default search action
Jinwei Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
Journal Articles
- 2021
- [j8]Brianne Mackenzie, Gabriel Anaya, Jinwei Hu, Arlen Brickman, Peter L. Elkin, Mandip Panesar:
Defining Data Migration Across Multidisciplinary Ambulatory Clinics Using Participatory Design. Appl. Clin. Inform. 12(02): 251-258 (2021) - [j7]Sarah Mullin, Jaroslaw Zola, Robert Lee, Jinwei Hu, Brianne Mackenzie, Arlen Brickman, Gabriel Anaya, Shyamashree Sinha, Angie Li, Peter L. Elkin:
Longitudinal K-means approaches to clustering and analyzing EHR opioid use trajectories for clinical subtypes. J. Biomed. Informatics 122: 103889 (2021) - 2017
- [j6]Jinwei Hu, Khaled M. Khan, Yan Zhang, Yun Bai, Ruixuan Li:
Role updating in information systems using model checking. Knowl. Inf. Syst. 51(1): 187-234 (2017) - 2012
- [j5]Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu:
Static Enforcement of Static Separation-of-Duty Policies in Usage Control Authorization Models. IEICE Trans. Commun. 95-B(5): 1508-1518 (2012) - [j4]Jianfeng Lu, Jianmin Han, Wei Chen, Jinwei Hu:
Safety and Availability Checking for User Authorization Queries in RBAC. Int. J. Comput. Intell. Syst. 5(5): 860-867 (2012) - 2011
- [j3]Jianfeng Lu, Ruixuan Li, Jinwei Hu, Dewu Xu:
Inconsistency resolving of safety and utility in access control. EURASIP J. Wirel. Commun. Netw. 2011: 101 (2011) - [j2]Jinwei Hu, Ruixuan Li, Zhengding Lu, Jianfeng Lu, Xiaopu Ma:
RAR: A role-and-risk based flexible framework for secure collaboration. Future Gener. Comput. Syst. 27(5): 574-586 (2011) - 2008
- [j1]Ruixuan Li, Zhuo Tang, Zhengding Lu, Jinwei Hu:
Request-driven role mapping framework for secure interoperation in multi-domain environments. Comput. Syst. Sci. Eng. 23(3) (2008)
Conference and Workshop Papers
- 2024
- [c19]Yi Dong, Ronghui Mu, Gaojie Jin, Yi Qi, Jinwei Hu, Xingyu Zhao, Jie Meng, Wenjie Ruan, Xiaowei Huang:
Position: Building Guardrails for Large Language Models Requires Systematic Design. ICML 2024 - 2019
- [c18]Jinwei Hu, Robert Lee, Sarah Mullin, Steven D. Schwaitzberg, Larry Harmon, Paul Gregory, Peter L. Elkin:
Multisource Feedback Driven Intervention Improves Physician Leadership and Teamwork. AMIA 2019 - [c17]Shyamashree Sinha, Robert Lee, Sarah Mullin, Jinwei Hu, Arlen Brickman, Angie Li, Peter L. Elkin:
Adverse Events Monitoring for Medication Assisted Treatment of Opioid Use Disorder: Using Healthcare Data Interoperability to Inform Practice. AMIA 2019 - 2017
- [c16]Richard Gay, Jinwei Hu, Heiko Mantel, Sogol Mazaheri:
Relationship-Based Access Control for Resharing in Decentralized Online Social Networks. FPS 2017: 18-34 - [c15]Richard Gay, Jinwei Hu, Heiko Mantel, Johannes Schickel:
Towards Accelerated Usage Control Based on Access Correlations. NordSec 2017: 245-261 - 2015
- [c14]Hongmu Han, Ruixuan Li, Jinwei Hu, Meikang Qiu:
Context Awareness through Reasoning on Private Analysis for Android Application. CSCloud 2015: 148-156 - [c13]Jinwei Hu, Heiko Mantel, Sebastian Ruhleder:
Enforcing Usage Constraints on Credentials for Web Applications. SEC 2015: 112-125 - 2014
- [c12]Richard Gay, Jinwei Hu, Heiko Mantel:
CliSeAu: Securing Distributed Java Programs by Cooperative Dynamic Enforcement. ICISS 2014: 378-398 - 2012
- [c11]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Constraint-enhanced role engineering via answer set programming. AsiaCCS 2012: 73-74 - [c10]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Tracking and Constraining Authorization Provenance. IEA/AIE 2012: 669-678 - [c9]Jinwei Hu, Khaled M. Khan, Yun Bai, Yan Zhang:
Compliance Checking for Usage-Constrained Credentials in Trust Negotiation Systems. ISC 2012: 290-305 - 2010
- [c8]Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
A logic for authorization provenance. AsiaCCS 2010: 238-249 - [c7]Jinwei Hu, Yan Zhang, Ruixuan Li:
Towards Automatic Update of Access Control Policy. LISA 2010 - [c6]Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
Role updating for assignments. SACMAT 2010: 89-98 - 2009
- [c5]Jinwei Hu, Ruixuan Li, Zhengding Lu:
RBAC-Based Secure Interoperation Using Constraint Logic Programming. CSE (2) 2009: 867-872 - [c4]Jinwei Hu, Yan Zhang, Ruixuan Li, Zhengding Lu:
Managing Authorization Provenance: A Modal Logic Based Approach. ICTAI 2009: 621-624 - [c3]Jianfeng Lu, Ruixuan Li, Zhengding Lu, Jinwei Hu, Xiaopu Ma:
Specification and Enforcement of Static Separation-of-Duty Policies in Usage Control. ISC 2009: 403-410 - [c2]Jinwei Hu, Ruixuan Li, Zhengding Lu:
On Role Mappings for RBAC-Based Secure Interoperation. NSS 2009: 270-277 - 2007
- [c1]Jinwei Hu, Ruixuan Li, Zhengding Lu:
Establishing RBAC-Based Secure Interoperability in Decentralized Multi-domain Environments. ICISC 2007: 49-63
Informal and Other Publications
- 2024
- [i6]Yi Dong, Ronghui Mu, Gaojie Jin, Yi Qi, Jinwei Hu, Xingyu Zhao, Jie Meng, Wenjie Ruan, Xiaowei Huang:
Building Guardrails for Large Language Models. CoRR abs/2402.01822 (2024) - [i5]Dayou Chen, Sibo Cheng, Jinwei Hu, Matthew Kasoar, Rossella Arcucci:
Explainable Global Wildfire Prediction Models using Graph Neural Networks. CoRR abs/2402.07152 (2024) - [i4]Yi Dong, Ronghui Mu, Yanghao Zhang, Siqi Sun, Tianle Zhang, Changshun Wu, Gaojie Jin, Yi Qi, Jinwei Hu, Jie Meng, Saddek Bensalem, Xiaowei Huang:
Safeguarding Large Language Models: A Survey. CoRR abs/2406.02622 (2024) - [i3]Jianyu Liu, Wei Chen, Yong Zhang, Zhenfeng Chen, Bin Wan, Jinwei Hu:
A Combination Model for Time Series Prediction using LSTM via Extracting Dynamic Features Based on Spatial Smoothing and Sequential General Variational Mode Decomposition. CoRR abs/2406.03144 (2024) - [i2]Jinwei Hu, Yi Dong, Xiaowei Huang:
Adaptive Guardrails For Large Language Models via Trust Modeling and In-Context Learning. CoRR abs/2408.08959 (2024) - 2010
- [i1]Jinwei Hu:
Expressiveness of a Provenance-Enabled Authorization Logic. CoRR abs/1006.0880 (2010)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint