SNAC Home
[Publications: by Research Areas, Publication Category, Publishing Years]

[Research Projects]

[Testbed and Implementations]
snac

 google scholar  Click here

[Tutorial][Patents][Books][Book Chapters][Journals and Magazines][Journals and Magazines (editorial)][Conferences (full paper)][Conferences (short&poster paper)][Conferences (invited paper)][ePrint][Others]

(Student authors are underlined)

Tutorials [top]

  1. Dijiang Huang, "Moving Target Defense (MTD): A Software Defined Networking (SDN) Approach", IEEE International Conference on Communications (ICC), Kansas City, 2018 (Abstract)
  2. "Enhancing Cloud Security Through Software Defined Networking Approaches", IEEE International Conference on Cloud Networking (CloudNet) 2012, Paris, Nov 2012 (Abstract)
  3. "Enhancing Cloud Security Through Software Defined Networking Approaches", International Conference on Network and Service Management (CNSM) 2012, Las Vegas, Oct 2012 (Abstract)
  4. "Mobile Cloud Computing", IEEE International Conference on Consumer Electronics (ICCE), Las Vegas, 2012 (Abstract)
  5. "Elliptic Curve Cryptography (ECC) and Pairing Based Cryptography (PBC) and Applications" Communication, Network, and Information Security, UC Berkeley, 2007.

U.S. Patents [top]

  1. Dijiang Huang, Duo Lu, "Three-Dimensional In-the-air Motion Based User Login Framework", U.S. Patent # U.S 10,877,568, Issued on December 29, 2020
  2.  Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, "Security policy analysis framework for distributed software defined networking (SDN) based cloud environments", U.S. Patent # U.S 10,868,737, Issued on December 15, 2020
  3.  Dijiang Huang, "Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication", U.S. Patent # U.S 10,425,411, Issued on September 24, 2019 
  4. Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 10,419,404, Issued on September 17, 2019.
  5. Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 9,705,850, Issued on July 11, 2017.
  6. Dijiang Huang, "Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication", U.S. Patent NO. 9,357,331, Issued on May 31, 2016.
  7. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "Selection of a countermeasure" (Based on our original work "Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems"), U.S. Patent NO. 9,160,761, Issue date: October 13, 2015.
  8. Dijiang Huang and Zhibin Zhou, "Methods, Systems, and Apparatuses for Optimal Group Key Management for Secure Multicast Communication", U.S. Patent NO. 8,837,738, Issue date: September 16, 2014.

Books [top]

  1. Dijiang Huang and Huijun Wu, "Mobile Cloud Computing: Foundations and Service Models", Morgan Kaufmann Publishers (An imprint of Elsevier Science), Publishing date: September 22, 2017.
    Amazon: https://www.amazon.com/Mobile-Cloud-Computing-Foundations-Service/dp/0128096411
    Elsevier: https://www.elsevier.com/books/mobile-cloud-computing/huang/978-0-12-809641-3 
  2. Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, "Software-Defined Networking And Security: From Thoery to Practice", CRC Press, expected publishing date: fall of 2018.
  3. Dijiang Huang, Qiuxiang Dong, and Yan Zhu, "Attribute-Based Encryption: From Theory To Practice", working-in-progress, CRC Press, expected publishing date: first quarter of 2019.
  4. Dijiang Huang, SNAC Research Group, " ThoTh Lab: Computer Network Security Lab Manuel", 2020.

Book Chapters [top]

  1. Tianyi Xing, Zhenyang Xiong, Dijiang Huang, Deep Medhi, "Cloud Computing Security", Cloud Services, Networking and Management, (Eds) N. Fonseca and R. Boutaba, IEEE and Wiley, 2014.
  2. Nirav Shah and Dijiang Huang
    DRP: Data Regulation Protocol for Source-End Mitgation of Distributed Denial of Service
    Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed (Eds), IGI Global, 2010
  3. Dijiang Huang and Zhibin Zhou
    A Secure RFID Access Control Mechanism

    Security in RFID and Sensor Networks, Y. Zhang, P. Kitsos (Eds), Auerbach Publications , CRC Press, Taylor and Francis Group, 2008
  4. Dijiang Huang
    Secure Multi-path Data Delivery in Wireless Sensor Networks
    Wireless and Sensor Networks Security, Z. Jiang, Y. Pan (Eds), Nova Science Publishers, Inc. Fall, 2008.
  5. Deep Medhi and Dijiang Huang
    Secure and Resilient Routing: A Framework for Resilient Network Architectures
    Information Assurance: Dependability and Security in Networked Systems, Y. Qian, D. Tipper, P.Krishnamurthy, and J. Joshi , (Eds.), Morgan Kaufmann Publisher, 2007.

Journals, Magazines, and Letters [top]

  1. Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, James Kirby, and Myong Kang,
    Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)
    IEEE Transactions on Dependable and Secure Computing, April 28, 2021.
  2. Zhu, Yan, Ruyun Yu, E. Chen, and Dijiang Huang
    An Efficient Broadcast Encryption Supporting Designation and Revocation Mechanisms
    Chinese Journal of Electronics 28, no. 3, pages 445-456, 2019
  3. Adel Alshamran,Sowmya Myneni,Ankur Chowdhary, and Dijiang Huang
    A Survey of Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities
    IEEE Survey and Tutorials, 2019
  4. Yan Zhu, Ruyun Yu, E. Chen, and Dijiang Huang
    Dual-mode broadcast encryption
    Science China Information Sciences, 2018.
  5. Yan Zhu, Guohua Gan, Ruiqi Guo, and Dijiang Huang
    PHE: An Efficient Tracing and Revoking for Traitors in Cloud File Syncing-and-Sharing
    IEEE Transactions on Cloud Computing, Volume 6, Issue 4, Pages 1110-1124, Oct-Dec, 2018.
  6. Safaa Mahrach, Iman EL MIR, Abdelkrim HAQIQ,  and Dijiang Huang
    SDN-based SYN Flooding Defense in Cloud
    Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 30-39, 2018.
  7. Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang, "Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures." Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 21-29, 2018.
  8. Zhijie Wang and Dijiang Huang
    Privacy-Preserving Mobile Crowd Sensing in Ad Hoc Networks
    Elsevier Ad Hoc Networks, Pages 14-26, Volume 73, NO. 1, May 2018.
  9. Bo Li, Yijian Pei, Hao Wu, Dijiang Huang
    MADM-based smart parking guidance algorithm
    PLOS one, Issue 12, NO. 12, 2017.
  10. Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, and Dijiang Huang
    A Survey on the Usability and Practical Applications of Graphical Security Models
    Computer Science Review, Elsevier, Jun 2017
  11. Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li
    iDoctor: Personalized and Professionalized Medical Recommendations Based on Hybrid Matrix Factorization
    Elsevier Future Generation Computer Systems, Pages 30-35, Volume 66 Issue C, January 2017. This paper was selected by Elsevier Article Selection Celebrating Computer Science Research in China (https://www.elsevier.com/physical-sciences/computer-science/article-selection-celebrating-computer-science-research-in-china)
  12. Sandeep Pisharody, Janakarajan Natarajan, Ankur ChowdharyAbdullah Alshalan, and Dijiang Huang
    Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments
    IEEE Transactions on Dependable and Secure Computing, 2017.
  13. Bing Li, Zhijie Wang, and Dijiang Huang
    Attribute-based Access Control for ICN Naming Scheme
    IEEE Transactions on Dependable and Secure Computing, 2016
  14. Abdullah AlshalanSandeep Pisharody, and Dijiang Huang
    A Survey of Mobile VPN Technologies
    IEEE Communications Surveys and Tutorials, Vol PP, Issue 99, November 2015.
  15. Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, and Chun-Jen Chung,
    Efficient Attribute-Based Comparable Data Access Control
    IEEE Transactions on Computers, Vol 64, Issue 12, Pages 3430-3443, February 2015.
  16. Huijun Wu, Dijiang Huang, and Yan Zhu
    Establishing a personal on-demand execution environment for mobile cloud applications
    Springer Journal on Mobile Networks and Applications (MONET), Vol 20, NO. 3, pp. 297307, June, 2015.
  17. Yan Zhu, Dijiang Huang, Xin Wang, and Changjun Hu
    From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services
    IEEE Transactions on Service Computing, Vol 8, Issue 4, pages 601-616, Oct 2015
  18. Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi
    SeRViTR: A Framework, Implementation, and a Testbed for a Trustworthy Future Internet
    Computer Networks, vol 63, No. 22, April 2014.
  19. Yang Qin, Dijiang Huang, and Bing Li
    STARS: A Statistical Traffic Pattern Discovery System for MANETs
    IEEE Transactions on Dependable and Secure Computing (TDSC),  vol 11, issue 2, pages 181-192, March-April, 2014.
  20. Le Xu, Dijiang Huang, and Wei-Tek Tsai
    Cloud-Based Virtual Laboratory for Network Security Education
    IEEE Transactions on Education, vol 57, issue 3, pages 145-150, October 17, 2013.
  21. Zhibin Zhou, Dijiang Huang, and Zhijie Wang
    Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    IEEE Transactions on Computers, Vol 64, Issue 1, pages 126-138, October 8, 2013.
  22. Dijiang Huang, Tianyi Xing, and Huijun Wu
    Mobile Cloud Computing Service Models: A User-Centric Approach
    IEEE Networks, Vol 27, Issue 5, Pages 6-11, Sep/Oct, 2013.
  23. Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng and Yan Liu
    Adaptive Computing Resource Allocation for Mobile Cloud Computing
    International Journal of Distributed Sensor Networks, vol 2013.
  24. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang,
    NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment,  Vol. 10 NO. 4, pages 198-211, July-Aug 2013.
  25. Le Xu, Dijiang Huang, Wei-Tek Tsai, and Robert K. Atkinson
    V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses
    International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), Vol 2, Issue 3, pages 73-85, 2012.
  26. Hongbin Liang, Lin X. Cai, Dijiang Huang, Xuemin (Sherman) Shen, and Daiyuan Peng
    An SMDP-based Service Model for Inter-domain Resource Allocation in Mobile Cloud Networks
    IEEE Transactions on Vehicular Technology, Vol. 61, NO. 5, pages 2222-2232, 2012.
  27. Zhibin Zhou and Dijiang Huang
    Gradual Identity Exposure Using Attribute-Based Encryption
    International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 2/3, 2012.
  28. Dijiang Huang
    Mobile Cloud Computing
    IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter, Vol. 6, No. 10, Pages 27-31, October 2011.
  29. Dijiang Huang, Satyajayant Misra, Guoliang Xue, and Mayank Verma
    PACP: An Efficient Pseudonymous Authentication Based Conditional Privacy Protocol for VANETs
    IEEE Transactions on Intelligent Transportations, Vol 12, Issue 3, pages 736-746, Sep., 2011
  30. Dijiang Huang, Wei-Tek Tsai, Yi-hsin Tseng
    Policy Management for Secure Data Access Control in Vehicular Networks
    Springer Journal of Network and Systems Management (JNSM), Vol. 19, No. 4, pages 448-471, 2011
  31. Dijiang Huang, Xiaoyan Hong, and Mario Gerla
    Situation-Aware Trust Architecture for Vehicular Networks
    IEEE Communications Magazine, Volume 48, Issue 11, pages 128-135, 2010
  32. Dijiang Huang and Vinayak Kandiah
    Low-latency Mix using Split and Merge Operations
    The Third Special Issue on Security and Management, Journal of Network and Systems Management (JNSM), Volume 18, Number 3, Pages 244-264, September, 2010.
  33. Sean A. Williams and Dijiang Huang
    Group force mobility model and its obstacle avoidance capability
    Journal of the International Academy of Astronautics, Acta Astronautica, Volume 65, Issues 7-8, Pages 949-957, October-November 2009.
  34. Dijiang Huang and Mayank Verma
    ASPE: Attribute Based Secure Policy Enforcement for Data Access Control in Vehicular Ad Hoc Networks
    Ad Hoc Networks Journal (Special Issue of Privacy & Security in WSNs), Issue 8, pages 1526-1535, 2009.
  35. Hao Li, Jian Huang, Philip Sweany, and Dijiang Huang,
    FPGA Implementations of Elliptic Curve Cryptography and Tate Pairing over a Binary Field
    Journal of Systems Architecture, Vol 54, Issue 12, Pages 1077-1088, Dec, 2008.
  36. Dijiang Huang
    Unlinkability Measure for IEEE 802.11 based MANETs
    IEEE Transactions on Wireless Communications, Vol. 7, NO. 2, Pages, 1025-1034, Feb, 2008.
  37. Dijiang Huang and Deep Medhi
    A Secure Group Key Management Scheme for Hierarchical Mobile Ad-hoc Networks
    Ad Hoc Networks Journal, Vol. 6 NO. 4, Pages 560-577, Feb, 2008.
  38. Zhibin Zhou, Dijiang Huang
    Computing Cryptographic Pairing in Sensors
    ACM SIGBED Review, Special Issue on the RTSS Forum on Deeply Embedded Real-Time Computing,  Vol. 5, NO. 1, Jan, 2008.
  39. Dijiang Huang, Manish Mehta, Appie van de Liefvoort, and Deep Medhi
    Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks
    IEEE/ACM Transactions on Networking, Vol 15, Issue 5, Pages 1204-1215, Oct. 2007.
  40. Dijiang Huang and Deep Medhi
    Secure Pairwise Key Establishment in Large-scale Sensor Networks: an Area Partitioning and Multi-group Key Predistribution Approach
    ACM Transactions on Sensor Networks, Vol 3, Issue 3, NO. 16, Aug. 2007.
  41. Dijiang Huang
    Pseudonym-Based Cryptography for Anonymous Communications in Mobile Ad-hoc Networks
    Special Issue on Cryptography in Networks, Int. J. Security and Networks, Vol. 2, NOs. 3/4, pages 272-283, 2007.
  42. Dijiang Huang, Qing Cao, Amit Sinha, Marc Schniederjans, Cory Beard, Lein Harn, and Deep Medhi
    New architecture for Intra-domain network security issues
    Communications of the ACM
    , Vol 49 , Issue 11, Pages: 64 - 72, Nov. 2006.
  43. Dijiang Huang and Deep Medhi
    A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication

    ACM Transactions on Information and System Security (TISSEC), Vol 7, NO. 4, Pages 523-552, Nov. 2004.

Journals, Magazines, and Letters (Editorial Article) [top]

  1. Alexey Vinel, Xiaomin Ma, and Dijiang Huang
    Reliable and Secure VANETs [Guest Editorial]
    IEEE Transactions on Dependable and Secure Computing, Vol. 13, NO. 1, 2015.
  2. Xiaoming Fu, Stefano Secci, Dijiang Huang, and Rittwik Jana,
    Mobile Cloud Computing [Guest Editorial]
    IEEE Communications Magazine, Volume 53, Number 3, Pages 61-62, 2015

Conferences and Workshops (full paper) [top]


  1. Duo Lu, Yuli Deng, and Dijiang Huang, "Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication", in Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2021.
  2. Yuli Deng, Zhen Zeng, and Dijiang Huang "NeoCyberKG: Using an ML-enabled Knowledge Graph for Cybersecurity Education via Hands-on Labs", in proceedings of the 26th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), Germany 2021
  3. Ankur Chowdhary, Dijiang Huang, Abdulhakim Sabur, Neha Vadnere, Myong Kang and Bruce Montrose, "SDN-based Moving Target Defense using Multi-agent Reinforcement Learning", in proceedings of the first International Conference on Autonomous Intelligent Cyber-defence Agents (AICA), France, March 2021
  4. Sowmya Myneni, Ankur Chowdhary, Abdulhakim Sabur, Sailik Sengupta, Garima Agrawal, Dijiang Huang, and Myong Kang, "DAPT 2020 - Constructing a Benchmark Dataset for Advanced Persistent Threats", in proceedings of the First International Workshop on Deployable Machine Learning for Security Defense (MLHat), in conjunction with ACM KDD, 2020.
  5. Duo Lu, Linzhen Luo, Dijiang Huang, and Yezhou Yang, "FMKit - An In-Air-Handwriting Analysis Library and Data Repository", in proceedings of the Fourth Workshop on Computer Vision for AR/VR, in conjunction with CVPR 2020.
  6. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, "SUPC: SDN enabled Universal Policy Checking in Cloud Network", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
  7. Ankur Chowdhary and Dijiang Huang, "SDN based Network Function Parallelism in Cloud", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019.
  8. Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, and Abdulhakim Sabur
    Adaptive MTD Security using Markov Game Modeling", In proceedings of International Conference on Computing
    Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
  9. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati
    Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud
    in Proceedings of GameSec, 2018.
  10. Adel Alshamrani, Ankur Chowdhary, Dijiang Huang, Sowmya Myneni, and Qussama Mjihil
    Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation
    in proceedings of IEEE Globalcom, Communication Information and System Security (CISS) Symposium, 2018.
  11. Jim Luo, Qiuxiang Dong, Dijiang Huang, and Myong Kang
    Attribute Based Encryption for Information Sharing on Tactical Mobile Networks
    IEEE Milcom, 2018.
  12. Mirza M. S. Maswood, Md M. I. Mamun, Dijiang Huang, and Deep Medhi,
    A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment
    in proceedings of 39th Sarnoof Symposium, 2018
  13. Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, and Zhen Zeng
    Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education
    in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  14. Zhen Zeng, Yuli Deng, IHan Hsiao, Dijiang Huang, and Chun-Jen Chung
    Improving student learning performance in a virtual hands-on lab system in cybersecurity education
    in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  15. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang
    Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data
    in proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC), in conjunction with IEEE CNS, 2018
  16. Duo Lu and Dijiang Huang
    Multifactor User Authentication with In-Air-Handwriting and Hand Geometry
    in Proceedings of the 11th IAPR International Conference on Biometrics (ICB), 2018.
  17. Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang
    Fault Tolerant Controller Placement in Distributed SDN Environments
    in Proceedings of IEEE ICC Communications QoS, Reliability, and Modeling Symposium, 2018.
  18. Abdullah Alshalan and Dijiang Huang
    Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers
    in Proceedings of IEEE ICC Communication and Information Systems Security Symposium, 2018.
  19. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq
    Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing
    in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
  20. Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang
    Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming
    In proceedings of the International Conference on Innovations in Bio-Inspired Computing and Applications. 2017.
  21. Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukhwa Kyung, Dijiang Huang, and Gail-Joon Ahn
    Science DMZ: SDN based Secured Cloud Testbed
    Demo, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017.
  22. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, and Dijiang Huang
    A Defense System for Defeating DDoS Attacks in SDN based Networks
    in Proceedings of International Symposium on Mobility Management and Wireless Access (MobiWac), 2017
  23. Duo Lu and Dijiang Huang
    A Data Driven In-Air-Handwriting Biometric Authentication System
    in Proceedings of the International Joint Conference on Biometrics (IJCB), 2017.
  24. Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim and Abdelkrim Haqiq
    Software Defined Stochastic Model for Moving Target Defense
    in Proceedings of Third International Afro-European Conference for Industrial Advancement (AECIA), 2016.
  25. Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang
    SDN based scalable MTD solution in Cloud Network
    in Proceedings of the ACM Moving Target Defense (MTD) Workshop, in conjunction with ACM CCS, 2016.
  26. Sandeep Pisharody, Ankur Chowdhary, Dijiang Huang
    Security Policy Checking in Distributed SDN based Clouds
    in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
  27. Duo Lu, Zhichao Li, Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, and Bing Li
    VC-bots: A Vehicular Cloud Computing Testbed with Mobile Robots
    in Proceedings of ACM MobiHoc Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
  28. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang
    MobiVPN: A Mobile VPN Providing Persistency To Applications
    in Proceedings of 2016 International Conference on Computing, Networking and Communications Wireless Networks (ICNC), 2016.
  29. Jin Hong, Chun-Jen Chung, Dijiang Huang, Dongseong Kim
    Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    in Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2015.
  30. Jin Hong, Chun-Jen Chung, Dijiang Huang, Dongseong Kim
    Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
    in Proceedings of the First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2015.
  31. Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, and Kishor Trivedi,
    SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-Tenant Datacenter Environment
    in Proceedings of the Workshop on Dependability Issues on SDN and NFV (DISN), 2015.
  32. Min Chen, Yixue Hao, Yong Li, Di Wu, and Dijiang Huang,
    LIVES: Learning through Interactive Video and Emotion-aware System
    ACM MobiHoc, Demo, 2015.
  33. Huijun Wu and Dijiang Huang
    POEM: On Establishing A Personal On-demand Execution Environment for Mobile Cloud Applications
    in Proceedings of the IEEE 4th  International Conference on Mobile Services (IEEE MS), pages 41-48, 2015.
  34. Huijun Wu and Dijiang Huang
    MoSeC: Mobile-Cloud Service Composition
    in Proceedings of 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015.
  35. Huijun Wu and Dijiang Huang
    Modeling Multi-factor Multi-site Risk-based Offloading for Mobile Cloud Computing
    in Proceedings of 10th International Conference on Network and Service Management (CNSM), 2014.
  36. Bing Li, Dijiang Huang, and Zhijie Wang
    Refining Traffic Information for Analysis using Evidence Theory
    in Proceedings of Milcom, 2014.
  37. Zhijie Wang, Bing Li, and Dijiang Huang,
    Towards Anonymous Group Setup across Multiple Domains
    in Proceedings of Milcom, 2014.
  38. Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, and Yan Zhu
    Attribute-based Access Control for ICN Naming Scheme
    in Proceedings of the IEE Conference on Communications and Network Security (CNS), 2014.
  39. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng
    Towards Distributed Privacy-Preserving Mobile Access Control
    in Proceedings of the IEEE Globecom 2014.
  40. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, Ailixier Aikebaier, and  Yuuichi Teranishi
    QoS-Constrained Sensing Task Assignment for Mobile Crowd Sensing
    in Proceedings of the IEEE Globecom 2014.
  41. Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, and Ikuo Oka
    Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks
    In Proceedings of IEEE/IFIP NOMS, 2014
  42. Chun-Jen Chun, Jingsong Cui, Pankaj Khatkar,  and Dijiang Huang
    Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations
    In Proceedings of the Collaboratecom 2013.
  43. Huijun Wu, Dijiang Huang, and Samia Bouzefrane
    Making Offloading Decisions Resistant to Network Unavailability for Mobile Cloud Collaboration
    In Proceedings of the Collaboratecom 2013.
  44. Bing Li and Dijiang Huang
    Modeling Anonymous MANET Communications Using Super-nodes
    In Proceedings of Milcom, 2013.
  45. Bing Li, Zhijie Wang, and Dijiang Huang
    An Efficient and Anonymous Attribute-Based Group Setup Scheme
    In Proceedings of the IEEE Globecom 2013.
  46. Yan Zhu, Di Ma, Changjun Hu, and Dijiang Huang
    How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud
    in Proceedings of the International Workshop on Security in Cloud Computing, in conjunction with ASIACCS, 2013.
  47. Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar
    SnortFlow: A OpenFlow-based Intrusion Prevention System in Cloud Environment
    in Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013), 2013.
  48. Li Li, Dijiang Huang, Zhidong Shen, and Samia Bouzefrane
    A Cloud based Dual-Root Trust Model for Secure Mobile Online Transactions
    In Proceedings of IEEE WCNC 2013.
  49. Fatiha Houacine, Samia Bouzefrane, Li Li and Dijiang Huang
    MCC-OSGi: A OSGi-based Mobile Cloud Service Model
    In Proceedings of the Eleventh International Symposium on Autonomous Decentralized Systems, (ISADS) 2013.
  50. Zhibin Zhou and Dijiang Huang
    Efficient and Secure Data Storage Operations for Mobile Cloud Computing
    In Proceedings of the 8th International Conference on Network and Service Management (CNSM), 2012
  51. Tianyi Xing, Hongbin Liang, Dijiang Huang, and Lin X. Cai
    Geographic-based Service Request Scheduling Model for Mobile Cloud Computing
    In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  52. Yang Qin, Dijiang Huang, and Xinwen Zhang
    VehiCloud: Cloud Computing Facilitating Routing In Vehicular Networks
    In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  53. Dijiang Huang, Sean A. Williams, and Swaroop Shere
    Cheater Detection in Vehicular Networks
    In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012.
  54. Le Xu, Dijiang Huang, and Wei-Tek Tsai
    "V-Lab: A Cloud-based Virtual Laboratory Platform for Hands-On Networking Courses
    In Proceedings of the 17th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), 2012.
  55. Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata2, Dijiang Huang, and Deep Medhi
    SeRViTR: A Framework for Trust and Policy Management for A Secure Internet and Its Proof-of-Concept Implementation
    In Proceedings of the 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI), 2012.
  56. Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, and Deep Medhi
    Constructing Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE)
    In Proceedings of the the ICC Workshop on the Network of the Future, 2012
  57. Vijayakrishnan Nagarajan and Dijiang Huang
    Secure Web Referral Service
    In Proceedings of the International Conference on Information Networking (ICOIN), 2012.
  58. Samia Bouzefrane, Pierre Paradinas, and Dijiang Huang
    An OSGi-based Service Oriented Architecture for Android Platforms
    In Proceedings of the 23rd International Conference on Software & Systems Engineering and their Applications (ICSSEA), 2011.
  59. Dijiang Huang, Zhibin Zhou, Le Xu, Tianyi Xing, and Yunji Zhong
    Secure Data Processing Framework for Mobile Cloud Computing
    In Proceedings of IEEE INFOCOM"s Workshop on Cloud Computing, 2011.
  60. Hongbin Liang, Dijiang Huang, Lin X. Cai, Xuemin (Sherman) Shen, Daiyuan Peng
    Resource Allocation for Security Services in Mobile Cloud Computing
    In Proceedings of the IEEE INFOCOM"s Workshop on Machine-to-Machine Communications and Networking (M2MCN), 2011
  61. Yang Qin and Dijiang Huang,
    Least Squares Disclosure Attack in Mobile Ad Hoc Networks
    In Proceedings of the IEEE International Conference on Communications (ICC), Japan, 2011.
  62. Dijiang Huang
    Anonymous Certification Services
    In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  63. Dijiang Huang and Vetri Arasan
    On Measuring Email-based Social Network Trust
    In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  64. Dijiang Huang, Shingo Ata, and Deep Medhi
    Establishing Secure Virtual Trust Routing And Provisioning Domains For Future Internet
    In Proceedings of the Next Generation Networking Symposium, IEEE Globecom 2010.
  65. Dijiang Huang, Swaroop Shere, Soyoung Ahn,
    Dynamic Highway Congestion Detection And Prediction Based On Shock Waves
    In Proceedings of the ACM VANET (in conjunction of ACM Mobicom), 2010
  66. Dijiang Huang, Vetri Arasan
    Email-based Social Network Trust
    In Proceedings of the Symposium on Social Intelligence and Networking (SIN), SocialCom, pages 363-370, 2010
  67. Dijiang Huang, Zhibin Zhou, Yan Zhu
    Gradual Identity Exposure Using Attribute-Based Encryption
    In Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 881-888, 2010.
  68. Nanxi Chen, Mario Gerla, Dijiang Huang, and Xiaoyan Hong
    Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption
    Accepted to appear in The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2010.
  69. Dijiang Huang, Utkarsh Agarwal
    Countering Repacketization Watermarking Attacks on Tor Network
    The International Conference on Applied Cryptography and Network Security (ACNS), 2010.
  70. Nirav Shah and Dijiang Huang
    A-WEOR: Communication Privacy Protection for Wireless Mesh Networks using Encoded Opportunistic Routing
    In Proceedings of the Scond International Workshop on CARier-grade wireless MEsh Networks (CARMEN), in conjunction with IEEE Infocom, 2010.
  71. Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla
    Establishing Email-based Social Network Trust for Vehicular Networks
    In Proceedings of IEEE CCNC, Special Session on Social Networking, pages 1-5, 2010
  72. Vijayakrishnan Nagaraja, Vetri Arasan, and Dijiang Huang
    Using Power Hopping to Counter MAC Spoof Attacks in WLAN
    In Proceedings of IEEE CCNC, pages 1-5, 2010
  73. Sushma Myneni and Dijiang Huang
    IEEE 802.11 Wireless LAN Control Frame Protection
    In Proceedings of IEEE CCNC, pages 1-5, 2010.
  74. Yang Qin and Dijiang Huang
    A Statistical Traffic Pattern Discovery System for MANETs
    In Proceedings of Milcom, pages 1-7, 2009.
  75. Dijiang Huang
    Secure Multi-path Data Delivery in Sensor Networks
    In Proceedings of Milcom, pages 1-7, 2009.
  76. Mukesh Jagasia and Dijiang Huang
    Distributed Data-theft Detection in Wireless Sensor Networks
    In Proceedings of IEEE Globecom, AHSN, pages 1-6, 2009.
  77. Harsh Kapoor and Dijiang Huang
    Secret-sharing based secure communication protocols for passive RFIDs
    In Proceedings of IEEE Globecom, CISS, pages 1-6,2009.
  78. Dijiang Huang and Harsh Kapoor
    Towards lightweight secure communication protocols for passive RFIDs
    In Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON), pages 1-9, 2009.
  79. Dijiang Huang
    On An Information Theoretic Approach to Model Anonymous MANET Communications
    In Proceedings of the IEEE International Symposium on Information Theory (ISIT), pages 1629-1633, 2009.
  80. Satyajayant Misra, Mayank Verma, Dijiang Huang, Guoliang Xue
    SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID tags
    In Proceedings of the IEEE ICC, Wireless Networking, pages 1-6, 2009.
  81. Mayank Verma and Dijiang Huang
    Secure Group Communication in VANETs
    In Proccedings of IEEE Intelligent Vehicular Communications System (ICVS), pages 1-5, 2009.
  82. Yang Qin, Yin Yin, Dijiang Huang, and Nirav Shah
    A Comparative Study of Anonymous 802.11 Protocols

    In Proceedings of IEEE Military Communications Conference (MILCOM), pages 1-7, 2008.
  83. Xiaoyan Hong, Dijiang Huang, Mario Gerla, Zhen Cao
    SAT: Building New Trust Architecture for Vehicular Networks
    In Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch), pages 31-36, 2008.
  84. Vinayak Kandiah, Dijiang Huang, and Harsh Kapoor
    C-Mix: A lightweight Anonymous Routing Approach
    Information Hiding (IH), Lecture Notes in Computer Science, vol. 5284 LNCS, pages 294-308, 2008.
  85. Yang Qin, Dijiang Huang, and Vinayak Kandiah
    OLAR: On-demand Lightweight Anonymous Routing in MANETs
    In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 72-79, 2008. (Best paper award)
  86. Dijiang Huang and Yang Qin
    An Information Theoretic Approach for MANET Unlinkability Measure
    In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 132-139, 2008.
  87. Zhibin Zhou and Dijiang Huang
    SRK: A Distributed RFID Data Access Control Mechanism
    In Proceedings of the IEEE International Conference on Communications (ICC), pages 2854 - 2858, 2008.
  88. Dijiang Huang, Vinayak Kandiah, and Mayank Verma
    Privacy Preservation Services: Challenges and Solutions
    In Proceedings of ACM Symposium on Applied Computing (SAC), Computer Security Track, pages 2110-2115, 2008.
  89. Zhibin Zhou and Dijiang Huang
    RFID Keeper: An RFID Data Access Control Mechanism
    In Proceedings of IEEE Globecom, pages 4570-4574, 2007.
  90. Archana Ramachandran, Zhibin Zhou, and Dijiang Huang
    Computing Cryptographic Algorithms in Portable and Embedded Devices
    In Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7, 2007.
  91. Dijiang Huang, Mayank Verma, Archana Ramachandran, and Zhibin Zhou
    A Distributed ePedigree Architecture
    In Proceedings of the 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2007), pages 220-227, Mar. 2007.
  92. Dijiang Huang
    On Measuring Anonymity for Wireless Mobile Ad-hoc Networks
    In Proceedings of the 2nd IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet), pages 779-786, Nov. 2006.
  93. Sean. A. Williams and Dijiang Huang
    Group Force Mobility Models and Their Obstacle Avoidance Capability
    In Proceedings of the AIAA 57th International Astronautical Congress (IAC 2006), vol. 4, pp. 27592766, 2006.
  94. Dijiang Huang
    Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems
    In Proceedings of the ACM Workshop on Wireless Security (WiSe, in conjunction with ACM MobiCom), Pages 65-74, Sep. 2006.
  95. Dijiang Huang and Hao Li
    Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices
    In Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium
    , pages 53-56, Apr., 2006.
  96. Sean Williams and Dijiang Huang
    A group force mobility model
    In Proceedings of the 9th Communications and Networking Simulation Symposium, pages 333-340, Apr. 2006.
  97. Dijiang Huang, Amit Sinha, and Deep Medhi
    On Providing Confidentiality in Link State Routing Protocol
    In Proceedings of the IEEE Consumer Communications and Networking Conference, pages 671-675, Jan. 2006.
  98. Dijiang Huang
    An Identity-Based Blind Key Generation and Signature Scheme
    In Proceedings of the Conference on Information Security and Cryptology (CISC), pages 65-73, Dec. 2005.
  99. Gaurav Agrawal, Dijiang Huang, and Deep Medhi
    Network Protection Design for Reliable MPLS Networks
    In Proceedings of the 5th International Workshop on Design of Reliable Communication Networks (DRCN2005), pages, 481-486, Oct. 2005.
  100. Dijiang Huang and Deep Medhi
    A Byzantine Resilient Multi-path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks
    In Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN, in conjunction with IPDPS), pages 240b, Apr. 2005.
  101. Dijiang Huang, Manish Mehta, and Deep Medhi
    Source Routing Based Pairwise Key Establishment Protocol for Sensor Networks
    In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 177 - 183. Apr. 2005.
  102. Dijiang Huang, Amit Sinha, and Deep Medhi
    A Key Distribution Scheme for Double Authentication in Link State Routing Protocol
    In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 19 - 24., Apr. 2005.
  103. Manish Mehta, Dijiang Huang, and Lein Harn
    RINK-RKP: A Scheme for Key Predistribution and Shared-Key Discovery in Sensor Networks
    In Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 193-197, Apr. 2005.
  104. Dijiang Huang
    Using Delaunay Triangulation to Construct Obstacle Detour Mobility Model
    In Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 1644-1649, Vol. 3, Mar. 2005.
  105. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn
    Location-aware Key Management Scheme for Wireless Sensor Networks
    In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN "04, in conjunction with ACM CCS2004), pages 29-42, Oct. 2004.
  106. Dijiang Huang and Qing Cao,
    Constructing Realistic Mobility Model: A New Framework
    In Proceedings of the 35th Annual Meeting of the Decision Sciences institute (DSI), Nov. 2004. Boston, Massachusetts.
  107. Dijiang Huang,
    Secure Link State Routing Protocol: A Framework
    Doctoral Symposium, International Conference on Distributed Computing System (ICDCS), Providence, RI, May 19-22, 2003.
  108. Dijiang Huang, Deep Medhi, Cory Beard, and Lein Harn
    Trust Analysis of Link State Network Routing
    In Proceedings of the 2nd International Workshop on Trusted Internet (TIW), Hyderabad, India, December 17, 2003.
  109. Dijiang Huang, Amit Sinha, and Deep Medhi
    A Double Authentication Scheme To Detect Impersonation Attack In Link State Routing Protocols

    In Proceedings of the IEEE International Conference on Communications (ICC), pages 1723 - 1727, Vol. 3, May. 2003.
Conferences and Workshops (poster and short papers) [top]
  1. Zhen Zeng, Yuli Deng, I-Han Hsiao, and Dijiang Huang
    Understanding Students" Engagement behavior in Virtual Hands-on Lab: Findings from a Computer Network Security Course
    ACM SIGCSE, Poster, 2018
  2. Yuli Deng, Zhen Zeng and Dijiang Huang
    ThoTh Lab: A Web-Based, Virtualized, Adaptive Learning Platform for Cybersecurity Hands-on Projects
    in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
  3. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung
    Understanding students" engagement behavior in virtual hands-on lab
    in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
  4. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung
    Predicting learning outcome in virtual hands-on lab system: The role of student attitude
    in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, Poster, 2017.
  5. Qiuxiang Dong and Dijiang Huang
    Privacy-preserving Matchmaking in Geosocial Networks with Untrusted Servers
    in Proceedings of the 37th IEEE International Conference on Distributed Computing systems (ICDCS), Poster, 2017.
  6. Yuli Deng, Dijiang Huang, and Chun-Jen Chung
    Adaptive Learning Framework in ThoTh Lab, a Virtual E-Learning Platform for CS Hands-on Projects
    Poster, SIGCSE 2017.
  7. Tianyi Xing, Zhengyang Xiong, Dijiang Huang, and Deep Medhi
    SDNIPS: Enabling the Software Defined Network Based Intrusion Prevention System in Clouds
    in Proceedings of 10th International Conference on Network and Service Management (CNSM), (poster) 2014.
  8. Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang, and Ikuo Oka
    A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network
    In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management,  Poster, IM"2013.
  9. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, and Shanbiao Wang
    Towards Temporal Access Control in Cloud Computing
    In Proceedings of the the 31st IEEE International Conference on Computer Communications (INFOCOM), mini conference, 2012.
  10. Tianyi Xing, Dijiang Huang, Deep Medhi, and Shingo Ata
    MobiCloud: a Geo-distributed Mobile Cloud Computing Platform
    In Proceedings of the 8th International Conference on Network and Service Management (CNSM), short paper, 2012.
  11. Zhibin Zhou and Dijiang Huang
    An Optimal Key Distribution Scheme for Multicast Group Communication
    In Proceedings of IEEE Conference on Computer Communications (Infocom, mini conference), pages 1-5, 2010.
  12. Zhibin Zhou, Dijiang Huang
    On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption
    Poster, 17th ACM Conference on Computer and Communications Security (CCS), 2010.
  13. Zhibin Zhou and Dijiang Huang
    Constructing Efficient Attribute-Based Broadcast Encryption
    In Proceedings of IEEE Conference on Computer Communications (Infocom, poster) 2010.
Conferences and Workshops (invited papers) [top]
  1. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang
    MTD Analysis and evaluation framework in Software Defined Network (MASON)
    in Proceedings of the ACM SDN/NFV Security Workshop, 2018 (Invited)
  2. Duo Lu, Dijiang Huang, Andrew Walenstein, and  Deep Medhi
    A Secure Microservice Framework for IoT
    in Proceedings of IEEE Service Oriented Software Engineering (SOSE), 2017 (Invited Paper).
  3. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang
    Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments
    in Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec"17), 2017 (Invited Paper).
  4. Le XuVijayakrishnan Nagarajan, Dijiang Huang, and Wei-Tek Tsai,
    Secure Web Referral Services for Mobile Cloud Computing
    IEEE International Symposium on Mobile Cloud, Computing, and Service Engineering (IEEE MobileCloud)
    , invited, 2013.
  5. Hongbin Liang, Dijiang Huang, Daiyuan Peng
    On Economic Mobile Cloud Computing Model
    In Proceedings of the International Workshop on Mobile Computing and Clouds (MobiCloud in conjunction with MobiCASE), (invited paper), 2010.
  6. Dijiang Huang, Xinwen Zhang, Myong Kang, and Jim Luo
    MobiCloud: Building Secure Mobile Cloud Framework for Mobile Computing and Communication
    In Proceedings of the 5th IEEE International Symposium on Service-Oriented System Engineering (SOSE), pages 27-34, (invited), 2010.
ePrint Publications [top]
  1. Duo Lu and Dijiang Huang, "FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface", arXiv.org eprint https://arxiv.org/abs/1808.00130, August 1, 2018.
  2. Duo Lu and Dijiang Huang, "FMHash: Deep Hashing of In-Air-Handwriting for User Identification", arXiv.org eprint https://arxiv.org/abs/1806.03574, June 10, 2018
  3. Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, Prasad Calyam, Jeff Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abrahim Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, and Kobus Van der Merwe, "The Future of CISE Distributed Research Infrastructure", arXiv.org eprint https://arxiv.org/abs/1803.09886, March 27, 2018
  4. Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang, "IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication", https://eprint.iacr.org/2017/1100, 2017
  5. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang, "HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing", https://eprint.iacr.org/2017/1101, 2017
  6. Q Dong, D Huang, J Luo, M Kang, "ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption", https://eprint.iacr.org/2017/1102, 2017
  7. Zhibin Zhou and Dijiang Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", https://eprint.iacr.org/2011/185, 2011
  8. Zhibin Zhou and Dijiang Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", https://eprint.iacr.org/2010/395, 2010
  9. Zhibin Zhou and Dijiang Huang, "Optimal Multicast Group Communication", https://eprint.iacr.org/2009/010, 2009

Others [top]

  1. Dijiang Huang
    ThoTh Lab: Personalized Learning for Cybersecurity Education
    Showcase at Reimagine Education  Conference, 2017. (ThoTh Lab project won the Reimagine Education Bronze Award in Engineering/IT Discipline). See http://www.reimagine-education.com/awards/reimagine-education-2016-honours-list/
  2. PhD Dissertation, "Many-to-Many Secure Group Communication and Its Applications,"
    Computer Science and Electrical Engineering Department, University of Missouri-Kansas City, December 2004.
    Adviser: Professor Deep Medhi
Copyright 2018