default search action
Dijiang Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [j48]Zhen Zeng, Dijiang Huang, Guoliang Xue, Yuli Deng, Neha Vadnere, Liguang Xie:
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network. IEEE Trans. Dependable Secur. Comput. 21(4): 1890-1901 (2024) - 2023
- [j47]Sowmya Myneni, Kritshekhar Jha, Abdulhakim Sabur, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Dijiang Huang:
Unraveled - A semi-synthetic dataset for Advanced Persistent Threats. Comput. Networks 227: 109688 (2023) - [c117]Alexander Y. C. Huang, Yitao Chen, Dijiang Huang, Ming Zhao:
Semantic Privacy-Preserving for Video Surveillance Services on the Edge. SEC 2023: 300-305 - 2022
- [j46]Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Adel Alshamrani:
Toward scalable graph-based security analysis for cloud networks. Comput. Networks 206: 108795 (2022) - [j45]Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, Adel Alshamrani:
SmartDefense: A distributed deep defense against DDoS attacks with edge computing. Comput. Networks 209: 108874 (2022) - [j44]Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). IEEE Trans. Dependable Secur. Comput. 19(5): 2890-2906 (2022) - [j43]Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Neha Vadnere, Dijiang Huang:
SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services. ACM Trans. Internet Things 3(4): 28:1-28:26 (2022) - [j42]Zhen Zeng, Zhun Yang, Dijiang Huang, Chun-Jen Chung:
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. IEEE Trans. Netw. Serv. Manag. 19(2): 1746-1760 (2022) - [j41]Ankur Chowdhary, Abdulhakim Sabur, Neha Vadnere, Dijiang Huang:
Intent-Driven Security Policy Management for Software-Defined Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5208-5223 (2022) - 2021
- [c116]Duo Lu, Yuli Deng, Dijiang Huang:
Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. ACSAC 2021: 468-481 - [c115]Yuli Deng, Zhen Zeng, Dijiang Huang:
NeoCyberKG: Enhancing Cybersecurity Laboratories with a Machine Learning-enabled Knowledge Graph. ITiCSE (1) 2021: 310-316 - 2020
- [j40]Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati:
A Survey of Moving Target Defenses for Network Security. IEEE Commun. Surv. Tutorials 22(3): 1909-1941 (2020) - [c114]Ankur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur:
Autonomous Security Analysis and Penetration Testing. MSN 2020: 508-515
2010 – 2019
- 2019
- [j39]Adel Alshamrani, Sowmya Myneni, Ankur Chowdhary, Dijiang Huang:
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Commun. Surv. Tutorials 21(2): 1851-1877 (2019) - [j38]Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, Dijiang Huang:
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments. IEEE Trans. Dependable Secur. Comput. 16(6): 1011-1025 (2019) - [c113]Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDNSOC: Object Oriented SDN Framework. SDN-NFV@CODASPY 2019: 7-12 - [c112]Adrienne Jeanisha Raglin, Dijiang Huang, Huan Liu, James McCabe:
Smart CCR IoT: Internet of Things Testbed. CIC 2019: 232-235 - [c111]Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, Fanjie Lin:
Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs. CompEd 2019: 194-200 - [c110]Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks. GameSec 2019: 492-512 - [c109]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management Framework in SDN. ICC 2019: 1-6 - [c108]Duo Lu, Dijiang Huang, Anshul Rai:
FMHash: Deep Hashing of In-Air-Handwriting for User Identification. ICC 2019: 1-7 - [c107]Ankur Chowdhary, Dijiang Huang:
SDN based Network Function Parallelism in Cloud. ICNC 2019: 486-490 - [c106]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. ICNC 2019: 572-576 - [c105]Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. ICNC 2019: 577-581 - [c104]Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. RAID 2019: 473-485 - [c103]Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. SAC 2019: 355-363 - [c102]Jiayue Li, Tracy Yingying Cheng, Xiaohua Jia, Dijiang Huang:
Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks. WCNC 2019: 1-6 - [i16]Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Adel Alshamrani, Subbarao Kambhampati:
A Survey of Moving Target Defenses for Network Security. CoRR abs/1905.00964 (2019) - 2018
- [j37]Zhijie Wang, Dijiang Huang:
Privacy-preserving mobile crowd sensing in ad hoc networks. Ad Hoc Networks 73: 14-26 (2018) - [j36]Yan Zhu, Ruyun Yu, E. Chen, Dijiang Huang:
Dual-mode broadcast encryption. Sci. China Inf. Sci. 61(11): 118101:1-118101:3 (2018) - [j35]Yan Zhu, Guohua Gan, Ruiqi Guo, Dijiang Huang:
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Trans. Cloud Comput. 6(4): 1110-1124 (2018) - [j34]Bing Li, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based Access Control for ICN Naming Scheme. IEEE Trans. Dependable Secur. Comput. 15(2): 194-206 (2018) - [c101]Massimiliano Albanese, Dijiang Huang:
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). CCS 2018: 2175-2176 - [c100]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data. CNS 2018: 1-9 - [c99]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Hongbin Liang:
MTD Analysis and evaluation framework in Software Defined Network (MASON). SDN-NFV@CODASPY 2018: 43-48 - [c98]Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, Zhen Zeng:
Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education. FIE 2018: 1-8 - [c97]Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Improving student learning performance in a virtual hands-on lab system in cybersecurity education. FIE 2018: 1-5 - [c96]Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud. GameSec 2018: 326-345 - [c95]Adel Alshamrani, Ankur Chowdhary, Oussama Mjihil, Sowmya Myneni, Dijiang Huang:
Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation. GLOBECOM 2018: 1-7 - [c94]Duo Lu, Dijiang Huang, Yuli Deng, Adel Alshamrani:
Multifactor User Authentication with In-Air-Handwriting and Hand Geometry. ICB 2018: 255-262 - [c93]Abdullah Alshalan, Dijiang Huang:
Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers. ICC 2018: 1-6 - [c92]Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang:
Fault Tolerant Controller Placement in Distributed SDN Environments. ICC 2018: 1-7 - [c91]Jim Luo, Qiuxiang Dong, Dijiang Huang, Myong H. Kang:
Attribute Based Encryption for Information Sharing on Tactical Mobile Networks. MILCOM 2018: 1-9 - [c90]Mirza Mohd Shahriar Maswood, Md. Mainul Islam Mamun, Dijiang Huang, Deep Medhi:
A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment. Sarnoff Symposium 2018: 1-6 - [c89]Zhen Zeng, Yuli Deng, Sharon I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only). SIGCSE 2018: 1073 - [e7]Massimiliano Albanese, Dijiang Huang:
Proceedings of the 5th ACM Workshop on Moving Target Defense, CCS 2018, Toronto, ON, Canada, October 15, 2018. ACM 2018, ISBN 978-1-4503-6003-6 [contents] - [i15]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - [i14]Duo Lu, Dijiang Huang:
FMHash: Deep Hashing of In-Air-Handwriting for User Identification. CoRR abs/1806.03574 (2018) - [i13]Duo Lu, Dijiang Huang:
FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface. CoRR abs/1808.00130 (2018) - [i12]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Abdulhakim Sabur, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDFW: SDN-based Stateful Distributed Firewall. CoRR abs/1811.00634 (2018) - [i11]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management framework in SDN. CoRR abs/1811.00635 (2018) - [i10]Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. CoRR abs/1811.00651 (2018) - [i9]Ankur Chowdhary, Dijiang Huang:
SDN based Network Function Parallelism in Cloud. CoRR abs/1811.00653 (2018) - [i8]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. CoRR abs/1811.00657 (2018) - [i7]Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, Subbarao Kambhampati:
Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks. CoRR abs/1812.09660 (2018) - 2017
- [j33]Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang:
A survey on the usability and practical applications of Graphical Security Models. Comput. Sci. Rev. 26: 1-16 (2017) - [j32]Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li:
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Future Gener. Comput. Syst. 66: 30-35 (2017) - [c88]Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, Dijiang Huang:
Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments. SDN-NFV@CODASPY 2017: 53-58 - [c87]Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, Dijiang Huang:
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming. IBICA 2017: 277-287 - [c86]Duo Lu, Kai Xu, Dijiang Huang:
A data driven in-air-handwriting biometric authentication system. IJCB 2017: 531-537 - [c85]Qiuxiang Dong, Dijiang Huang:
Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers. ICDCS 2017: 2591-2592 - [c84]Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, Dijiang Huang:
A Defense System for Defeating DDoS Attacks in SDN based Networks. MobiWac 2017: 83-92 - [c83]Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukwha Kyung, Dijiang Huang, Gail-Joon Ahn:
Science DMZ: SDN based secured cloud testbed. NFV-SDN 2017: 1-2 - [c82]Yuli Deng, Dijiang Huang, Chun-Jen Chung:
ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only). SIGCSE 2017: 706 - [c81]Duo Lu, Dijiang Huang, Andrew Walenstein, Deep Medhi:
A Secure Microservice Framework for IoT. SOSE 2017: 9-18 - [c80]Oussama Mjihil, Dijiang Huang, Abdelkrim Haqiq:
Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing. UNet 2017: 193-205 - [c79]Duo Lu, Zhichao Li, Dijiang Huang:
Platooning as a service of autonomous vehicles. WoWMoM 2017: 1-6 - [i6]Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang:
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication. IACR Cryptol. ePrint Arch. 2017: 1100 (2017) - [i5]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing. IACR Cryptol. ePrint Arch. 2017: 1101 (2017) - [i4]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 1102 (2017) - 2016
- [j31]Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang:
A Survey of Mobile VPN Technologies. IEEE Commun. Surv. Tutorials 18(2): 1177-1196 (2016) - [j30]Alexey V. Vinel, Xiaomin Ma, Dijiang Huang:
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs. IEEE Trans. Dependable Secur. Comput. 13(1): 2-4 (2016) - [c78]Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim, Abdelkrim Haqiq:
Software Defined Stochastic Model for Moving Target Defense. AECIA 2016: 188-197 - [c77]Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang:
SDN based Scalable MTD solution in Cloud Network. MTD@CCS 2016: 27-36 - [c76]Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang:
Security policy checking in distributed SDN based clouds. CNS 2016: 19-27 - [c75]Zhiyuan Ma, Guangchun Luo, Dijiang Huang:
Short term traffic flow prediction based on on-line sequential extreme learning machine. ICACI 2016: 143-149 - [c74]Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang:
MobiVPN: A mobile VPN providing persistency to applications. ICNC 2016: 1-6 - [c73]Duo Lu, Zhichao Li, Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, Bing Li:
VC-bots: a vehicular cloud computing testbed with mobile robots. IoV-VoI@MobiHoc 2016: 31-36 - 2015
- [j29]Xiaoming Fu, Stefano Secci, Dijiang Huang, Rittwik Jana:
Mobile cloud computing [Guest Edotorial]. IEEE Commun. Mag. 53(3): 61-62 (2015) - [j28]Huijun Wu, Dijiang Huang, Yan Zhu:
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mob. Networks Appl. 20(3): 297-307 (2015) - [j27]Zhibin Zhou, Dijiang Huang, Zhijie Wang:
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption. IEEE Trans. Computers 64(1): 126-138 (2015) - [j26]Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. IEEE Trans. Computers 64(12): 3430-3443 (2015) - [j25]Yan Zhu, Dijiang Huang, Chang-Jyun Hu, Xin Wang:
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Trans. Serv. Comput. 8(4): 601-616 (2015) - [c72]George Cybenko, Dijiang Huang:
MTD 2015: Second ACM Workshop on Moving Target Defense. CCS 2015: 1709-1710 - [c71]Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, Kishor S. Trivedi:
SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment. DSN Workshops 2015: 4-11 - [c70]Jin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. ICA3PP (Workshops and Symposiums) 2015: 582-592 - [c69]Min Chen, Yixue Hao, Yong Li, Di Wu, Dijiang Huang:
Demo: LIVES: Learning through Interactive Video and Emotion-aware System. MobiHoc 2015: 399-400 - [c68]Huijun Wu, Dijiang Huang:
MoSeC: Mobile-Cloud Service Composition. MobileCloud 2015: 177-182 - [c67]Huijun Wu, Dijiang Huang, Min Chen:
POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications. IEEE MS 2015: 41-48 - [e6]Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma:
11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6 [contents] - [e5]George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3 [contents] - 2014
- [j24]Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi:
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet. Comput. Networks 63: 128-146 (2014) - [j23]Yang Qin, Dijiang Huang, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. IEEE Trans. Dependable Secur. Comput. 11(2): 181-192 (2014) - [j22]Le Xu, Dijiang Huang, Wei-Tek Tsai:
Cloud-Based Virtual Laboratory for Network Security Education. IEEE Trans. Educ. 57(3): 145-150 (2014) - [c66]Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based access control for ICN naming scheme. CNS 2014: 391-399 - [c65]Huijun Wu, Dijiang Huang:
Modeling multi-factor multi-site risk-based offloading for mobile cloud computing. CNSM 2014: 230-235 - [c64]Tianyi Xing, Zhengyang Xiong, Dijiang Huang, Deep Medhi:
SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds. CNSM 2014: 308-311 - [c63]Zhijie Wang, Dijiang Huang, Huijun Wu, Yuli Deng, Ailixier Aikebaier, Yuuichi Teranishi:
QoS-constrained sensing task assignment for mobile crowd sensing. GLOBECOM 2014: 311-316 - [c62]Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, Yuli Deng:
Towards distributed privacy-preserving mobile access control. GLOBECOM 2014: 582-587 - [c61]Zhijie Wang, Bing Li, Dijiang Huang:
Towards Anonymous Group Setup across Multiple Domains. MILCOM 2014: 178-183 - [c60]Bing Li, Dijiang Huang, Zhijie Wang:
Refining Traffic Information for Analysis Using Evidence Theory. MILCOM 2014: 1181-1186 - [c59]Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, Ikuo Oka:
A database oriented management for asynchronous and consistent reconfiguration in Software-Defined Networks. NOMS 2014: 1-5 - [e4]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - 2013
- [j21]Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng, Yan Liu:
Adaptive Computing Resource Allocation for Mobile Cloud Computing. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Dijiang Huang, Tianyi Xing, Huijun Wu:
Mobile cloud computing service models: a user-centric approach. IEEE Netw. 27(5): 6-11 (2013) - [j19]Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang:
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. IEEE Trans. Dependable Secur. Comput. 10(4): 198-211 (2013) - [c58]Yan Zhu, Di Ma, Changjun Hu, Dijiang Huang:
How to use attribute-based encryption to implement role-based access control in the cloud. SCC@ASIACCS 2013: 33-40 - [c57]Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang:
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. CollaborateCom 2013: 21-30 - [c56]Huijun Wu, Dijiang Huang, Samia Bouzefrane:
Making offloading decisions resistant to network unavailability for mobile cloud collaboration. CollaborateCom 2013: 168-177 - [c55]Bing Li, Zhijie Wang, Dijiang Huang:
An Efficient and Anonymous Attribute-Based group setup scheme. GLOBECOM 2013: 861-866 - [c54]Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar:
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment. GREE 2013: 89-92 - [c53]Akira Wada, Yasuhiro Sato, <