing in virtual universities

H Wang, Y Zhang, J Cao - IEEE Transactions on Knowledge …, 2008 - ieeexplore.ieee.org
A global education system, as a key area in future IT, has fostered developers to provide
various learning systems with low cost. While a variety of e-learning advantages has been …

Elastic optimization for stragglers in edge federated learning

K Sultana, K Ahmed, B Gu… - Big Data Mining and …, 2023 - ieeexplore.ieee.org
To fully exploit enormous data generated by intelligent devices in edge computing, edge
federated learning (EFL) is envisioned as a promising solution. The distributed collaborative …

Privacy-preserving data publishing: an information-driven distributed genetic algorithm

YF Ge, H Wang, J Cao, Y Zhang, X Jiang - World Wide Web, 2024 - Springer
The privacy-preserving data publishing (PPDP) problem has gained substantial attention
from research communities, industries, and governments due to the increasing requirements …

[图书][B] Access Control Management in Cloud Environments

H Wang, J Cao, Y Zhang - 2020 - Springer
This book introduces new business concepts on cloud environments such as secure,
scalable anonymity and practical payment protocols for the Internet of Things and …