default search action
Huirong Fu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [i3]Xuemei Li, Huirong Fu:
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification. CoRR abs/2311.12074 (2023) - 2021
- [j32]Rui Zhu, Tao Shu, Huirong Fu:
Statistical inference attack against PHY-layer key extraction and countermeasures. Wirel. Networks 27(7): 4853-4873 (2021) - [c64]Hani Alshahrani, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu:
Web-based Malware Detection for Android OS. CSCI 2021: 1317-1322 - 2020
- [i2]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu:
Ransomware in Windows and Android Platforms. CoRR abs/2005.05571 (2020)
2010 – 2019
- 2019
- [j31]Anyi Liu, Huirong Fu, Yuan Hong, Jigang Liu, Yingjiu Li:
LiveForen: Ensuring Live Forensic Integrity in the Cloud. IEEE Trans. Inf. Forensics Secur. 14(10): 2749-2764 (2019) - [c63]Saikrishna Gumudavally, Ye Zhu, Huirong Fu, Yong Guan:
HECTor: Homomorphic Encryption Enabled Onion Routing. ICC 2019: 1-6 - [c62]Ali Alshehri, Pawel Marcinek, Abdulrahman Alzahrani, Hani Alshahrani, Huirong Fu:
PUREDroid: Permission Usage and Risk Estimation for Android Applications. ICISDM 2019: 179-184 - [c61]Abdulrahman Alzahrani, Hani Alshahrani, Ali Alshehri, Huirong Fu:
An Intelligent Behavior-Based Ransomware Detection System For Android Platform. TPS-ISA 2019: 28-35 - 2018
- [j30]Ye Zhu, Jonathan Gurary, George P. Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu, Junhua Tang:
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices. IEEE Access 6: 54795-54810 (2018) - [c60]Ali Alshehri, Hani Alshahrani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
DOPA: Detecting Open Ports in Android OS. CNS 2018: 1-2 - [c59]Abdelnasser Banihani, Abdulrahman Alzahrani, Raed Alharthi, Huirong Fu, George P. Corser:
T-PAAD: Trajectory Privacy Attack on Autonomous Driving. CNS 2018: 1-2 - [c58]Raed Alharthi, Abdelnasser Banihani, Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Huirong Fu, Anyi Liu, Ye Zhu:
Location Privacy Challenges in Spatial Crowdsourcing. EIT 2018: 564-569 - [c57]Anyi Liu, Huirong Fu:
Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics. EIT 2018: 589-594 - [c56]Rui Zhu, Huirong Fu, Tao Shu:
Information-Theoretic Security and Energy Efficiency for Information and Power Transfer in Two-Hop Wireless Relay Networks. EIT 2018: 877-881 - [c55]Abdulrahman Alzahrani, Ali Alshehri, Hani Alshahrani, Raed Alharthi, Huirong Fu, Anyi Liu, Ye Zhu:
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform. EIT 2018: 892-897 - [c54]Hani Alshahrani, Harrison Mansourt, Seaver Thorn, Ali Alshehri, Abdulrahman Alzahrani, Huirong Fu:
DDefender: Android application threat detection using static and dynamic analysis. ICCE 2018: 1-6 - [i1]Rui Zhu, Tao Shu, Huirong Fu:
Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures. CoRR abs/1810.00200 (2018) - 2017
- [c53]Richard Bassous, Huirong Fu, Ye Zhu:
Ambiguous Multi-symmetric Cryptography Proof of Concept and Experiments. BigDataSecurity/HPSC/IDS 2017: 231-236 - [c52]Abdulrahman Alzahrani, Ali Alqazzaz, Ye Zhu, Huirong Fu, Nabil Almashfi:
Web Application Security Tools Analysis. BigDataSecurity/HPSC/IDS 2017: 237-242 - [c51]George P. Corser, Abdelnasser Banihani, Johnathan Cox, Risalatul Hoque, Huirong Fu, Ye Zhu:
Location Privacy, Application Overhead and Congestion in VANET Location Based Services. BigDataSecurity/HPSC/IDS 2017: 243-248 - [c50]Ahmad Mansour, Andrew Davis, Matthew Wagner, Richard Bassous, Huirong Fu, Ye Zhu:
Multi-asymmetric cryptographic RSA scheme. CISRC 2017: 9:1-9:8 - [c49]Rui Zhu, Tao Shu, Huirong Fu:
Empirical statistical inference attack against PHY-layer key extraction in real environments. MILCOM 2017: 46-51 - 2016
- [j29]George P. Corser, Huirong Fu, Abdelnasser Banihani:
Evaluating Location Privacy in Vehicular Communications and Applications. IEEE Trans. Intell. Transp. Syst. 17(9): 2658-2667 (2016) - [c48]Jonathan Gurary, Ye Zhu, Nahed Alnahash, Huirong Fu:
Implicit Authentication for Mobile Devices Using Typing Behavior. HCI (20) 2016: 25-36 - [c47]George P. Corser, Alejandro Arenas, Huirong Fu:
Effect on vehicle safety of nonexistent or silenced basic safety messages. ICNC 2016: 1-5 - 2015
- [c46]Jiechen Yin, Yuming Mao, Supeng Leng, Xiang Wang, Huirong Fu:
QoE Provisioning by Random Access in Next-Generation Wireless Networks. GLOBECOM 2015: 1-7 - [c45]Richard Bassous, Roger Bassous, Huirong Fu, Ye Zhu:
Ambiguous Multi-Symmetric Cryptography. ICC 2015: 7394-7399 - [c44]Jonathan Gurary, Ye Zhu, George P. Corser, Jared Oluoch, Nahed Alnahash, Huirong Fu:
MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication. ITS 2015: 409-412 - 2014
- [j28]Caixing Shao, Supeng Leng, Yan Zhang, Huirong Fu:
A multi-priority supported medium access control in Vehicular Ad Hoc Networks. Comput. Commun. 39: 11-21 (2014) - [j27]Ye Zhu, Anil Vikram, Huirong Fu:
On Topology of Sensor Networks Deployed for Multitarget Tracking. IEEE Trans. Intell. Transp. Syst. 15(4): 1489-1498 (2014) - [j26]Ye Zhu, Anil Vikram, Huirong Fu, Yong Guan:
On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks. IEEE Trans. Wirel. Commun. 13(11): 6496-6510 (2014) - [c43]Kiran Penna, Venkatesh Yalavarthi, Huirong Fu, Ye Zhu:
Evaluation of active position detection in Vehicular Ad Hoc Networks. IJCNN 2014: 2234-2239 - [c42]George P. Corser, Huirong Fu, Tao Shu, Patrick D'Errico, Warren Ma, Supeng Leng, Ye Zhu:
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services. Intelligent Vehicles Symposium 2014: 1030-1036 - 2013
- [j25]Eralda Caushaj, Huirong Fu, Ishwar K. Sethi, Haissam Badih, Dion Watson, Ye Zhu, Supeng Leng:
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications. Int. J. Interdiscip. Telecommun. Netw. 5(2): 66-82 (2013) - [j24]George P. Corser, Suzan Arslanturk, Jared Oluoch, Huirong Fu, George E. Corser:
Knowing the Enemy at the Gates: Measuring Attacker Motivation. Int. J. Interdiscip. Telecommun. Netw. 5(2): 83-95 (2013) - [c41]George P. Corser, Huirong Fu, Tao Shu, Patrick D'Errico, Warren Ma:
Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks. ICCVE 2013: 369-374 - 2012
- [j23]Qing Wang, Supeng Leng, Huirong Fu, Yan Zhang:
An IEEE 802.11p-Based Multichannel MAC Scheme With Channel Coordination for Vehicular Ad Hoc Networks. IEEE Trans. Intell. Transp. Syst. 13(2): 449-458 (2012) - [c40]Jared Oluoch, Huirong Fu, Astrid Younang, Ye Zhu, Bao Tri-Tran:
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs). InfoSecCD 2012: 40-45 - [c39]Eralda Caushaj, Huirong Fu, Haissam Badih, Ishwar K. Sethi, Ye Zhu, Supeng Leng:
Attacks and countermeasures in wireless cellular networks. InfoSecCD 2012: 46-52 - [c38]Ye Zhu, Anil Vikram, Huirong Fu:
On tracking multiple indistinguishable targets. MASS 2012: 1-9 - [c37]Caixing Shao, Supeng Leng, Yan Zhang, Huirong Fu:
A multi-priority supported p-persistent MAC protocol for Vehicular Ad Hoc Networks. WCNC 2012: 2532-2537 - 2011
- [j22]Ye Zhu, Huirong Fu:
Traffic analysis attacks on Skype VoIP calls. Comput. Commun. 34(10): 1202-1212 (2011) - [j21]Ye Zhu, Yongjian Fu, Huirong Fu:
Preserving Privacy in Time Series Data Mining. Int. J. Data Warehous. Min. 7(4): 64-85 (2011) - [j20]Hesiri Weerasinghe, Raymond Tackett, Huirong Fu:
Verifying position and velocity for vehicular ad-hoc networks. Secur. Commun. Networks 4(7): 785-791 (2011) - [j19]Supeng Leng, Huirong Fu, Qing Wang, Yan Zhang:
Medium access control in vehicular ad hoc networks. Wirel. Commun. Mob. Comput. 11(7): 796-812 (2011) - [c36]Hesiri Weerasinghe, Huirong Fu, Supeng Leng, Ye Zhu:
Enhancing unlinkability in Vehicular Ad Hoc Networks. ISI 2011: 161-166 - [c35]Qing Wang, Supeng Leng, Yan Zhang, Huirong Fu:
A QoS Supported Multi-Channel MAC for Vehicular Ad Hoc Networks. VTC Spring 2011: 1-5 - [c34]Ye Zhu, Anil Vikram, Huirong Fu:
On Topology of Sensor Networks Deployed for Tracking. WASA 2011: 60-71 - 2010
- [j18]Ye Zhu, Yongjian Fu, Huirong Fu:
A new class of attacks on time series data mining\m{1}. Intell. Data Anal. 14(3): 405-418 (2010) - [j17]Ye Zhu, Yongjian Fu, Huirong Fu:
On privacy-preserving time series data classification. Int. J. Data Min. Model. Manag. 2(2): 117-136 (2010) - [j16]Yong-Zhong He, Zhen Han, Huirong Fu, Guangzhi Qu:
The Formal Model of DBMS Enforcing Multiple Security Polices. J. Softw. 5(5): 514-521 (2010) - [c33]Hesiri Weerasinghe, Huirong Fu, Supeng Leng:
Anonymous service access for Vehicular Ad hoc Networks. IAS 2010: 173-178 - [c32]Kyohong Jin, Hesiri Weerasinghe, Huirong Fu:
Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate. SpringSim 2010: 149
2000 – 2009
- 2009
- [c31]David Wampler, Huirong Fu, Ye Zhu:
Security Threats and Countermeasures for Intra-vehicle Networks. IAS 2009: 153-157 - [c30]Deepa Susan Rajan, Chetan Yeole, Harsha Nakade, Huirong Fu, Ye Zhu:
Position Verification in Multi-hop Vehicular Networks. IAS 2009: 580-584 - [c29]Yong-Zhong He, Zhen Han, Huirong Fu:
Usage Control in Conditional Access System with malicious Set-top Box. Security and Management 2009: 201-205 - [c28]Ke Liu, Supeng Leng, Huirong Fu, Longjiang Li:
A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks. DASC 2009: 373-378 - [c27]Hang Dok, Ruben Echevarria, Huirong Fu:
Privacy Issues for Vehicular Ad-Hoc Network. FGIT-FGCN 2009: 370-383 - [c26]Ye Zhu, Yuanchao Lu, Anil Vikram, Huirong Fu:
On Privacy of Skype VoIP Calls. GLOBECOM 2009: 1-6 - [c25]Ye Zhu, Yongjian Fu, Huirong Fu:
Preserving Privacy in Time Series Data Classification by Discretization. MLDM 2009: 53-67 - 2008
- [j15]Huirong Fu, Satoshi Kawamura, Ming Zhang, Liren Zhang:
Replication attack on random key pre-distribution schemes for wireless sensor networks. Comput. Commun. 31(4): 842-857 (2008) - [c24]Xidong Wang, Charlie Gladden, Huirong Fu:
Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management. Security and Management 2008: 415-421 - [c23]Rahat Qureshi, Min Chang, Hesiri Weerasinghe, Huirong Fu:
Intrusion Detection System for Wireless Sensor Networks. Security and Management 2008: 582-585 - [c22]Christopher Langley, Raul Lucas, Huirong Fu:
Key management in vehicular ad-hoc networks. EIT 2008: 223-226 - [c21]Todd Murray, Michael Cojocari, Huirong Fu:
Measuring the performance of IEEE 802.11p using ns-2 simulator for vehicular networks. EIT 2008: 498-503 - [c20]Sireesha Krupadanam, Huirong Fu:
Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains. GridNets 2008: 175-186 - [c19]Vikram Chilukoti, Doriel Josic, Hesiri Weerasinghe, Huirong Fu:
Modeling Attacks on Wireless Sensor Networks. ICWN 2008: 23-29 - [c18]Manjiri Joshi, Ramya Pulimati, Srikanth Edula, Hesiri Weerasinghe, Huirong Fu:
Robustness of Grid-based Deployment in Wireless Sensors Network. ICWN 2008: 135-141 - [c17]Ye Zhu, Yongjian Fu, Huirong Fu:
On Privacy in Time Series Data Mining. PAKDD 2008: 479-493 - 2007
- [j14]Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang:
Mobility analysis of mobile hosts with random walking in ad hoc networks. Comput. Networks 51(10): 2514-2528 (2007) - [j13]Supeng Leng, Liren Zhang, Huirong Fu, Jianjun Yang:
A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile Ad Hoc Networks. IEEE Trans. Veh. Technol. 56(2): 810-817 (2007) - [c16]Slobodan Dokic, Andrea Kulesh, Megha Dombal, Huirong Fu:
An Overview of Multi-modal Biometrics for Authentication. Security and Management 2007: 39-44 - [c15]Shoua Yang, Shanti Sukumaran, Dipali Yermalkar, Hesiri Weerasinghe, Huirong Fu:
Security and Privacy: Open Issues with RFID. Security and Management 2007: 192-197 - [c14]Hesiri Weerasinghe, Huirong Fu:
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation. FGCN (2) 2007: 362-367 - [c13]Sireesha Velagapalli, Huirong Fu:
Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain. FGCN (1) 2007: 528-534 - [c12]Jason D. Watson, Mark Pellerito, Charlie Gladden, Huirong Fu:
Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks. ICDCS Workshops 2007: 87 - 2006
- [j12]Huirong Fu, Ming Zhang:
Online adaptive firewall allocation in internet data center. Comput. Commun. 29(10): 1858-1867 (2006) - [j11]Huirong Fu:
On parameter estimation of a simple real-time flow aggregation model. Int. J. Commun. Syst. 19(7): 795-808 (2006) - [j10]Kumar V. Mangipudi, Rajendra S. Katti, Huirong Fu:
Authentication and Key Agreement Protocols Preserving Anonymity. Int. J. Netw. Secur. 3(3): 259-270 (2006) - [c11]Huirong Fu, Satoshi Kawamura, Chengzhi Li:
Blom-based Q-composite: A Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks. IROS 2006: 2022-2028 - 2005
- [c10]Huirong Fu, Vivek Goel, Elangovan Murugaiyan, Sudhan Shanmugasundaram, Liren Zhang:
Unified Solution to Registration, Authentication and Billing for Wireless Hotspots: Architecture and Protocols. ICWN 2005: 590-594 - [c9]Sanjay Ramaswamy, Huirong Fu, Kendall E. Nygard:
Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks. ICWN 2005: 595-604 - 2004
- [c8]Kumar V. Mangipudi, Nagaraja Malneedi, Rajendra S. Katti, Huirong Fu:
Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol. GLOBECOM 2004: 2229-2234 - [c7]Benzir Md Ahmed, Tanjina Helaly, Huirong Fu:
Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure. International Conference on Wireless Networks 2004: 210-218 - [c6]Satoshi Kawamura, Huirong Fu, Meegeum Choi, Shanhong Wu:
End-to-End Mobility Management: A Two-Phase Deployment Scheme for Personal Use. International Conference on Wireless Networks 2004: 286-301 - 2003
- [j9]Huirong Fu, Liren Zhang:
Low cost pre-stored video transmission across networks. Comput. Commun. 26(18): 2061-2069 (2003) - [j8]Huirong Fu, Liren Zhang:
Variable segmentation based on intrinsic video rate characteristics to transport pre-stored video across networks. Int. J. Commun. Syst. 16(10): 923-934 (2003) - [j7]Huirong Fu, Edward W. Knightly:
A simple model of real-time flow aggregation. IEEE/ACM Trans. Netw. 11(3): 422-435 (2003) - [c5]Guangyuan Sun, Huirong Fu:
Recent Advances on Intrusion Detection Techniques. CAINE 2003: 83-86 - [c4]Huirong Fu, Liren Zhang:
Video Segmentation for Transporting Pre-Stored Video across Networks. CAINE 2003: 221-224 - [c3]Sanjay Ramaswamy, Huirong Fu, Manohar Sreekantaradhya, John Dixon, Kendall E. Nygard:
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks. International Conference on Wireless Networks 2003: 570-575 - 2001
- [j6]Liren Zhang, Huirong Fu:
Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks. Comput. Commun. 24(11): 1019-1030 (2001) - [j5]Liren Zhang, Huirong Fu:
Adaptive bandwidth allocation based on playback tunnel to support video on demand service over ATM networks. Comput. Commun. 24(15-16): 1485-1496 (2001) - [j4]Liren Zhang, Huirong Fu, Chee Hock Ng:
Dynamic bandwidth allocation and buffer dimensioning under equal segment scheme to support video-on-demand services. Int. J. Commun. Syst. 14(10): 941-960 (2001) - [c2]Huirong Fu, Edward W. Knightly:
Aggregation and Scalable QoS: A Performance Study. IWQoS 2001: 307-324 - 2000
- [j3]Liren Zhang, Huirong Fu:
A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services. Comput. Commun. 23(2): 133-148 (2000) - [j2]Liren Zhang, Huirong Fu:
Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks. Comput. Commun. 23(14-15): 1410-1424 (2000)
1990 – 1999
- 1999
- [j1]Chee Hock Ng, Lihua Yuan, Huirong Fu, Liren Zhang:
Methodology for traffic modeling using two-state Markov-modulated Bernoulli process. Comput. Commun. 22(13): 1266-1273 (1999) - [c1]Huirong Fu, Liren Zhang, Chee Hock Ng, K. R. Subramanian:
A novel scheme of transporting pre-stored MPEG video in ATM networks. ICON 1999: 398-405
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-07-08 22:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint