[Publications: by Research Areas, Publication Category, Publishing Years]

[Research Projects]

[Testbed and Implementations]
snac

google scholar  Click here

[Computer Networking and Security][Identity and Attribute Based Cryptography, and Applications][Mobile and Cloud Computing][Education and Learning][Behavior Biometrics][Others]

Computer Networking And Security [top]

 SDN/NFV and Cloud Networking Security
  1. Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong Kang, Anya Kim, and Alexander Velazquez, "SDNSOC: Object Oriented SDN Framework", In proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSec"19), 2019.
  2. Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong Kang, Anya Kim, and Alexander Velazquez, "TRUFL: Distributed Trust Management framework in SDN", IEEE ICC 2019.
  3. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, "SUPC: SDN enabled Universal Policy Checking in Cloud Network", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
  4. Ankur Chowdhary and Dijiang Huang, "SDN based Network Function Parallelism in Cloud", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019.
  5. Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, "Software-Defined Networking And Security: From Thoery to Practice", CRC Press, expected publishing date: fall of 2018.
  6. Safaa Mahrach, Iman EL MIR, Abdelkrim HAQIQ,  Dijiang Huang, "SDN-based SYN Flooding Defense in Cloud",  Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 30-39, 2018.
  7. Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, "Fault Tolerant Controller Placement in Distributed SDN Environments", in Proceedings of IEEE ICC Communications QoS, Reliability, and Modeling Symposium, 2018.
  8. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq. "Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
  9. Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukhwa Kyung, Dijiang Huang, and Gail-Joon Ahn, "Science DMZ: SDN based Secured Cloud Testbed", Demo, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017.
  10. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, and Dijiang Huang, "A Defense System for Defeating DDoS Attacks in SDN based Networks", in Proceedings of International Symposium on Mobility Management and Wireless Access (MobiWac), 2017
  11. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq, ""Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", M17-251P, filed 6/5/2017
  12. Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, "Scalable Attack Graph Partitioning Scheme", M17-253P, filed 6/6/2017
  13. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang "Countermeasure Selections for Moving Target Defense", M17-252P, filed 6/6/2017
  14. Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, and Dijiang Huang, "Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments", IEEE Transactions on Dependable and Secure Computing, July, 2017.
  15. Sandeep Pishoardy, Dijiang Huang, and Ankur Chowdhary, "Security Policy Checking for Distributed Software Defined Networking (SDN)", Provisional patent application # D10-103, filled 7/17/2016.
  16. Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, "Security Policy Checking in Distributed SDN based Clouds", in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
  17. Yan Zhu, Guohua Gan, Dijiang Huang, "PHE: An Efficient Tracing and Revoking for Traitors in Cloud File Syncing-and-Sharing", IEEE Transactions on Cloud Computing, May 2016.
  18. Tianyi Xing, Zhenyang Xiong, Dijiang Huang, Deep Medhi, "Cloud Computing Security", Cloud Services, Networking and Management, (Eds) N. Fonseca and R. Boutaba, Book Chapter, IEEE and Wiley, 2014.
  19. Tianyi Xing, Zhengyang Xiong, Dijiang Huang, and Deep Medhi, "SDNIPS: Enabling the Software Defined Network Based Intrusion Prevention System in Clouds", (poster) in Proceedings of 10th International Conference on Network and Service Management (CNSM), 2014.
  20. Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, and Ikuo Oka, "Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks", In Proceedings of IEEE/IFIP NOMS, 2014
  21. Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar, "SnortFlow: A OpenFlow-based Intrusion Prevention System in Cloud Environment", in Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013), 2013.
  22. Dijiang Huang, "Enhancing Cloud Security Through Software Defined Networking Approaches", Tutorial, IEEE International Conference on Cloud Networking (CloudNet) 2012, Paris, Nov 2012 (Abstract)
  23. Dijiang Huang, "Enhancing Cloud Security Through Software Defined Networking Approaches",  Tutorial, International Conference on Network and Service Management (CNSM) 2012, Las Vegas, Oct 2012 (Abstract)
Moving Target Defense (MTD)
  1. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, "General Sum Markov Games for Strategic Detection of Advanced Persistent Threats using Moving Target Defense in Cloud Networks", in Proceedings of the Conference on Conference on Decision and Game Theory for Security (GameSec), 2019
  2. Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, and Subbarao Kambhampati, "Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks", in Proceedings of the AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS), 2019
  3. Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, and Abdulhakim Sabur, "Adaptive MTD Security using Markov Game Modeling", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
  4. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, "Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud", in Proceedings of the Conference on Conference on Decision and Game Theory for Security (GameSec), 2018.
  5. Dijiang Huang, "Moving Target Defense (MTD): A Software Defined Networking (SDN) Approach", IEEE International Conference on Communications (ICC), Kansas City, 2018 (Abstract)
  6. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, "MTD Analysis and evaluation framework in Software Defined Network (MASON)", in Proceedings of the ACM SDN/NFV Security Workshop, 2018 (Invited)
  7. Abdullah Alshalan and Dijiang Huang, "Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers", in Proceedings of IEEE ICC Communication and Information Systems Security Symposium, 2018.
  8. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang, "Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments", in Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec"17), 2017 (Invited Paper).
  9. Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim and Abdelkrim Haqiq, "Software Defined Stochastic Model for Moving Target Defense", in Proceedings of Third International Afro-European Conference for Industrial Advancement (AECIA), 2016.
  10. Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang "SDN based scalable MTD solution in Cloud Network", in Proceedings of the ACM Moving Target Defense (MTD) Workshop, in conjunction with ACM CCS, 2016.

Security Protocols, Architectures, and Defense
  1. Ankur Chowdhary, Dijiang Huang, Abdulhakim Sabur, Neha Vadnere, Myong Kang and Bruce Montrose, "SDN-based Moving Target Defense using Multi-agent Reinforcement Learning", in proceedings of the first International Conference on Autonomous Intelligent Cyber-defence Agents (AICA), France, March 2021
  2. Sowmya Myneni, Ankur Chowdhary, Abdulhakim Sabur, Sailik Sengupta, Garima Agrawal, Dijiang Huang, and Myong Kang, "DAPT 2020 - Constructing a Benchmark Dataset for Advanced Persistent Threats", in proceedings of the First International Workshop on Deployable Machine Learning for Security Defense (MLHat), in conjunction with ACM KDD, 2020.
  3. Abdulhakim Sabur,  Ankur Chowdhary,  Dijiang Huang,  Myong Kang,  Anya Kim, and Alexander Velazquez, "S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks", in Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID),  2019.
  4. Adel Alshamrani, Ankur Chowdhary, Dijiang Huang, Sowmya Myneni, and Qussama Mjihil, "Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation", in proceedings of IEEE Globalcom, Communication Information and System Security (CISS) Symposium, 2018.
  5. Mirza M. S. Maswood, Md M. I. Mamun, Dijiang Huang, and Deep Medhi, "A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment", in proceedings of 39th Sarnoof Symposium, 2018
  6. J. Aikat (RENCI/UNC Chapel Hill), I. Baldin (RENCI/UNC Chapel Hill), M. Berman (BBN/Raytheon), J. Breen (Utah), R. rooks (Clemson), P. Calyam (Missouri), J. Chase (Duke), W. Chase (Clemson), R. Clark (Georgia Tech), C. Elliott (BBN/Raytheon), J. Griffioen (Kentucky), D. Huang (ASU), J. Ibarra (FIU), T. Lehman (Maryland), I. Monga (ESnet), A. Matta (Boston University), C. Papadopoulos (Colorado State), M. Reiter (UNC Chapel Hill), D. Raychaudhuri (Rutgers), G. Ricart (US Ignite), R. Ricci (Utah), P. Ruth (RENCI/UNC Chapel Hill), I. Seskar (Rutgers), J. Sobieski (NORDUnet/GEANT), K. Van der Merwe (Utah), K.-C.Wang (Clemson), T. Wolf (UMass), and M. Zink (UMass), "The Future of CISE Distributed Research Infrastructure", Position white paper (https://arxiv.org/abs/1803.09886) for NSF and currently is under review of ACM Computer Communication Review (CCR), 2017.
  7. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, "Advanced Persistent Threats Detection Through Combining Dynamic and Static Attack", M17-252P, filed 6/6/2017
  8. Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, and Dijiang Huang, "A Survey on the Usability and Practical Applications of Graphical Security Models", Computer Science Review, Elsevier, Jun 2017
  9. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "Selection of a countermeasure" (Based on our original work "Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems"), U.S. Patent NO. 9,160,761, Issue date: October 13, 2015.
  10. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, "A Survey of Mobile VPN Technologies", IEEE Communications Surveys and Tutorials, Vol PP, Issue 99, November 2015
  11. Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi, "SeRViTR: A Framework, Implementation, and a Testbed for a Trustworthy Future Internet", Computer Networks, Vol 63, No. 22, April 2014.
  12. Yang Qin, Dijiang Huang, and Bing Li, "STARS: A Statistical Traffic Pattern Discovery System for MANETs", IEEE Transactions on Dependable and Secure Computing (TDSC), Vol 11, Issue 2, pages 181-192, March-April, 2014.
  13. Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang and Ikuo Oka, "A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network", In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management, poster, IM"2013.
  14. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment, Vol. 10 NO. 4, pages 198-211, July-Aug 2013.
  15. Chun-Jen Chun, Jingsong Cui, Pankaj Khatkar, and Dijiang Huang. "Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations", Collaboratecom 2013.
  16. Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, and Deep Medhi, "Constructing Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE), ICC Workshop on the Network of the Future Internet, 2012.
  17. Vijayakrishnan Nagarajan, Dijiang Huang, "Secure Web Referral Service", in Proceedings of the International Conference on Information Networking (ICOIN), 2012.
  18. Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, "SeRViTR: A Framework for Trust and Policy Management for A Secure Internet and Its Proof-of-Concept Implementation", the 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI), 2012
  19. Nirav Shah and Dijiang Huang, "DRP: Data Regulation Protocol for Source-End Mitgation of Distributed Denial of Service"
    Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed (Eds), Book Chapter, IGI Global, 2010
  20. Dijiang Huang and Vinayak Kandiah, "Low-latency Mix using Split and Merge Operations," The third special issue on Security and Management, Springer Journal of Network and Systems Management (JNSM), Volume 18, Number 3, Pages 244-264, September, 2010.
  21. Dijiang Huang, "Anonymous Certification Services," In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  22. Dijiang Huang and Vetri Arasan, "On Measuring Email-based Social Network Trust," In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  23. Dijiang Huang, Shingo Ata, and Deep Medhi, "Establishing Secure Virtual Trust Routing And Provisioning Domains For Future Internet," In Proceedings of the Next Generation Networking Symposium, IEEE Globecom 2010.
  24. Dijiang Huang, Vetri Arasan, "Email-based Social Network Trust," In Proceedings of the Symposium on Social Intelligence and Networking (SIN), SocialCom, pages 363-370, 2010
  25. Dijiang Huang and Utkarsh Agarwal, "Countering Repacketization Watermarking Attacks on Tor Network", In proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2010.
  26. Vijayakrishnan Nagaraja, Vetri Arasan, and Dijiang Huang, "Using Power Hopping to Counter MAC Spoof Attacks in WLAN", In Proceedings of IEEE CCNC, 2010
  27. Sushma Myneni and Dijiang Huang, "IEEE 802.11 Wireless LAN Control Frame Protection", In Proceedings of IEEE CCNC, 2010.
  28. Dijiang Huang, "Unlinkability Measure for IEEE 802.11 based MANETs", IEEE Transactions on Wireless Communications, Vol. 7, NO. 2, Pages 1025-1034, Feb 2008.
  29. Dijiang Huang, Deep Medhi, "A Secure Group Key Management Scheme for Hierarchical Mobile Ad-hoc Networks," Ad Hoc Networks Journal, Vol. 6 NO. 4, Pages 560-577, Feb, 2008.
  30. Vinayak Kandiah, Dijiang Huang, and Harsh Kapoor, "C-Mix: A lightweight Anonymous Routing Approach", Information Hiding (IH), Lecture Notes in Computer Science, vol. 5284 LNCS, pages 294-308, 2008.
  31. Dijiang Huang, Mayank Verma, and Vinayak Kandiah,  "Privacy Preservation Services: Challenges and Solutions", Accepted by ACM Symposium of Applied Computing (SAC), Computer Security Track, pages 2110-2115, 2008.
  32. Dijiang Huang, Mayank Verma, Archana Ramachandran, and Zhibin Zhou, "A Distributed ePedigree Architecture," in Proceedings of the 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2007), pages 220-227, Mar. 2007.
  33. Deep Medhi and Dijiang Huang, "Secure and Resilient Routing: A Framework for Resilient Network Architectures", Information Assurance: Dependability and Security in Networked Systems, Y. Qian, D. Tipper, P.Krishnamurthy, and J. Joshi, (Eds.), Morgan Kaufmann Publisher, Book Chapter, 2007.
  34. Dijiang Huang, Manish Mehta, Appie van de Liefvoort, and Deep Medhi, "Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks," IEEE/ACM Transactions on Networking, Vol 15, Issue 5, Pages 1204-1215, Oct. 2007.
  35. Dijiang Huang, Qing Cao, Amit Sinha, Marc Schniederjans, Cory Beard, Lein Harn, and Deep Medhi, "New architecture for Intra-domain network security issues," Communications of the ACM, Vol 49, Issue 11, Pages: 64 - 72, Nov. 2006.
  36. Dijiang Huang, Amit Sinha, and Deep Medhi, "On Providing Confidentiality in Link State Routing Protocol," in Proceedings of the IEEE Consumer Communications and Networking Conference, pages 671-675, Jan. 2006.
  37. Gaurav Agrawal, Dijiang Huang, and Deep Medhi, "Network Protection Design for Reliable MPLS Networks," in Proceedings of the 5th International Workshop on Design of Reliable Communication Networks (DRCN), pages, 481-486, Oct. 2005.
  38. Dijiang Huang, Amit Sinha, and Deep Medhi, "A Key Distribution Scheme for Double Authentication in Link State Routing Protocol," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 19 - 24., Apr. 2005.
  39. Dijiang Huang and Deep Medhi, "A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication," ACM Transactions on information and System Security (TISSEC), Vol 7, NO. 4, Pages 523-552, Nov. 2004.
  40. Dijiang Huang and Qing Cao, "Constructing Realistic Mobility Model: A New Framework," Presented in the 35th Annual Meeting of the Decision Sciences institute (DSI), Nov. 2004. Boston, Massachusetts.
  41. Dijiang Huang, Deep Medhi, Cory Beard, and Lein Harn "Trust Analysis of Link State Network Routing", in Proceedings of the 2nd International Workshop on Trusted internet (TIW), Hyderabad, India, December 17, 2003.
  42. Dijiang Huang, Amit Sinha, and Deep Medhi, "A Double Authentication Scheme to Detect Impersonation Attack in Link State Routing Protocols," in Proceedings of the IEEE International Conference on Communications (ICC), pages 1723 - 1727, Vol. 3, May. 2003.
  43. Dijiang Huang, "Secure Link State Routing Protocol: A Framework,"
    In the Doctoral Symposium, International Conference on Distributed Computing System (ICDCS), Providence, RI, May 19-22, 2003. 
IoT, Mobiles, and Sensor Network Security
  1. Zhijie Wang and Dijiang Huang, "Privacy-Preserving Mobile Crowd Sensing in Ad Hoc Networks",  Elsevier Ad Hoc Networks, Pages 14-26, Volume 73, NO. 1, May 2018.
    Bo Li, Yijian Pei, Hao Wu, Dijiang Huang, "MADM-based smart parking guidance algorithm", PLOS one, Issue 12, NO. 12, 2017.
  2. Duo Lu, Dijiang Huang, Andrew Walenstein, and Deep Medhi, "A Secure Microservice Framework for IoT", in Proceedings of IEEE Service Oriented Software Engineering (SOSE), 2017 (Invited Paper).
  3. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, "MobiVPN: A Mobile VPN Providing Persistency To Applications", in Proceedings of 2016 International Conference on Computing, Networking and Communications, Wireless Networks (ICNC), 2016.
  4. Alexey Vinel, Xiaomin Ma, and Dijiang Huang, "Reliable and Secure VANETs [Guest Editorial]", IEEE Transactions on Dependable and Secure Computing, Vol. 13, NO. 1, 2015.
  5. Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim, "Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Achieved in Algorithms and Architectures for Parallel Processing, Volume 9532, Lecture Notes in Computer Science, Pages 582-592, December, 2015.
  6. Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, and Kishor Trivedi, "SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-Tenant Datacenter Environment", in Proceedings of the Workshop on Dependability Issues on SDN and NFV (DISN), 2015
  7. Bing Li, Dijiang Huang, and Zhijie Wang, "Refining Traffic Information for Analysis using Evidence Theory", in Proceedings of Milcom, 2014.
  8. Bing Li and Dijiang Huang, "Modeling Anonymous MANET Communications Using Super-nodes", in Proceedings of Milcom, 2013.
  9. Dijiang Huang, Wei-Tek Tsai, Yi-hsin Tseng, "Policy Management for Secure Data Access Control in Vehicular Networks," Springer Journal of Network and Systems Management (JNSM), Vol. 19, No. 4, pages 448-471, 2011
  10. Dijiang Huang, Xiaoyan Hong, and Mario Gerla, "Situation-Aware Trust Architecture for Vehicular Networks", IEEE Communications Magazine, Volume 48, No. 11, Pages 128-135, 2010
  11. Dijiang Huang and Zhibin Zhou, "A Secure RFID Access Control Mechanism", Security in RFID and Sensor Networks, Y. Zhang, P. Kitsos (Eds), Auerbach Publications, Book Chapter,  CRC Press, Taylor and Francis Group, 2008
  12. Dijiang Huang, "Secure Multi-path Data Delivery in Wireless Sensor Networks", Wireless and Sensor Networks Security, Z. Jiang, Y. Pan (Eds), Nova Science Publishers, Inc. Book Chapter, Fall, 2008.
  13. Zhibin Zhou and Dijiang Huang, "Computing Cryptographic Pairing in Sensors"
    ACM SIGBED Review, Special Issue on the RTSS Forum on Deeply Embedded Real-Time Computing, Vol. 5, NO. 1, Jan, 2008.
  14. Dijiang Huang and Deep Medhi, "Secure Pairwise Key Establishment in Large-scale Sensor Networks: an Area Partitioning and Multi-group Key Predistribution Approach," ACM Transactions on Sensor Networks, Vol 3, Issue 3, No. 16, Aug. 2007.
  15. Dijiang Huang, "Secure Multi-path Data Delivery in Sensor Networks," In Proceedings of Milcom, 2009.
     Mukesh Jagasia and Dijiang Huang, "Distributed Data-theft Detection in Wireless Sensor Networks", In Proceedings of IEEE Globecom, AHSN, 2009.
  16. Harsh Kapoor and Dijiang Huang, "Secret-sharing based secure communication protocols for passive RFIDs", In Proceedings of IEEE Globecom, CISS, 2009.
  17. Dijiang Huang and Harsh Kapoor, "Towards lightweight secure communication protocols for passive RFIDs", In Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) , pages 1-7, 2009.
  18. Satyajayant Misra, Mayank Verma, Dijiang Huang, Guoliang Xue, "SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID tags", In Proceedings of  IEEE ICC Wireless Networking, pages 1-6,2009.
  19. Mayank Verma and Dijiang Huang, "SeGCom: Secure Group Communication in VANETs", Accepted to appear at IEEE Intelligent Vehicular Communications System (ICVS), 2009.
  20. Zhibin Zhou and Dijiang Huang, "SRK: A Distributed RFID Data Access Control Mechanism" in proceedings of the IEEE International Conference on Communications (ICC) , pages 2854-2858, 2008.
  21. Zhibin Zhou and Dijiang Huang, "RFID Keeper: An RFID Data Access Control Mechanism," In Proceedings of IEEE Globecom, pages 4570-4574, 2007.
  22. Archana Ramachandran, Zhibin Zhou, and Dijiang Huang, "Computing Cryptographic Algorithms in Portable and Embedded Devices," In Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7,2007.
  23. Dijiang Huang and Hao Li, "Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices," in Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium, pages 53-56, Apr. 2006.
  24. Dijiang Huang and Hao Li, "Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices", in Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium, pages 53-56, 2006.
  25. Dijiang Huang and Deep Medhi, "A Byzantine Resilient Multi-path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks," in Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN, in conjunction with IPDPS), pages 240b, Apr. 2005.
  26. Dijiang Huang, Manish Mehta, and Deep Medhi, "Source Routing Based Pairwise Key Establishment Protocol for Sensor Networks," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 177 - 183. Apr. 2005.
  27. Manish Mehta, Dijiang Huang, and Lein Harn, "RINK-RKP: A Scheme for Key Predistribution and Shared-Key Discovery in Sensor Networks," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 193-197, Apr. 2005.
  28. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn, "Location-aware Key Management Scheme for Wireless Sensor Networks," in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN "04, in conjunction with ACM CCS2004), pages 29-42, Oct. 2004.

Identity and Attribute Based Cryptography, and Applications [top]

Identity and Attribute Based Cryptography

  1. Dijiang Huang, Qiuxiang Dong, and Yan Zhu, "Attribute-Based Encryption: From Theory To Practice", working-in-progress, CRC Press, expected publishing date: first quarter of 2019.
  2. Qiuxiang Dong,Dijiang Huang, Jim Luo, Myong Kang, "Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data", in proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC), in conjunction with IEEE CNS, 2018
  3. Jim Luo, Qiuxiang Dong, Dijiang Huang, and Myong Kang, "Attribute Based Encryption for Information Sharing on Tactical Mobile Networks", IEEE Milcom 2018.
  4. Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang, "IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication", https://eprint.iacr.org/2017/1100, 2017
  5. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang, "HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing", https://eprint.iacr.org/2017/1101, 2017
  6. Q Dong, D Huang, J Luo, M Kang, "ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption", https://eprint.iacr.org/2017/1102, 2017
  7. Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 9,705,850, Issued on July 11, 2017.
  8. Qiuxiang Dong and Dijiang Huang, "Privacy-preserving Matchmaking in Geosocial Networks with Untrusted Servers", in Proceedings of the 37th IEEE International Conference on Distributed Computing systems (ICDCS), Poster, 2017.
  9. Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, and Chun-Jen Chung, "Efficient Attribute-Based Comparable Data Access Control", IEEE Transactions on Computers, Vol 64, Issue 12, Pages 3430-3443, February 2015.
  10. Yan Zhu, Dijiang Huang, Xin Wang, and Changjun Hu, "From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services", IEEE Transactions on Service Computing, Vol 8, Issue 4, pages 601-616, August 2015
  11. Zhibin Zhou, Dijiang Huang, and Zhijie Wang, "Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", IEEE Transactions on Computers, Vol 64, Issue 1, pages 126-138, January, 2015.
  12. Dijiang Huang and Zhibin Zhou, "Methods, Systems, and Apparatuses for Optimal Group Key Management for Secure Multicast Communication", U.S. Patent NO. 8,837,738, Issue date: September 16, 2014.
  13. Yan Zhu, Di Ma, Changjun Hu, and Dijiang Huang, "How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud", in Proceedings of the International Workshop on Security in Cloud Computing, in conjunction with ASIACCS, 2013.
  14. Zhibin Zhou and Dijiang Huang, "Gradual Identity Exposure Using Attribute-Based Encryption", International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 2/3, 2012.
  15. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shanbiao Wang, "Towards Temporal Access Control in Cloud Computing", in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM), mini conference, 2012.
  16. Zhibin Zhou and Dijiang Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", https://eprint.iacr.org/2011/185, 2011
  17. Zhibin Zhou and Dijiang Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", https://eprint.iacr.org/2010/395, 2010
  18. Zhibin Zhou and Dijiang Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", Poster, 17th ACM Conference on Computer and Communications Security (CCS), 2010.
  19. Dijiang Huang, Zhibin Zhou, Yan Zhu, "Gradual Identity Exposure Using Attribute-Based Encryption," In Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 881-888, 2010.
  20. Zhibin Zhou and Dijiang Huang, "Constructing Efficient Attribute-Based Broadcast Encryption", In Proceedings of IEEE Conference on Computer Communications (Infocom, poster) 2010.
  21. Zhibin Zhou and Dijiang Huang, "An Optimal Key Distribution Scheme for Multicast Group Communication," In Proceedings of IEEE Conference on Computer Communications (Infocom, mini conference), 2010.
  22. Zhibin Zhou and Dijiang Huang, "Optimal Multicast Group Communication", https://eprint.iacr.org/2009/010, 2009
  23. Hao Li, Jian Huang, Philip Sweany, and Dijiang Huang, "FPGA Implementations of Elliptic Curve Cryptography and Tate Pairing over a Binary Field",  Journal of Systems Architecture (an Elsevier journal), Vol 54, Issue 12, Pages 1077-1088, Dec 2008.
  24. Dijiang Huang, "Elliptic Curve Cryptography (ECC) and Pairing Based Cryptography (PBC) and Applications", Tutorial, Communication, Network, and Information Security, UC Berkeley, 2007.
  25. Dijiang Huang, "An Identity-Based Blind Key Generation and Signature Scheme", in Proceedings of the Conference on information Security and Cryptology (CISC), pages 65-73, Dec. 2005.
Identity and Attribute-Based Encryption and Applications
  1. Bing Li, Dijiang Huang, Zhijie Wang, and Yan Zhu, "Attribute-based Access Control for ICN Naming Scheme", IEEE Transactions on Dependable and Secure Computing, April 2016
  2. Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, and Yan Zhu, "Attribute-based Access Control for ICN Naming Scheme", in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2014.
  3. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, "Towards Distributed Privacy-Preserving Mobile Access Control", in Proceedings of the IEEE Globecom 2014
  4. Bing Li, Zhijie Wang, and Dijiang Huang, "An Efficient and Anonymous Attribute-Based Group Setup Scheme", in Proceedings of the IEEE Globecom, 2013.
  5. Zhibin Zhou and Dijiang Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", In Proceedings of the 8th International Conference on Network and Service Management (CNSM), 2012
  6. Dijiang Huang, Satyajayant Misra, Guoliang Xue, and Mayank Verma, "PACP: An Efficient Pseudonymous Authentication Based Conditional Privacy Protocol for VANETs", IEEE Transactions on Intelligent Transportations, Vol 12, Issue 3, pages 736-746, Sep., 2011
  7. Nanxi Chen, Mario Gerla, Dijiang Huang, and Xiaoyan Hong, "Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption", In Proceedings of The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2010.
  8. Dijiang Huang and Mayank Verma, "ASPE: Attribute Based Secure Policy Enforcement for Data Access Control in Vehicular Ad Hoc Networks", Ad Hoc Networks Journal (Special Issue of Privacy & Security in WSNs), Vol 7, Issue 8, pages 1526-1535, 2009.
  9. Dijiang Huang, "Pseudonym-Based Cryptography for Anonymous Communications in Mobile Ad-hoc Networks," Special Issue on Cryptography in Networks, int. J. Security and Networks, Vol. 2, NOs. 3/4, pages 272-283, 2007.
Blockchain and Application
  1. Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Lou, Myong Kang, "Building Private Blockchains over Public Blockchains (PoP): An Attribute-Based Access Control Approach", in Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC), DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies, 2019.

Mobile and Cloud Computing [top]

Mobile Cloud Computing and Networking
  1. Dijiang Huang and Huijun Wu, "Mobile Cloud Computing: Foundations and Service Models", Morgan Kaufmann Publishers (An imprint of Elsevier Science), Publishing date: September 22, 2017.
    Amazon: https://www.amazon.com/Mobile-Cloud-Computing-Foundations-Service/dp/0128096411
    Elsevier: https://www.elsevier.com/books/mobile-cloud-computing/huang/978-0-12-809641-3
  2. Dijiang Huang, "Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication", U.S. Patent NO. 9,357,331, Issued on May 31, 2016.
  3. Huijun Wu, Dijiang Huang, and Yan Zhu, "Establishing a personal on-demand execution environment for mobile cloud applications," Springer Journal on Mobile Networks and Applications (MONET), Volume 20, Number 3, pp. 297307, June, 2015.
  4. Xiaoming Fu, Stefano Secci, Dijiang Huang, and Rittwik Jana, "Mobile Cloud Computing [Guest Editorial]", IEEE Communications Magazine, Volume 53, Number 3, Pages 61-62, 2015.
  5. Huijun Wu and Dijiang Huang,  "POEM: On Establishing A Personal On-demand Execution Environment for Mobile Cloud Applications" in Proceedings of the IEEE 4th  International Conference on Mobile Services (IEEE MS), pages 41-48, 2015
    Huijun Wu and Dijiang Huang, "MoSeC: Mobile-Cloud Service Composition",  in Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015
  6. Huijun Wu and Dijiang Huang, "Modeling Multi-factor Multi-site Risk-based Offloading for Mobile Cloud Computing", in Proceedings of the 10th International Conference on Network and Service Management (CNSM), 2014.
  7. Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng and Yan Liu, "Adaptive Computing Resource Allocation for Mobile Cloud Computing", International Journal of Distributed Sensor Networks, Vol 2013, 2013.
  8. Dijiang Huang, Tianyi Xing, and Huijun Wu, "Mobile Cloud Computing Service Models: A User-Centric Approach", IEEE networks, Vol 27, Issue 5, Pages 6-11, Sep-Oct, 2013.
  9. Huijun Wu, Dijiang Huang, and Samia Bouzefrane, "Making Offloading Decisions Resistant to Network Unavailability for Mobile Cloud Collaboration", Collaboratecom 2013.
  10. Le Xu, Li Li, Vijayakrishnan Nagarajan, Dijiang Huang, and Wei-Tek Tsai, 
Secure Web Referral Services for Mobile Cloud Computing
IEEE International Symposium on Mobile Cloud, Computing, and Service Engineering (IEEE MobileCloud), 2013. (invited)
  11. Li Li, Dijiang Huang, Zhidong Shen, and Samia Bouzefrane, "A Cloud based Dual-Root Trust Model for Secure Mobile Online Transactions", in Proceedings of IEEE WCNC 2013.
  12. Fatiha Houacine, Samia Bouzefrane, Li Li and Dijiang Huang, "MCC-OSGi: A OSGi-based Mobile Cloud Service Model", In Proceedings of the Eleventh International Symposium on Autonomous Decentralized Systems, (ISADS) 2013.
  13. Dijiang Huang, "Mobile Cloud Computing", Tutorial, IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 2012 (Abstract)
  14. Hongbin Liang, Lin X. Cai, Dijiang Huang, Xuemin (Sherman) Shen, and Daiyuan Peng, "An SMDP-based Service Model for Inter-domain Resource Allocation in Mobile Cloud Networks", IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pages 2222-2232, June 2012.
  15. Tianyi Xing, Dijiang Huang, Deep Medhi, Shingo Ata, "MobiCloud: a Geo-distributed Mobile Cloud Computing Platform", In Proceedings of the 8th International Conference on Network and Service Management (CNSM), short paper, 2012.
    Tianyi Xing, Hongbin Liang, Dijiang Huang, and Lin X. Cai "Geographic-based Service Request Scheduling Model for Mobile Cloud Computing", In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  16. Samia Bouzefrane, Pierre Paradinas, and Dijiang Huang, "An OSGi-based Service Oriented Architecture for Android Platforms", in Proceedings of the 23rd International Conference on Software & Systems Engineering and their Applications (ICSSEA), 2011.
  17. Dijiang Huang, "Mobile Cloud Computing", E-Letter of Multimedia Communications Technical Committee (MMTC), IEEE Communications Society, 2011. (invited paper)
  18. Dijiang Huang, Zhibin Zhou, Le Xu, Tianyi Xing, and Yunji Zhong, "Secure Data Processing Framework for Mobile Cloud Computing", In Proceedings of IEEE INFOCOM"s Workshop on Cloud Computing, 2011.
  19. Hongbin Liang, Dijiang Huang, Lin X. Cai, Xuemin (Sherman) Shen, Daiyuan Peng, "Resource Allocation for Security Services in Mobile Cloud Computing", In Proceedings of the IEEE INFOCOM"s Workshop on Machine-to-Machine Communications and Networking (M2MCN), 2011
  20. Hongbin Liang, Dijiang Huang, Daiyuan Peng, "On Economic Mobile Cloud Computing Model", in Proceedings of the International Workshop on Mobile Computing and Clouds (MobiCloud in conjunction with MobiCASE), (invited paper), 2010.
  21. Dijiang Huang, Xiwen Zhang, Myong Kang, and Jim Luo "MobiCloud: A Secure Mobile Cloud Framework for Pervasive Mobile Computing And Communication,"  In Proceedings of the 5th IEEE International Symposium on Service-Oriented System Engineering (SOSE), pages 27-34, 2010. (invited paper)
Mobile Ad Hoc Networks
  1. Jiayue Li, Tracy Cheng, Xiaohua Jia, and Dijiang Huang, "Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks", IEEE WCNC 2019.
  2. Lu, Duo and Li, Zhichao and Huang, Dijiang, "Platooning as a service of autonomous vehicles", in Proceedings of IEEE 18th International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2017
  3. Zhiyuan Ma, Guangchun Luo, and Dijiang Huang, "Short Term Traffic Flow Prediction Based on On-line Sequential Extreme Learning Machine", in proceedings of International Conference on Advanced Computational Intelligence, 2016
  4. Duo Lu, Zhichao Li, and Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, and Bing Li, "VC-bots: A Vehicular Cloud Computing Testbed with Mobile Robots", in Proceedings of ACM MobiHoc Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
  5. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, Ailixier Aikebaier, and  Yuuichi Teranishi, "QoS-Constrained Sensing Task Assignment for Mobile Crowd Sensing", in Proceedings of the IEEE Globecom 2014.
  6. Yang Qin, Dijiang Huang, and Xinwen Zhang, "VehiCloud: Cloud Computing Facilitating Routing In Vehicular Networks", In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  7. Dijiang Huang, Sean A. Williams, and Swaroop Shere, "Cheater Detection in Vehicular Networks", In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012.
  8. Yang Qin and Dijiang Huang, "Least Squares Disclosure Attack in Mobile Ad Hoc Networks", In Proceedings of the IEEE International Conference on Communications (ICC), Japan, 2011
  9. Dijiang Huang, Swaroop Shere, Soyoung Ahn, "Dynamic Highway Congestion Detection And Prediction Based On Shock Waves," In Proceedings of the ACM VANET (in conjunction of ACM Mobicom), 2010
  10. Sean A. Williams and Dijiang Huang, "Group force mobility model and its obstacle avoidance capability", Journal of the International Academy of Astronautics, Acta Astronautica, Volume 65, Issues 7-8, Pages 949-957, October-November 2009.
  11. Nirav Shah and Dijiang Huang , "A-WEOR: Communication Privacy Protection for Wireless Mesh Networks using Encoded Opportunistic Routing", In Proceedings of the Scond International Workshop on CARier-grade wireless MEsh Networks (CARMEN), in conjunction with IEEE Infocom, 2010.
  12. Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla, "Establishing Email-based Social Network Trust for Vehicular Networks", In Proceedings of IEEE CCNC, Special Session on Social Networking, 2010
  13. Yang Qin and Dijiang Huang, "A Statistical Traffic Pattern Discovery System for MANETs", In Proceedings of  Milcom, 2009.
  14. Dijiang Huang, "On An Information Theoretic Approach to Model Anonymous MANET Communications", In Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 1629-1633, 2009.
  15. Yang Qin, Yin Yin, Dijiang Huang, and Nirav Shah, "A Comparative Study of Anonymous 802.11 Protocols", Accepted to appear at Milcom, 2008.
  16. Xiaoyan Hong, Dijiang Huang, Mario Gerla, Zhen Cao, "SAT: Building New Trust Architecture for Vehicular Networks", in Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch), pages 31-36, 2008.
  17. Yang Qin, Dijiang Huang, and Vinayak Kandiah, "OLAR: On-demand Lightweight Anonymous Routing in MANETs", In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 72-79, 2008. (Best paper award)
  18. Dijiang Huang and Yang Qin, "An Information Theoretic Approach for MANET Unlinkability Measure", In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 132-139, 2008.
  19. Dijiang Huang, "On Measuring Anonymity for Wireless Mobile Ad-hoc Networks," in Proceedings of the 2nd IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet), pages 779-786, Nov. 2006.
  20. Dijiang Huang, "Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems," in Proceedings of the ACM Workshop on Wireless Security (WiSe, in conjunction with ACM MobiCom), Pages 65-74, Sep. 2006.
  21. Sean Williams and Dijiang Huang, "A group force mobility model," in Proceedings of the 9th Communications and Networking Simulation Symposium, pages 333-340, Apr. 2006.
    Sean. A. Williams and Dijiang Huang, "Group Force Mobility Models and Their Obstacle Avoidance Capability," In Proceedings of the AIAA 57th International Astronautical Congress (IAC 2006), vol. 4, pp. 2759-2766, 2006.
  22. Dijiang Huang, "Using Delaunay Triangulation to Construct Obstacle Detour Mobility Model," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 1644-1649, Vol. 3, Mar. 2005.

Education and Learning [top]

Education Platform/Architecture
  1. Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, and Zhen Zeng, "Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education", in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  2. Dijiang Huang, "ThoTh Lab: Personalized Learning for Cybersecurity Education", Showcase at Reimagine Education Conference, 2017. (ThoTh Lab project won the Reimagine Education 2016 Bronze Award in Engineering/IT Discipline).
  3. Yuli Deng, Dijiang Huang, and Chun-Jen Chung, "Adaptive Learning Framework in ThoTh Lab, a Virtual E-Learning Platform for CS Hands-on Projects", Poster, SIGCSE 2017.
  4. Yuli Deng, Zhen Zeng and Dijiang Huang, "ThoTh Lab: A Web-Based, Virtualized, Adaptive Learning Platform for Cybersecurity Hands-on Projects", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
  5. Le Xu, Dijiang Huang, and Wei-Tek Tsai, "Cloud-Based Virtual Laboratory for Network Security Education", IEEE Transactions on Education, Vol 57, Issue 3, Pages 145-150, October 17, 2014.
  6. Le Xu, Dijiang Huang, Wei-Tek Tsai, and Robert K. Atkinson, "V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses", International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), Vol 2, Issue 3, pages 73-85, 2012.
  7. Le Xu, Dijiang Huang, Wei-Tek Tsai, "V-Lab: A Cloud-based Virtual Laboratory Platform for Hands-On Networking Courses", accepted in ACM SIGCSE Conference on innovation and Technology in Computer Science Education, 2012.
Education Services/Models
  1. Yuli Deng, Zhen Zeng, and Dijiang Huang "NeoCyberKG: Using an ML-enabled Knowledge Graph for Cybersecurity Education via Hands-on Labs", in proceedings of the 26th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), Germany 2021
  2. Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, and Fanjie Lin, "Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs" in Proceedings of ACM Global Computing Education Conference (CompEd), May 2019.
  3. Zhen Zeng, Yuli Deng, IHan Hsiao, Dijiang Huang, and Chun-Jen Chung, "Improving student learning performance in a virtual hands-on lab system in cybersecurity education", in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  4. Zhen Zeng, Yuli Deng, I-Han Hsiao, and Dijiang Huang, "Understanding Students" Engagement behavior in Virtual Hands-on Lab: Findings from a Computer Network Security Course", ACM SIGCSE, Poster, 2018
  5. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, "Understanding students" engagement behavior in virtual hands-on lab", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
  6. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, "Predicting learning outcome in virtual hands-on lab system: The role of student attitude", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.

Behavior Biometrics [top]

  1. Duo Lu, Yuli Deng, and Dijiang Huang, "Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication", in Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2021.
  2. Duo Lu, Linzhen Luo, Dijiang Huang, and Yezhou Yang, "FMKit - An In-Air-Handwriting Analysis Library and Data Repository", in proceedings of the Fourth Workshop on Computer Vision for AR/VR, in conjunction with CVPR 2020.
  3. Duo Lu and Dijiang Huang, "FMHash: Deep Hashing of In-Air-Handwriting for User Identification", IEEE ICC 2019.
  4. Duo Lu and Dijiang Huang, "FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface", arXiv.org eprint https://arxiv.org/abs/1808.00130, August 1, 2018.
  5. Duo Lu and Dijiang Huang, "FMHash: Deep Hashing of In-Air-Handwriting for User Identification", arXiv.org eprint https://arxiv.org/abs/1806.03574, June 10, 2018
  6. Duo Lu and Dijiang Huang, "Multifactor User Authentication with In-Air-Handwriting and Hand Geometry", in Proceedings of the 11th IAPR International Conference on Biometrics (ICB), 2018.
  7. Duo Lu and Dijiang Huang, "A Data Driven In-Air-Handwriting Biometric Authentication System", in Proceedings of the International Joint Conference on Biometrics (IJCB), 2017.

Others [top]

  1. Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li, "iDoctor: Personalized and Professionalized Medical Recommendations Based on Hybrid Matrix Factorization", Elsevier Future Generation Computer Systems, Pages 30-35, Volume 66 Issue C, January 2017. This paper was selected by Elsevier Article Selection Celebrating Computer Science Research in China (https://www.elsevier.com/physical-sciences/computer-science/article-selection-celebrating-computer-science-research-in-china
  2. Min Chen, Yixue Hao, Yong Li, Di Wu, and Dijiang Huang, "LIVES: Learning through Interactive Video and Emotion-aware System", ACM MobiHoc, Demo, 2015

Copyright 2018