default search action
Dijiang Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j48]Zhen Zeng, Dijiang Huang, Guoliang Xue, Yuli Deng, Neha Vadnere, Liguang Xie:
ILLATION: Improving Vulnerability Risk Prioritization by Learning From Network. IEEE Trans. Dependable Secur. Comput. 21(4): 1890-1901 (2024) - 2023
- [j47]Sowmya Myneni, Kritshekhar Jha, Abdulhakim Sabur, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Dijiang Huang:
Unraveled - A semi-synthetic dataset for Advanced Persistent Threats. Comput. Networks 227: 109688 (2023) - [c117]Alexander Y. C. Huang, Yitao Chen, Dijiang Huang, Ming Zhao:
Semantic Privacy-Preserving for Video Surveillance Services on the Edge. SEC 2023: 300-305 - 2022
- [j46]Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Adel Alshamrani:
Toward scalable graph-based security analysis for cloud networks. Comput. Networks 206: 108795 (2022) - [j45]Sowmya Myneni, Ankur Chowdhary, Dijiang Huang, Adel Alshamrani:
SmartDefense: A distributed deep defense against DDoS attacks with edge computing. Comput. Networks 209: 108874 (2022) - [j44]Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Myong H. Kang, James Kirby:
Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC). IEEE Trans. Dependable Secur. Comput. 19(5): 2890-2906 (2022) - [j43]Sowmya Myneni, Garima Agrawal, Yuli Deng, Ankur Chowdhary, Neha Vadnere, Dijiang Huang:
SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services. ACM Trans. Internet Things 3(4): 28:1-28:26 (2022) - [j42]Zhen Zeng, Zhun Yang, Dijiang Huang, Chun-Jen Chung:
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning. IEEE Trans. Netw. Serv. Manag. 19(2): 1746-1760 (2022) - [j41]Ankur Chowdhary, Abdulhakim Sabur, Neha Vadnere, Dijiang Huang:
Intent-Driven Security Policy Management for Software-Defined Systems. IEEE Trans. Netw. Serv. Manag. 19(4): 5208-5223 (2022) - 2021
- [c116]Duo Lu, Yuli Deng, Dijiang Huang:
Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication. ACSAC 2021: 468-481 - [c115]Yuli Deng, Zhen Zeng, Dijiang Huang:
NeoCyberKG: Enhancing Cybersecurity Laboratories with a Machine Learning-enabled Knowledge Graph. ITiCSE (1) 2021: 310-316 - 2020
- [j40]Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati:
A Survey of Moving Target Defenses for Network Security. IEEE Commun. Surv. Tutorials 22(3): 1909-1941 (2020) - [c114]Ankur Chowdhary, Dijiang Huang, Jayasurya Sevalur Mahendran, Daniel Romo, Yuli Deng, Abdulhakim Sabur:
Autonomous Security Analysis and Penetration Testing. MSN 2020: 508-515
2010 – 2019
- 2019
- [j39]Adel Alshamrani, Sowmya Myneni, Ankur Chowdhary, Dijiang Huang:
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities. IEEE Commun. Surv. Tutorials 21(2): 1851-1877 (2019) - [j38]Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, Dijiang Huang:
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments. IEEE Trans. Dependable Secur. Comput. 16(6): 1011-1025 (2019) - [c113]Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDNSOC: Object Oriented SDN Framework. SDN-NFV@CODASPY 2019: 7-12 - [c112]Adrienne Jeanisha Raglin, Dijiang Huang, Huan Liu, James McCabe:
Smart CCR IoT: Internet of Things Testbed. CIC 2019: 232-235 - [c111]Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, Fanjie Lin:
Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs. CompEd 2019: 194-200 - [c110]Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks. GameSec 2019: 492-512 - [c109]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management Framework in SDN. ICC 2019: 1-6 - [c108]Duo Lu, Dijiang Huang, Anshul Rai:
FMHash: Deep Hashing of In-Air-Handwriting for User Identification. ICC 2019: 1-7 - [c107]Ankur Chowdhary, Dijiang Huang:
SDN based Network Function Parallelism in Cloud. ICNC 2019: 486-490 - [c106]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. ICNC 2019: 572-576 - [c105]Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. ICNC 2019: 577-581 - [c104]Abdulhakim Sabur, Ankur Chowdhary, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks. RAID 2019: 473-485 - [c103]Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Luo, Myong H. Kang:
Building private blockchains over public blockchains (PoP): an attribute-based access control approach. SAC 2019: 355-363 - [c102]Jiayue Li, Tracy Yingying Cheng, Xiaohua Jia, Dijiang Huang:
Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks. WCNC 2019: 1-6 - [i16]Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, Adel Alshamrani, Subbarao Kambhampati:
A Survey of Moving Target Defenses for Network Security. CoRR abs/1905.00964 (2019) - 2018
- [j37]Zhijie Wang, Dijiang Huang:
Privacy-preserving mobile crowd sensing in ad hoc networks. Ad Hoc Networks 73: 14-26 (2018) - [j36]Yan Zhu, Ruyun Yu, E. Chen, Dijiang Huang:
Dual-mode broadcast encryption. Sci. China Inf. Sci. 61(11): 118101:1-118101:3 (2018) - [j35]Yan Zhu, Guohua Gan, Ruiqi Guo, Dijiang Huang:
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud. IEEE Trans. Cloud Comput. 6(4): 1110-1124 (2018) - [j34]Bing Li, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based Access Control for ICN Naming Scheme. IEEE Trans. Dependable Secur. Comput. 15(2): 194-206 (2018) - [c101]Massimiliano Albanese, Dijiang Huang:
MTD 2018: 5th ACM Workshop on Moving Target Defense (MTD). CCS 2018: 2175-2176 - [c100]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data. CNS 2018: 1-9 - [c99]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Hongbin Liang:
MTD Analysis and evaluation framework in Software Defined Network (MASON). SDN-NFV@CODASPY 2018: 43-48 - [c98]Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, Zhen Zeng:
Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education. FIE 2018: 1-8 - [c97]Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Improving student learning performance in a virtual hands-on lab system in cybersecurity education. FIE 2018: 1-5 - [c96]Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, Subbarao Kambhampati:
Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud. GameSec 2018: 326-345 - [c95]Adel Alshamrani, Ankur Chowdhary, Oussama Mjihil, Sowmya Myneni, Dijiang Huang:
Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation. GLOBECOM 2018: 1-7 - [c94]Duo Lu, Dijiang Huang, Yuli Deng, Adel Alshamrani:
Multifactor User Authentication with In-Air-Handwriting and Hand Geometry. ICB 2018: 255-262 - [c93]Abdullah Alshalan, Dijiang Huang:
Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers. ICC 2018: 1-6 - [c92]Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang:
Fault Tolerant Controller Placement in Distributed SDN Environments. ICC 2018: 1-7 - [c91]Jim Luo, Qiuxiang Dong, Dijiang Huang, Myong H. Kang:
Attribute Based Encryption for Information Sharing on Tactical Mobile Networks. MILCOM 2018: 1-9 - [c90]Mirza Mohd Shahriar Maswood, Md. Mainul Islam Mamun, Dijiang Huang, Deep Medhi:
A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment. Sarnoff Symposium 2018: 1-6 - [c89]Zhen Zeng, Yuli Deng, Sharon I-Han Hsiao, Dijiang Huang, Chun-Jen Chung:
Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only). SIGCSE 2018: 1073 - [e7]Massimiliano Albanese, Dijiang Huang:
Proceedings of the 5th ACM Workshop on Moving Target Defense, CCS 2018, Toronto, ON, Canada, October 15, 2018. ACM 2018, ISBN 978-1-4503-6003-6 [contents] - [i15]Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard R. Brooks, Prasad Calyam, Jeffrey S. Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abraham Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, Kobus van der Merwe, Kuang-Ching Wang, Tilman Wolf, Michael Zink:
The Future of CISE Distributed Research Infrastructure. CoRR abs/1803.09886 (2018) - [i14]Duo Lu, Dijiang Huang:
FMHash: Deep Hashing of In-Air-Handwriting for User Identification. CoRR abs/1806.03574 (2018) - [i13]Duo Lu, Dijiang Huang:
FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface. CoRR abs/1808.00130 (2018) - [i12]Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Abdulhakim Sabur, Myong H. Kang, Anya Kim, Alexander Velazquez:
SDFW: SDN-based Stateful Distributed Firewall. CoRR abs/1811.00634 (2018) - [i11]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong H. Kang, Anya Kim, Alexander Velazquez:
TRUFL: Distributed Trust Management framework in SDN. CoRR abs/1811.00635 (2018) - [i10]Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur:
Adaptive MTD Security using Markov Game Modeling. CoRR abs/1811.00651 (2018) - [i9]Ankur Chowdhary, Dijiang Huang:
SDN based Network Function Parallelism in Cloud. CoRR abs/1811.00653 (2018) - [i8]Ankur Chowdhary, Adel Alshamrani, Dijiang Huang:
SUPC: SDN enabled Universal Policy Checking in Cloud Network. CoRR abs/1811.00657 (2018) - [i7]Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, Subbarao Kambhampati:
Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks. CoRR abs/1812.09660 (2018) - 2017
- [j33]Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, Dijiang Huang:
A survey on the usability and practical applications of Graphical Security Models. Comput. Sci. Rev. 26: 1-16 (2017) - [j32]Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li:
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization. Future Gener. Comput. Syst. 66: 30-35 (2017) - [c88]Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, Dijiang Huang:
Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments. SDN-NFV@CODASPY 2017: 53-58 - [c87]Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, Dijiang Huang:
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming. IBICA 2017: 277-287 - [c86]Duo Lu, Kai Xu, Dijiang Huang:
A data driven in-air-handwriting biometric authentication system. IJCB 2017: 531-537 - [c85]Qiuxiang Dong, Dijiang Huang:
Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers. ICDCS 2017: 2591-2592 - [c84]Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, Dijiang Huang:
A Defense System for Defeating DDoS Attacks in SDN based Networks. MobiWac 2017: 83-92 - [c83]Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukwha Kyung, Dijiang Huang, Gail-Joon Ahn:
Science DMZ: SDN based secured cloud testbed. NFV-SDN 2017: 1-2 - [c82]Yuli Deng, Dijiang Huang, Chun-Jen Chung:
ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only). SIGCSE 2017: 706 - [c81]Duo Lu, Dijiang Huang, Andrew Walenstein, Deep Medhi:
A Secure Microservice Framework for IoT. SOSE 2017: 9-18 - [c80]Oussama Mjihil, Dijiang Huang, Abdelkrim Haqiq:
Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing. UNet 2017: 193-205 - [c79]Duo Lu, Zhichao Li, Dijiang Huang:
Platooning as a service of autonomous vehicles. WoWMoM 2017: 1-6 - [i6]Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang:
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication. IACR Cryptol. ePrint Arch. 2017: 1100 (2017) - [i5]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing. IACR Cryptol. ePrint Arch. 2017: 1101 (2017) - [i4]Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong H. Kang:
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption. IACR Cryptol. ePrint Arch. 2017: 1102 (2017) - 2016
- [j31]Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang:
A Survey of Mobile VPN Technologies. IEEE Commun. Surv. Tutorials 18(2): 1177-1196 (2016) - [j30]Alexey V. Vinel, Xiaomin Ma, Dijiang Huang:
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs. IEEE Trans. Dependable Secur. Comput. 13(1): 2-4 (2016) - [c78]Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim, Abdelkrim Haqiq:
Software Defined Stochastic Model for Moving Target Defense. AECIA 2016: 188-197 - [c77]Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang:
SDN based Scalable MTD solution in Cloud Network. MTD@CCS 2016: 27-36 - [c76]Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang:
Security policy checking in distributed SDN based clouds. CNS 2016: 19-27 - [c75]Zhiyuan Ma, Guangchun Luo, Dijiang Huang:
Short term traffic flow prediction based on on-line sequential extreme learning machine. ICACI 2016: 143-149 - [c74]Abdullah Alshalan, Sandeep Pisharody, Dijiang Huang:
MobiVPN: A mobile VPN providing persistency to applications. ICNC 2016: 1-6 - [c73]Duo Lu, Zhichao Li, Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, Bing Li:
VC-bots: a vehicular cloud computing testbed with mobile robots. IoV-VoI@MobiHoc 2016: 31-36 - 2015
- [j29]Xiaoming Fu, Stefano Secci, Dijiang Huang, Rittwik Jana:
Mobile cloud computing [Guest Edotorial]. IEEE Commun. Mag. 53(3): 61-62 (2015) - [j28]Huijun Wu, Dijiang Huang, Yan Zhu:
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications. Mob. Networks Appl. 20(3): 297-307 (2015) - [j27]Zhibin Zhou, Dijiang Huang, Zhijie Wang:
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption. IEEE Trans. Computers 64(1): 126-138 (2015) - [j26]Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, Chun-Jen Chung:
Efficient Attribute-Based Comparable Data Access Control. IEEE Trans. Computers 64(12): 3430-3443 (2015) - [j25]Yan Zhu, Dijiang Huang, Chang-Jyun Hu, Xin Wang:
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services. IEEE Trans. Serv. Comput. 8(4): 601-616 (2015) - [c72]George Cybenko, Dijiang Huang:
MTD 2015: Second ACM Workshop on Moving Target Defense. CCS 2015: 1709-1710 - [c71]Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, Kishor S. Trivedi:
SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment. DSN Workshops 2015: 4-11 - [c70]Jin B. Hong, Chun-Jen Chung, Dijiang Huang, Dong Seong Kim:
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. ICA3PP (Workshops and Symposiums) 2015: 582-592 - [c69]Min Chen, Yixue Hao, Yong Li, Di Wu, Dijiang Huang:
Demo: LIVES: Learning through Interactive Video and Emotion-aware System. MobiHoc 2015: 399-400 - [c68]Huijun Wu, Dijiang Huang:
MoSeC: Mobile-Cloud Service Composition. MobileCloud 2015: 177-182 - [c67]Huijun Wu, Dijiang Huang, Min Chen:
POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications. IEEE MS 2015: 41-48 - [e6]Ajith Abraham, Adel M. Alimi, Abdelkrim Haqiq, Dijiang Huang, Dong Seong Kim, Hannan Xiao, Nizar Rokbani, Mohamed Ben Halima, Azah Kamilah Muda, Kun Ma:
11th International Conference on Information Assurance and Security, IAS 2015, Marrakech, Morocco, December 14-16, 2015. IEEE 2015, ISBN 978-1-4673-8715-6 [contents] - [e5]George Cybenko, Dijiang Huang:
Proceedings of the Second ACM Workshop on Moving Target Defense, MTD 2015, Denver, Colorado, USA, October 12, 2015. ACM 2015, ISBN 978-1-4503-3823-3 [contents] - 2014
- [j24]Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi:
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet. Comput. Networks 63: 128-146 (2014) - [j23]Yang Qin, Dijiang Huang, Bing Li:
STARS: A Statistical Traffic Pattern Discovery System for MANETs. IEEE Trans. Dependable Secur. Comput. 11(2): 181-192 (2014) - [j22]Le Xu, Dijiang Huang, Wei-Tek Tsai:
Cloud-Based Virtual Laboratory for Network Security Education. IEEE Trans. Educ. 57(3): 145-150 (2014) - [c66]Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, Yan Zhu:
Attribute-based access control for ICN naming scheme. CNS 2014: 391-399 - [c65]Huijun Wu, Dijiang Huang:
Modeling multi-factor multi-site risk-based offloading for mobile cloud computing. CNSM 2014: 230-235 - [c64]Tianyi Xing, Zhengyang Xiong, Dijiang Huang, Deep Medhi:
SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds. CNSM 2014: 308-311 - [c63]Zhijie Wang, Dijiang Huang, Huijun Wu, Yuli Deng, Ailixier Aikebaier, Yuuichi Teranishi:
QoS-constrained sensing task assignment for mobile crowd sensing. GLOBECOM 2014: 311-316 - [c62]Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, Yuli Deng:
Towards distributed privacy-preserving mobile access control. GLOBECOM 2014: 582-587 - [c61]Zhijie Wang, Bing Li, Dijiang Huang:
Towards Anonymous Group Setup across Multiple Domains. MILCOM 2014: 178-183 - [c60]Bing Li, Dijiang Huang, Zhijie Wang:
Refining Traffic Information for Analysis Using Evidence Theory. MILCOM 2014: 1181-1186 - [c59]Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, Ikuo Oka:
A database oriented management for asynchronous and consistent reconfiguration in Software-Defined Networks. NOMS 2014: 1-5 - [e4]Cliff Wang, Dijiang Huang, Kapil Singh, Zhenkai Liang:
Proceedings of the 4th ACM Workshop on Security and Privacy in Smartphones & Mobile Devices, SPSM@CCS 2014, Scottsdale, AZ, USA, November 03 - 07, 2014. ACM 2014, ISBN 978-1-4503-3155-5 [contents] - 2013
- [j21]Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng, Yan Liu:
Adaptive Computing Resource Allocation for Mobile Cloud Computing. Int. J. Distributed Sens. Networks 9 (2013) - [j20]Dijiang Huang, Tianyi Xing, Huijun Wu:
Mobile cloud computing service models: a user-centric approach. IEEE Netw. 27(5): 6-11 (2013) - [j19]Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, Dijiang Huang:
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems. IEEE Trans. Dependable Secur. Comput. 10(4): 198-211 (2013) - [c58]Yan Zhu, Di Ma, Changjun Hu, Dijiang Huang:
How to use attribute-based encryption to implement role-based access control in the cloud. SCC@ASIACCS 2013: 33-40 - [c57]Chun-Jen Chung, Jingsong Cui, Pankaj Khatkar, Dijiang Huang:
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations. CollaborateCom 2013: 21-30 - [c56]Huijun Wu, Dijiang Huang, Samia Bouzefrane:
Making offloading decisions resistant to network unavailability for mobile cloud collaboration. CollaborateCom 2013: 168-177 - [c55]Bing Li, Zhijie Wang, Dijiang Huang:
An Efficient and Anonymous Attribute-Based group setup scheme. GLOBECOM 2013: 861-866 - [c54]Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar:
SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment. GREE 2013: 89-92 - [c53]Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang, Ikuo Oka:
A behavior based policy management for adaptive trustworthiness assignment in future network. IM 2013: 784-787 - [c52]Fatiha Houacine, Samia Bouzefrane, Li Li, Dijiang Huang:
MCC-OSGi: An OSGi-based mobile cloud service model. ISADS 2013: 1-8 - [c51]Bing Li, Dijiang Huang:
Modeling Anonymous MANET Communications Using Super-Nodes. MILCOM 2013: 125-130 - [c50]Yan Zhu, Di Ma, Dijiang Huang, Changjun Hu:
Enabling secure location-based services in mobile cloud computing. MCC@SIGCOMM 2013: 27-32 - [c49]Le Xu, Li Li, Vijayakrishnan Nagarajan, Dijiang Huang, Wei-Tek Tsai:
Secure Web Referral Services for Mobile Cloud Computing. SOSE 2013: 584-593 - [c48]Li Li, Dijiang Huang, Zhidong Shen, Samia Bouzefrane:
A cloud based dual-root trust model for secure mobile online transactions. WCNC 2013: 4404-4409 - [e3]Xiaoming Fu, Puneet Sharma, Dijiang Huang, Deep Medhi:
IEEE 2nd International Conference on Cloud Networking, CloudNet 2013, San Francisco, CA, USA, November 11-13, 2013. IEEE 2013, ISBN 978-1-4799-0566-9 [contents] - [e2]Mario Gerla, Dijiang Huang:
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, MCC@SIGCOMM 2013, Hong Kong, China, August 16, 2013. ACM 2013, ISBN 978-1-4503-2180-8 [contents] - 2012
- [j18]Le Xu, Dijiang Huang, Wei-Tek Tsai, Robert K. Atkinson:
V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses. Int. J. Cyber Behav. Psychol. Learn. 2(3): 73-85 (2012) - [j17]Zhibin Zhou, Dijiang Huang:
Gradual identity exposure using attribute-based encryption. Int. J. Inf. Priv. Secur. Integr. 1(2/3): 278-297 (2012) - [j16]Bhumip Khasnabish, Dijiang Huang, Xiaoying Bai, Paolo Bellavista, Gregorio Martínez Pérez, Nick Antonopoulos:
Cloud Computing, Networking, and Services. J. Netw. Syst. Manag. 20(4): 463-467 (2012) - [j15]Hongbin Liang, Lin X. Cai, Dijiang Huang, Xuemin Shen, Daiyuan Peng:
An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks. IEEE Trans. Veh. Technol. 61(5): 2222-2232 (2012) - [c47]Zhibin Zhou, Dijiang Huang:
Efficient and secure data storage operations for mobile cloud computing. CNSM 2012: 37-45 - [c46]Tianyi Xing, Dijiang Huang, Shingo Ata, Deep Medhi:
MobiCloud: A geo-distributed mobile cloud computing platform. CNSM 2012: 164-168 - [c45]Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, Deep Medhi:
Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE). ICC 2012: 5879-5884 - [c44]Vijayakrishnan Nagarajan, Dijiang Huang:
Secure web referral service. ICOIN 2012: 53-58 - [c43]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang:
Towards temporal access control in cloud computing. INFOCOM 2012: 2576-2580 - [c42]Le Xu, Dijiang Huang, Wei-Tek Tsai:
V-lab: a cloud-based virtual laboratory platform for hands-on networking courses. ITiCSE 2012: 256-261 - [c41]Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi:
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation. NOMS 2012: 1159-1166 - [c40]Dijiang Huang, Sean A. Williams, Swaroop Shere:
Cheater Detection in Vehicular Networks. TrustCom 2012: 193-200 - [c39]Yang Qin, Dijiang Huang, Xinwen Zhang:
VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks. TrustCom 2012: 1438-1445 - [c38]Tianyi Xing, Hongbin Liang, Dijiang Huang, Lin X. Cai:
Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing. TrustCom 2012: 1446-1453 - [e1]Mario Gerla, Dijiang Huang:
Proceedings of the first edition of the MCC workshop on Mobile cloud computing, MCC@SIGCOMM 2012, Helsinki, Finland, August 17, 2012. ACM 2012, ISBN 978-1-4503-1519-7 [contents] - 2011
- [j14]Dijiang Huang, Wei-Tek Tsai, Yi-hsin Tseng:
Policy Management for Secure Data Access Control in Vehicular Networks. J. Netw. Syst. Manag. 19(4): 448-471 (2011) - [j13]Dijiang Huang, Satyajayant Misra, Mayank Verma, Guoliang Xue:
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs. IEEE Trans. Intell. Transp. Syst. 12(3): 736-746 (2011) - [c37]Yang Qin, Dijiang Huang:
Least Squares Disclosure Attack in Mobile Ad Hoc Networks. ICC 2011: 1-5 - [i3]Zhibin Zhou, Dijiang Huang:
Efficient and Secure Data Storage Operations for Mobile Cloud Computing. IACR Cryptol. ePrint Arch. 2011: 185 (2011) - 2010
- [j12]Dijiang Huang, Xiaoyan Hong, Mario Gerla:
Situation-aware trust architecture for vehicular networks. IEEE Commun. Mag. 48(11): 128-135 (2010) - [j11]Dijiang Huang, Vinayak Kandiah:
Low-latency Mix Using Split and Merge Operations. J. Netw. Syst. Manag. 18(3): 244-264 (2010) - [c36]Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla:
Establishing Email-Based Social Network Trust for Vehicular Networks. CCNC 2010: 1-5 - [c35]Sowmya Myneni, Dijiang Huang:
IEEE 802.11 Wireless LAN Control Frame Protection. CCNC 2010: 1-5 - [c34]Vijayakrishnan Nagarajan, Vetri Arasan, Dijiang Huang:
Using Power Hopping to Counter MAC Spoof Attacks in WLAN. CCNC 2010: 1-5 - [c33]Zhibin Zhou, Dijiang Huang:
On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract. CCS 2010: 753-755 - [c32]Dijiang Huang:
Anonymous Certification Services. GLOBECOM 2010: 1-6 - [c31]Dijiang Huang, Vetri Arasan:
On Measuring Email-Based Social Network Trust. GLOBECOM 2010: 1-5 - [c30]Dijiang Huang, Shingo Ata, Deep Medhi:
Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet. GLOBECOM 2010: 1-6 - [c29]Zhibin Zhou, Dijiang Huang:
An Optimal Key Distribution Scheme for Secure Multicast Group Communication. INFOCOM 2010: 331-335 - [c28]Nanxi Chen, Mario Gerla, Dijiang Huang, Xiaoyan Hong:
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption. Med-Hoc-Net 2010: 1-8 - [c27]Hongbin Liang, Dijiang Huang, Daiyuan Peng:
On Economic Mobile Cloud Computing Model. MobiCASE 2010: 329-341 - [c26]Dijiang Huang, Swaroop Shere, Soyoung Ahn:
Dynamic highway congestion detection and prediction based on shock waves. Vehicular Ad Hoc Networks 2010: 11-20 - [c25]Dijiang Huang, Vetri Arasan:
Email-based Social Network Trust. SocialCom/PASSAT 2010: 363-370 - [c24]Dijiang Huang, Zhibin Zhou, Yan Zhu:
Gradual Identity Exposure Using Attribute-Based Encryption. SocialCom/PASSAT 2010: 881-888 - [c23]Dijiang Huang, Xinwen Zhang, Myong H. Kang, Jim Luo:
MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication. SOSE 2010: 27-34 - [i2]Zhibin Zhou, Dijiang Huang:
On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption. IACR Cryptol. ePrint Arch. 2010: 395 (2010)
2000 – 2009
- 2009
- [j10]Dijiang Huang, Mayank Verma:
ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks. Ad Hoc Networks 7(8): 1526-1535 (2009) - [c22]Mayank Verma, Dijiang Huang:
SeGCom: Secure Group Communication in VANETs. CCNC 2009: 1-5 - [c21]Mukesh Jagasia, Dijiang Huang:
Distributed Data-Theft Detection in Wireless Sensor Networks. GLOBECOM 2009: 1-6 - [c20]Harsh Kapoor, Dijiang Huang:
Secret-Sharing Based Secure Communication Protocols for Passive RFIDs. GLOBECOM 2009: 1-6 - [c19]Satyajayant Misra, Mayank Verma, Dijiang Huang, Guoliang Xue:
SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags. ICC 2009: 1-6 - [c18]Dijiang Huang:
On an information theoretic approach to model anonymous MANET communications. ISIT 2009: 1629-1633 - [c17]Dijiang Huang, Harsh Kapoor:
Towards Lightweight Secure Communication Protocols for Passive RFIDs. SECON 2009: 1-9 - [i1]Zhibin Zhou, Dijiang Huang:
Optimal Multicast Group Communication. IACR Cryptol. ePrint Arch. 2009: 10 (2009) - 2008
- [j9]Dijiang Huang, Deep Medhi:
A secure group key management scheme for hierarchical mobile ad hoc networks. Ad Hoc Networks 6(4): 560-577 (2008) - [j8]Hao Li, Jian Huang, Philip H. Sweany, Dijiang Huang:
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field. J. Syst. Archit. 54(12): 1077-1088 (2008) - [j7]Zhibin Zhou, Dijiang Huang:
Computing cryptographic pairing in sensors. SIGBED Rev. 5(1): 27 (2008) - [j6]Dijiang Huang:
Unlinkability Measure for IEEE 802.11 Based MANETs. IEEE Trans. Wirel. Commun. 7(3): 1025-1034 (2008) - [c16]Zhibin Zhou, Dijiang Huang:
SRK: A Distributed RFID Data Access Control Mechanism. ICC 2008: 2854-2858 - [c15]Vinayak Kandiah, Dijiang Huang, Harsh Kapoor:
C-Mix: A Lightweight Anonymous Routing Approach. Information Hiding 2008: 294-308 - [c14]Dijiang Huang, Vinayak Kandiah, Mayank Verma:
Privacy preservation services: challenges and solutions. SAC 2008: 2110-2115 - 2007
- [j5]Dijiang Huang:
Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks. Int. J. Secur. Networks 2(3/4): 272-283 (2007) - [j4]Dijiang Huang, Manish Mehta, Appie van de Liefvoort, Deep Medhi:
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks. IEEE/ACM Trans. Netw. 15(5): 1204-1215 (2007) - [j3]Dijiang Huang, Deep Medhi:
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach. ACM Trans. Sens. Networks 3(3): 16 (2007) - [c13]Dijiang Huang, Mayank Verma, Archana Ramachandran, Zhibin Zhou:
A Distributed ePedigree Architecture. FTDCS 2007: 220-230 - [c12]Zhibin Zhou, Dijiang Huang:
RFID Keeper: An RFID Data Access Control Mechanism. GLOBECOM 2007: 4570-4574 - 2006
- [j2]Dijiang Huang, Qing Cao, Amit Sinha, Marc J. Schniederjans, Cory C. Beard, Lein Harn, Deep Medhi:
New architecture for intra-domain network security issues. Commun. ACM 49(11): 64-72 (2006) - [c11]Dijiang Huang, Amit Sinha, Deep Medhi:
On providing confidentiality in link state routing protocol. CCNC 2006: 671-675 - [c10]Dijiang Huang:
On Measuring Anonymity For Wireless Mobile Ad-hoc Networks. LCN 2006: 779-786 - [c9]Dijiang Huang:
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems. Workshop on Wireless Security 2006: 65-74 - 2005
- [c8]Gaurav Agrawal, Dijiang Huang, Deep Medhi:
Network protection design for MPLS networks. DRCN 2005: 481-488 - [c7]Dijiang Huang, Amit Sinha, Deep Medhi:
A key distribution scheme for double authentication in link state routing protocol. IPCCC 2005: 19-24 - [c6]Dijiang Huang, Manish Mehta, Deep Medhi:
Source routing based pairwise key establishment protocol for sensor networks. IPCCC 2005: 177-183 - [c5]Manish Mehta, Dijiang Huang, Lein Harn:
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks. IPCCC 2005: 193-197 - [c4]Dijiang Huang, Deep Medhi:
A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks. IPDPS 2005 - [c3]Dijiang Huang:
Using Delaunay triangulation to construct obstacle detour mobility model. WCNC 2005: 1644-1649 - 2004
- [j1]Dijiang Huang, Deep Medhi:
A key-chain-based keying scheme for many-to-many secure group communication. ACM Trans. Inf. Syst. Secur. 7(4): 523-552 (2004) - [c2]Dijiang Huang, Manish Mehta, Deep Medhi, Lein Harn:
Location-aware key management scheme for wireless sensor networks. SASN 2004: 29-42 - 2003
- [c1]Dijiang Huang, Amit Sinha, Deep Medhi:
A double authentication scheme to detect impersonation attack in link state routing protocols. ICC 2003: 1723-1727
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-23 19:21 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint