SNAC Home
[Publications: by Research Areas, Publication Category, Publishing Years]

[Research Projects]

[Testbed and Implementations]
snac

 google scholar  Click here

[2021 ][2020][2019][2018][2017][2016][2015][2014][2013][2012][2011][2010][2009][2008][2007][2006][2005][2004][2003]

(Reversed Chronicle Order)


2021 [top]

  1. Ankur Chowdhary, Abdulhakim Sabur, Dijiang Huang, James Kirby, and Myong Kang, "Object Oriented Policy Conflict Checking Framework in Cloud Networks (OOPC)", IEEE Transactions on Dependable and Secure Computing, April 28, 2021.
  2. Duo Lu, Yuli Deng, and Dijiang Huang, "Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication", in Proceedings of Annual Computer Security Applications Conference (ACSAC), December 2021.
  3.  Yuli Deng, Zhen Zeng, and Dijiang Huang "NeoCyberKG: Using an ML-enabled Knowledge Graph for Cybersecurity Education via Hands-on Labs", in proceedings of the 26th Annual Conference on Innovation and Technology in Computer Science Education (ITiCSE), Germany 2021
  4. Ankur Chowdhary, Dijiang Huang, Abdulhakim Sabur, Neha Vadnere, Myong Kang and Bruce Montrose, "SDN-based Moving Target Defense using Multi-agent Reinforcement Learning", in proceedings of the first International Conference on Autonomous Intelligent Cyber-defence Agents (AICA), France, March 2021


2020 [top]
  1. Sowmya Myneni, Ankur Chowdhary, Abdulhakim Sabur, Sailik Sengupta, Garima Agrawal, Dijiang Huang, and Myong Kang, "DAPT 2020 - Constructing a Benchmark Dataset for Advanced Persistent Threats", in proceedings of the First International Workshop on Deployable Machine Learning for Security Defense (MLHat), in conjunction with ACM KDD, 2020.  
  2. Duo Lu, Linzhen Luo, Dijiang Huang, and Yezhou Yang, "FMKit - An In-Air-Handwriting Analysis Library and Data Repository", in proceedings of the Fourth Workshop on Computer Vision for AR/VR, in conjunction with CVPR 2020
2019 [top]
  1. Adel Alshamran,Sowmya Myneni,Ankur Chowdhary, and Dijiang Huang, "A Survey of Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities", IEEE Survey and Tutorials, 2019
  2. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, "General Sum Markov Games for Strategic Detection of Advanced Persistent Threats using Moving Target Defense in Cloud Networks", in Proceedings of the Conference on Conference on Decision and Game Theory for Security (GameSec), 2019
  3. Abdulhakim Sabur,  Ankur Chowdhary,  Dijiang Huang,  Myong Kang,  Anya Kim, and Alexander Velazquez, "S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks", in Proceedings of the 22nd International Symposium on Research in Attacks, Intrusions and Defenses (RAID),  2019.
  4. Ankur Chowdhary, Dijiang Huang, Gail-Joon Ahn, Myong Kang, Anya Kim, and Alexander Velazquez, "SDNSOC: Object Oriented SDN Framework", In proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization (SDN-NFVSec"19), 2019. (Invited Paper).
  5. Jiayue Li, Tracy Cheng, Xiaohua Jia, and Dijiang Huang, "Partially Overlapped Channel Detection in Heterogeneous Cognitive Networks", IEEE WCNC 2019.
  6. Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong Kang, Anya Kim, and Alexander Velazquez, "TRUFL: Distributed Trust Management framework in SDN", IEEE ICC 2019.
  7. Duo Lu and Dijiang Huang, "FMHash: Deep Hashing of In-Air-Handwriting for User Identification", IEEE ICC 2019.
  8. Yuli Deng, Duo Lu, Dijiang Huang, Chun-Jen Chung, and Fanjie Lin, "Knowledge Graph based Learning Guidance for Cybersecurity Hands-on Labs" in Proceedings of ACM Global Computing Education Conference (CompEd), May 2019.
  9. Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, and Subbarao Kambhampati, "Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks", in Proceedings of the AAAI-19 Workshop on Artificial Intelligence for Cyber Security (AICS), 2019
  10. Dijiang Huang, Chun-Jen Chung, Qiuxiang Dong, Jim Lou, Myong Kang, "Building Private Blockchains over Public Blockchains (PoP): An Attribute-Based Access Control Approach", in Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing (SAC), DAPP - Decentralized Applications with Blockchain, DLT and Crypto-Currencies, 2019.
  11. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, "SUPC: SDN enabled Universal Policy Checking in Cloud Network", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019
  12. Ankur Chowdhary and Dijiang Huang, "SDN based Network Function Parallelism in Cloud", In proceedings of International Conference on Computing, Networking and Communications (ICNC): Communications and Information Security Symposium - Communications and Information Security, 2019.
  13. Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, and Abdulhakim Sabur, "Adaptive MTD Security using Markov Game Modeling", In proceedings of International Conference on Computing, Networking and Communications and Information Security, 2019
    2018 [top]
  1. Yan Zhu, Ruyun Yu, E. Chen, and Dijiang Huang, "Dual-mode broadcast encryption", Science China Information Sciences, 2018.
  2. Oussama Mjihil, Hamid Taramit, Abdelkrim Haqiq, and Dijiang Huang, "Beyond Dynamic Programming: Performance Evaluation and Enhancement of Multi-tenant Cloud Infrastructures." Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 21-29, 2018.
  3. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq. "Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
  4. Dijiang Huang, Ankur Chowdhary, and Sandeep Pishoardy, "Software-Defined Networking And Security: From Thoery to Practice", CRC Press, 2018.
  5. Dijiang Huang, "Moving Target Defense (MTD): A Software Defined Networking (SDN) Approach", Tutorial, IEEE International Conference on Communications (ICC), Kansas City, 2018
  6. Safaa Mahrach, Iman EL MIR, Abdelkrim HAQIQ,  Dijiang Huang, "SDN-based SYN Flooding Defense in Cloud",  Journal of Information Assurance & Security, Vol. 13, Issue 1, pages 30-39, 2018.
  7. Zhijie Wang and Dijiang Huang, "Privacy-Preserving Mobile Crowd Sensing in Ad Hoc Networks",  Elsevier Ad Hoc Networks, Pages 14-26, Volume 73, NO. 1, May 2018.
  8. Sailik Sengupta, Ankur Chowdhary, Dijiang Huang, and Subbarao Kambhampati, "Moving Target Defense for the Placement of Intrusion Detection Systems in the Cloud", in Proceedings of GameSec, 2018.
  9. Adel Alshamrani, Ankur Chowdhary, Dijiang Huang, Sowmya Myneni, and Qussama Mjihil, "Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation", in proceedings of IEEE Globalcom, Communication Information and System Security (CISS) Symposium, 2018.
  10. Jim Luo, Qiuxiang Dong, Dijiang Huang, and Myong Kang, "Attribute Based Encryption for Information Sharing on Tactical Mobile Networks", IEEE Milcom 2018.
  11. Mirza M. S. Maswood, Md M. I. Mamun, Dijiang Huang, and Deep Medhi, "A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment", in proceedings of 39th Sarnoof Symposium, 2018
  12. Yuli Deng, Duo Lu, Chun-Jen Chung, Dijiang Huang, and Zhen Zeng, "Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education", in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  13. Zhen Zeng, Yuli Deng, IHan Hsiao, Dijiang Huang, and Chun-Jen Chung, "Improving student learning performance in a virtual hands-on lab system in cybersecurity education", in proceedings of IEEE Frontiers in Education Conference (FIE), 2018
  14. Qiuxiang Dong,Dijiang Huang, Jim Luo, Myong Kang, "Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data", in proceedings of the 4th IEEE Workshop on Security and Privacy in the Cloud (SPC), in conjunction with IEEE CNS, 2018
  15. Zhen Zeng, Yuli Deng, I-Han Hsiao, and Dijiang Huang, "Understanding Students" Engagement behavior in Virtual Hands-on Lab: Findings from a Computer Network Security Course", ACM SIGCSE, Poster, 2018
  16. Ankur Chowdhary, Adel Alshamrani, and Dijiang Huang, "MTD Analysis and evaluation framework in Software Defined Network (MASON)", in Proceedings of the ACM SDN/NFV Security Workshop, 2018 (Invited)
  17. Duo Lu and Dijiang Huang, "Multifactor User Authentication with In-Air-Handwriting and Hand Geometry", in Proceedings of the 11th IAPR International Conference on Biometrics (ICB), 2018.
  18. Adel Alshamrani, Sayantan Guha, Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, "Fault Tolerant Controller Placement in Distributed SDN Environments", in Proceedings of IEEE ICC Communications QoS, Reliability, and Modeling Symposium, 2018.
  19. Abdullah Alshalan and Dijiang Huang, "Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers", in Proceedings of IEEE ICC Communication and Information Systems Security Symposium, 2018.
  20. Duo Lu and Dijiang Huang, "FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface", arXiv.org eprint https://arxiv.org/abs/1808.00130, August 1, 2018.
  21. Duo Lu and Dijiang Huang, "FMHash: Deep Hashing of In-Air-Handwriting for User Identification", arXiv.org eprint https://arxiv.org/abs/1806.03574, June 10, 2018
  22. Jay Aikat, Ilya Baldin, Mark Berman, Joe Breen, Richard Brooks, Prasad Calyam, Jeff Chase, Wallace Chase, Russ Clark, Chip Elliott, Jim Griffioen, Dijiang Huang, Julio Ibarra, Tom Lehman, Inder Monga, Abrahim Matta, Christos Papadopoulos, Mike Reiter, Dipankar Raychaudhuri, Glenn Ricart, Robert Ricci, Paul Ruth, Ivan Seskar, Jerry Sobieski, and Kobus Van der Merwe, "The Future of CISE Distributed Research Infrastructure", arXiv.org eprint https://arxiv.org/abs/1803.09886, March 27, 2018

    2017 [top]

  23. Dijiang Huang and Huijun Wu, "Mobile Cloud Computing: Foundations and Service Models", Morgan Kaufmann Publishers (An imprint of Elsevier Science), Publishing date: September 22, 2017.
  24. Dijiang Huang and Zhijie Wang, "Enabling Comparable Data Access Control for Lightweight Mobile Devices in Clouds", U.S. Patent # 9,705,850, Issued on July 11, 2017.
  25. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq, ""Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", M17-251P, filed 6/5/2017
  26. Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, "Scalable Attack Graph Partitioning Scheme", M17-253P, filed 6/6/2017
  27. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang "Countermeasure Selections for Moving Target Defense", M17-252P, filed 6/6/2017
  28. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, and Dijiang Huang, "Advanced Persistent Threats Detection Through Combining Dynamic and Static Attack", M17-252P, filed 6/6/2017
  29. J. Aikat (RENCI/UNC Chapel Hill), I. Baldin (RENCI/UNC Chapel Hill), M. Berman (BBN/Raytheon), J. Breen (Utah), R. rooks (Clemson), P. Calyam (Missouri), J. Chase (Duke), W. Chase (Clemson), R. Clark (Georgia Tech), C. Elliott (BBN/Raytheon), J. Griffioen (Kentucky), D. Huang (ASU), J. Ibarra (FIU), T. Lehman (Maryland), I. Monga (ESnet), A. Matta (Boston University), C. Papadopoulos (Colorado State), M. Reiter (UNC Chapel Hill), D. Raychaudhuri (Rutgers), G. Ricart (US Ignite), R. Ricci (Utah), P. Ruth (RENCI/UNC Chapel Hill), I. Seskar (Rutgers), J. Sobieski (NORDUnet/GEANT), K. Van der Merwe (Utah), K.-C.Wang (Clemson), T. Wolf (UMass), and M. Zink (UMass), "The Future of CISE Distributed Research Infrastructure", Position white paper (https://arxiv.org/abs/1803.09886) for NSF and currently is under review of ACM Computer Communication Review (CCR), 2017.
  30. Bo Li, Yijian Pei, Hao Wu, Dijiang Huang, "MADM-based smart parking guidance algorithm", PLOS one, Issue 12, NO. 12, 2017.
  31. Jin B. Hong, Dong Seong Kim, Chun-Jen Chung, and Dijiang Huang, "A Survey on the Usability and Practical Applications of Graphical Security Models", Computer Science Review, Elsevier, Jun 2017
  32. Sandeep Pisharody, Janakarajan Natarajan, Ankur Chowdhary, Abdullah Alshalan, and Dijiang Huang, "Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments", IEEE Transactions on Dependable and Secure Computing, July, 2017.
  33. Yin Zhang, Min Chen, Dijiang Huang, Di Wu, Yong Li, "iDoctor: Personalized and Professionalized Medical Recommendations Based on Hybrid Matrix Factorization", Elsevier Future Generation Computer Systems, Pages 30-35, Volume 66 Issue C, January 2017. This paper was selected by Elsevier Article Selection Celebrating Computer Science Research in China (https://www.elsevier.com/physical-sciences/computer-science/article-selection-celebrating-computer-science-research-in-china)
  34. Oussama Mjihil, Dijiang Huang, and Abdelkrim Haqiq. "Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing", in proceedings of the International Symposium on Ubiquitous Networking, Springer, 2017.
  35. Ankur Chowdhary, Vaibhav Hemant Dixit, Naveen Tiwari, Sukhwa Kyung, Dijiang Huang, and Gail-Joon Ahn, "Science DMZ: SDN based Secured Cloud Testbed", Demo, IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), 2017.
  36. Adel Alshamrani, Ankur Chowdhary, Sandeep Pisharody, Duo Lu, and Dijiang Huang, "A Defense System for Defeating DDoS Attacks in SDN based Networks", in Proceedings of International Symposium on Mobility Management and Wireless Access (MobiWac), 2017
  37. Yuli Deng, Zhen Zeng and Dijiang Huang, "ThoTh Lab: A Web-Based, Virtualized, Adaptive Learning Platform for
  38. Cybersecurity Hands-on Projects", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
  39. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, "Understanding students" engagement behavior in virtual hands-on lab", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
  40. Zhen Zeng, Yuli Deng, I-Han Hsiao, Dijiang Huang and Chun-Jen Chung, "Predicting learning outcome in virtual hands-on lab system: The role of student attitude", Poster, in Proceedings of the Thirteenth Annual ACM International Computing Education Research (ICER) conference, 2017.
  41. Duo Lu and Dijiang Huang, "A Data Driven In-Air-Handwriting Biometric Authentication System", in Proceedings of the International Joint Conference on Biometrics (IJCB), 2017.
  42. Qiuxiang Dong and Dijiang Huang, "Privacy-preserving Matchmaking in Geosocial Networks with Untrusted Servers", in Proceedings of the 37th IEEE International Conference on Distributed Computing systems (ICDCS), Poster, 2017.
  43. Lu, Duo and Li, Zhichao and Huang, Dijiang, "Platooning as a service of autonomous vehicles", in Proceedings of IEEE 18th International Symposium on World of Wireless, Mobile and Multimedia Networks (WoWMoM), 2017
  44. Duo Lu, Dijiang Huang, Andrew Walenstein, and Deep Medhi, "A Secure Microservice Framework for IoT", in Proceedings of IEEE Service Oriented Software Engineering (SOSE), 2017 (Invited Paper).
  45. Ankur Chowdhary, Sandeep Pisharody, Adel Alshamrani, and Dijiang Huang, "Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments", in Proceedings of the ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Sec"17), 2017 (Invited Paper).
  46. Dijiang Huang, "ThoTh Lab: Personalized Learning for Cybersecurity Education", Showcase at Reimagine Education Conference, 2017. (ThoTh Lab project won the Reimagine Education 2016 Bronze Award in Engineering/IT Discipline).
  47. Yuli Deng, Dijiang Huang, and Chun-Jen Chung, "Adaptive Learning Framework in ThoTh Lab, a Virtual E-Learning Platform for CS Hands-on Projects", Poster, SIGCSE 2017.
  48. Weijia Wang, Zhijie Wang, Bing Li, Qiuxiang Dong, Dijiang Huang, "IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication", https://eprint.iacr.org/2017/1100, 2017
  49. Qiuxiang Dong, Dijiang Huang, Jim Luo, Myong Kang, "HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing", https://eprint.iacr.org/2017/1101, 2017
  50. Q Dong, D Huang, J Luo, M Kang, "ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption", https://eprint.iacr.org/2017/1102, 2017

    2016 [top]

  51. Sandeep Pishoardy, Dijiang Huang, and Ankur Chowdhary, "Security Policy Checking for Distributed Software Defined Networking (SDN)", Provisional patent application # D10-103, filled 7/17/2016.
  52. Dijiang Huang, "Systems and Apparatuses for a Secure Mobile Cloud Framework for Mobile Computing and Communication", U.S. Patent NO. 9,357,331, Issued on May 31, 2016.
  53. Yan Zhu, Guohua Gan, Dijiang Huang, "PHE: An Efficient Tracing and Revoking for Traitors in Cloud File Syncing-and-Sharing", IEEE Transactions on Cloud Computing, May 2016.
  54. Bing Li, Dijiang Huang, Zhijie Wang, and Yan Zhu, "Attribute-based Access Control for ICN Naming Scheme", IEEE Transactions on Dependable and Secure Computing, April 2016.
  55. Iman El Mir, Ankur Chowdhary, Dijiang Huang, Sandeep Pisharody, Dong Seong Kim and Abdelkrim Haqiq, "Software Defined Stochastic Model for Moving Target Defense", in Proceedings of Third International Afro-European Conference for Industrial Advancement (AECIA), 2016.
  56. Ankur Chowdhary, Sandeep Pisharody, Dijiang Huang "SDN based scalable MTD solution in Cloud Network", in Proceedings of the ACM Moving Target Defense (MTD) Workshop, in conjunction with ACM CCS, 2016.
  57. Sandeep Pisharody, Ankur Chowdhary, and Dijiang Huang, "Security Policy Checking in Distributed SDN based Clouds", in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2016.
  58. Duo Lu, Zhichao Li, and Dijiang Huang, Xianglong Lu, Yuli Deng, Ankur Chowdhary, and Bing Li, "VC-bots: A Vehicular Cloud Computing Testbed with Mobile Robots", in Proceedings of ACM MobiHoc Workshop on Internet of Vehicles and Vehicles of Internet (IoV-VoI), 2016.
  59. Zhiyuan Ma, Guangchun Luo, and Dijiang Huang, "Short Term Traffic Flow Prediction Based on On-line Sequential Extreme Learning Machine", in proceedings of International Conference on Advanced Computational Intelligence, 2016
  60. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, "MobiVPN: A Mobile VPN Providing Persistency To Applications", in Proceedings of 2016 International Conference on Computing, Networking and Communications, Wireless Networks (ICNC), 2016.

    2015 [top]

  61. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "Selection of a countermeasure" (Based on our original work "Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems"), U.S. Patent NO. 9,160,761, Issue date: October 13, 2015.
  62. Alexey Vinel, Xiaomin Ma, and Dijiang Huang, "Reliable and Secure VANETs [Guest Editorial]", IEEE Transactions on Dependable and Secure Computing, Vol. 13, NO. 1, 2015.
  63. Abdullah Alshalan, Sandeep Pisharody, and Dijiang Huang, "A Survey of Mobile VPN Technologies", IEEE Communications Surveys and Tutorials, Vol PP, Issue 99, November 2015
  64. Huijun Wu, Dijiang Huang, and Yan Zhu, "Establishing a personal on-demand execution environment for mobile cloud applications," Springer Journal on Mobile Networks and Applications (MONET), Volume 20, Number 3, pp. 297307, June, 2015.
  65. Xiaoming Fu, Stefano Secci, Dijiang Huang, and Rittwik Jana, "Mobile Cloud Computing [Guest Editorial]", IEEE Communications Magazine, Volume 53, Number 3, Pages 61-62, 2015.
  66. Zhijie Wang, Dijiang Huang, Yan Zhu, Bing Li, and Chun-Jen Chung, "Efficient Attribute-Based Comparable Data Access Control", IEEE Transactions on Computers, Vol 64, Issue 12, Pages 3430-3443, February 2015.
  67. Yan Zhu, Dijiang Huang, Xin Wang, and Changjun Hu, "From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services", IEEE Transactions on Service Computing, Vol 8, Issue 4, pages 601-616, August 2015
  68. Zhibin Zhou, Dijiang Huang, and Zhijie Wang, "Efficient Privacy-Preserving Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", IEEE Transactions on Computers, Vol 64, Issue 1, pages 126-138, January, 2015.
  69. Jin B. Hong, Chun-Jen Chung, Dijiang Huang, and Dong Seong Kim, "Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", First International Symposium on Dependability in Sensor, Cloud, and Big Data Systems and Applications, Achieved in Algorithms and Architectures for Parallel Processing, Volume 9532, Lecture Notes in Computer Science, Pages 582-592, December, 2015.
  70. Chun-Jen Chung, Tianyi Xing, Dijiang Huang, Deep Medhi, and Kishor Trivedi, "SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-Tenant Datacenter Environment", in Proceedings of the Workshop on Dependability Issues on SDN and NFV (DISN), 2015
  71. Min Chen, Yixue Hao, Yong Li, Di Wu, and Dijiang Huang, "LIVES: Learning through Interactive Video and Emotion-aware System", ACM MobiHoc, Demo, 2015
  72. Huijun Wu and Dijiang Huang,  "POEM: On Establishing A Personal On-demand Execution Environment for Mobile Cloud Applications" in Proceedings of the IEEE 4th  International Conference on Mobile Services (IEEE MS), pages 41-48, 2015
  73. Huijun Wu and Dijiang Huang, "MoSeC: Mobile-Cloud Service Composition",  in Proceedings of the 3rd International Conference on Mobile Cloud Computing, Services, and Engineering (MobileCloud), 2015.

    2014 [top]

  74. Tianyi Xing, Zhenyang Xiong, Dijiang Huang, Deep Medhi, "Cloud Computing Security", Cloud Services, Networking and Management, (Eds) N. Fonseca and R. Boutaba, Book Chapter, IEEE and Wiley, page 269-294, 2014.
  75. Dijiang Huang and Zhibin Zhou, "Methods, Systems, and Apparatuses for Optimal Group Key Management for Secure Multicast Communication", U.S. Patent NO. 8,837,738, Issue date: September 16, 2014.
  76. Shingo Ata, Dijiang Huang, Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Chun-Jen Chung, Yasuhiro Sato, Deep Medhi, "SeRViTR: A Framework, Implementation, and a Testbed for a Trustworthy Future Internet", Computer Networks, Vol 63, No. 22, April 2014.
  77. Yang Qin, Dijiang Huang, and Bing Li, "STARS: A Statistical Traffic Pattern Discovery System for MANETs", IEEE Transactions on Dependable and Secure Computing (TDSC), Vol 11, Issue 2, pages 181-192, March-April, 2014.
  78. Le Xu, Dijiang Huang, and Wei-Tek Tsai, "Cloud-Based Virtual Laboratory for Network Security Education", IEEE Transactions on Education, Vol 57, Issue 3, Pages 145-150, October 17, 2014.
  79. Huijun Wu and Dijiang Huang, "Modeling Multi-factor Multi-site Risk-based Offloading for Mobile Cloud Computing", in Proceedings of the 10th International Conference on Network and Service Management (CNSM), 2014.
  80. Tianyi Xing, Zhengyang Xiong, Dijiang Huang, and Deep Medhi, "SDNIPS: Enabling the Software Defined Network Based Intrusion Prevention System in Clouds", (poster) in Proceedings of 10th International Conference on Network and Service Management (CNSM), 2014.
  81. Bing Li, Dijiang Huang, and Zhijie Wang, "Refining Traffic Information for Analysis using Evidence Theory", in Proceedings of Milcom, 2014.
  82. Zhijie Wang, Bing Li, and Dijiang Huang, "Towards Anonymous Group Setup across Multiple Domains", in Proceedings of Milcom, 2014.
  83. Bing Li, Ashwin Prabhu Verleker, Dijiang Huang, Zhijie Wang, and Yan Zhu, "Attribute-based Access Control for ICN Naming Scheme", in Proceedings of the IEEE Conference on Communications and Network Security (CNS), 2014.
  84. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, "Towards Distributed Privacy-Preserving Mobile Access Control", in Proceedings of the IEEE Globecom 2014.
  85. Zhijie Wang, Dijiang Huang, Huijun Wu, Bing Li, and Yuli Deng, Ailixier Aikebaier, and  Yuuichi Teranishi, "QoS-Constrained Sensing Task Assignment for Mobile Crowd Sensing", in Proceedings of the IEEE Globecom 2014.
  86. Yuki Kawai, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, and Ikuo Oka, "Database Oriented Management for Asynchronous and Consistent Reconfiguration in Software-Defined Networks", In Proceedings of IEEE/IFIP NOMS, 2014

    2013 [top]

  87. Dijiang Huang, Tianyi Xing, and Huijun Wu, "Mobile Cloud Computing Service Models: A User-Centric Approach", IEEE networks, Vol 27, Issue 5, Pages 6-11, Sep-Oct, 2013.
  88. Hongbin Liang, Tianyi Xing, Lin X. Cai, Dijiang Huang, Daiyuan Peng and Yan Liu, "Adaptive Computing Resource Allocation for Mobile Cloud Computing", International Journal of Distributed Sensor Networks, Vol 2013, 2013.
  89. Chun-Jen Chung, Pankaj Khatkar, Tianyi Xing, Jeongkeun Lee, and Dijiang Huang, "NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems", IEEE Transactions on Dependable and Secure Computing (TDSC), Special Issue on Cloud Computing Assessment, Vol. 10 NO. 4, pages 198-211, July-Aug 2013.
  90. Chun-Jen Chun, Jingsong Cui, Pankaj Khatkar, and Dijiang Huang. "Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations", Collaboratecom 2013.
  91. Huijun Wu, Dijiang Huang, and Samia Bouzefrane, "Making Offloading Decisions Resistant to Network Unavailability for Mobile Cloud Collaboration", Collaboratecom 2013.
    Bing Li and Dijiang Huang, "Modeling Anonymous MANET Communications Using Super-nodes", in Proceedings of Milcom, 2013.
  92. Bing Li, Zhijie Wang, and Dijiang Huang, "An Efficient and Anonymous Attribute-Based Group Setup Scheme", in Proceedings of the IEEE Globecom, 2013.
  93. Yan Zhu, Di Ma, Changjun Hu, and Dijiang Huang, "How to Use Attribute-Based Encryption to Implement Role-based Access Control in the Cloud", in Proceedings of the International Workshop on Security in Cloud Computing, in conjunction with ASIACCS, 2013.
  94. Tianyi Xing, Dijiang Huang, Le Xu, Chun-Jen Chung, Pankaj Khatkar, "SnortFlow: A OpenFlow-based Intrusion Prevention System in Cloud Environment", in Proceedings of the Second GENI Research and Educational Experiment Workshop (GREE2013), 2013.
  95. Le Xu, Li Li, Vijayakrishnan Nagarajan, Dijiang Huang, and Wei-Tek Tsai, 
Secure Web Referral Services for Mobile Cloud Computing
IEEE International Symposium on Mobile Cloud, Computing, and Service Engineering (IEEE MobileCloud), 2013. (invited)
  96. Li Li, Dijiang Huang, Zhidong Shen, and Samia Bouzefrane, "A Cloud based Dual-Root Trust Model for Secure Mobile Online Transactions", in Proceedings of IEEE WCNC 2013.
  97. Akira Wada, Yasuhiro Sato, Xuan Liu, Tianyi Xing, Shingo Ata, Deep Medhi, Dijiang Huang and Ikuo Oka, "A Behavior based Policy Management for Adaptive Trustworthiness Assignment in Future Network", In Proceedings of IFIP/IEEE International Symposium on Integrated Network Management, poster, IM"2013.
  98. Fatiha Houacine, Samia Bouzefrane, Li Li and Dijiang Huang, "MCC-OSGi: A OSGi-based Mobile Cloud Service Model", In Proceedings of the Eleventh International Symposium on Autonomous Decentralized Systems, (ISADS) 2013.

    2012 [top]

  99. Dijiang Huang, "Enhancing Cloud Security Through Software Defined Networking Approaches", Tutorial, IEEE International Conference on Cloud Networking (CloudNet), Paris, Nov 2012
  100. Dijiang Huang, "Enhancing Cloud Security Through Software Defined Networking Approaches", Tutorial, International Conference on Network and Service Management (CNSM), Las Vegas, Oct 2012
  101. Dijiang Huang, "Mobile Cloud Computing", Tutorial, IEEE International Conference on Consumer Electronics (ICCE), January 13, 2012, Las Vegas, USA
  102. Le Xu, Dijiang Huang, Wei-Tek Tsai, and Robert K. Atkinson, "V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses", International Journal of Cyber Behavior, Psychology and Learning (IJCBPL), Vol 2, Issue 3, pages 73-85, 2012.
  103. Hongbin Liang, Lin X. Cai, Dijiang Huang, Xuemin (Sherman) Shen, and Daiyuan Peng, "An SMDP-based Service Model for Inter-domain Resource Allocation in Mobile Cloud Networks", IEEE Transactions on Vehicular Technology, vol. 61, no. 5, pages 2222-2232, June 2012.
  104. Zhibin Zhou and Dijiang Huang, "Gradual Identity Exposure Using Attribute-Based Encryption", International Journal of Information Privacy, Security and Integrity (IJIPSI), Vol. 1, No. 2/3, 2012.
  105. Zhibin Zhou and Dijiang Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", In Proceedings of the 8th International Conference on Network and Service Management (CNSM), 2012
  106. Tianyi Xing, Dijiang Huang, Deep Medhi, Shingo Ata, "MobiCloud: a Geo-distributed Mobile Cloud Computing Platform", In Proceedings of the 8th International Conference on Network and Service Management (CNSM), short paper, 2012.
  107. Tianyi Xing, Hongbin Liang, Dijiang Huang, and Lin X. Cai "Geographic-based Service Request Scheduling Model for Mobile Cloud Computing", In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  108. Yang Qin, Dijiang Huang, and Xinwen Zhang, "VehiCloud: Cloud Computing Facilitating Routing In Vehicular Networks", In Proceedings of the 11th IEEE International Conference on Ubiquitous Computing and Communications (IUCC), 2012.
  109. Dijiang Huang, Sean A. Williams, and Swaroop Shere, "Cheater Detection in Vehicular Networks", In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2012.
  110. Le Xu, Dijiang Huang, Wei-Tek Tsai, "V-Lab: A Cloud-based Virtual Laboratory Platform for Hands-On Networking Courses", accepted in ACM SIGCSE Conference on innovation and Technology in Computer Science Education, 2012.
  111. Tianyi Xing, Xuan Liu, Chun-Jen Chung, Akira Wada, Shingo Ata, Dijiang Huang, and Deep Medhi, "Constructing Virtual Networking Environment in a Geo-Distributed Programmable Layer-2 Networking Environment (G-PLaNE), ICC Workshop on the Network of the Future Internet, 2012.
  112. Xuan Liu, Akira Wada, Tianyi Xing, Parikshit Juluri, Yasuhiro Sato, Shingo Ata, Dijiang Huang, Deep Medhi, "SeRViTR: A Framework for Trust and Policy Management for A Secure Internet and Its Proof-of-Concept Implementation", the 4th IEEE/IFIP International Workshop on Management of the Future Internet (ManFI), 2012
  113. Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shanbiao Wang, "Towards Temporal Access Control in Cloud Computing", in Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM), mini conference, 2012.
  114. Vijayakrishnan Nagarajan, Dijiang Huang, "Secure Web Referral Service", in Proceedings of the International Conference on Information Networking (ICOIN), 2012. 

    2011 [top]

  115. Dijiang Huang, Satyajayant Misra, Guoliang Xue, and Mayank Verma, "PACP: An Efficient Pseudonymous Authentication Based Conditional Privacy Protocol for VANETs", IEEE Transactions on Intelligent Transportations, Vol 12, Issue 3, pages 736-746, Sep., 2011
  116. Dijiang Huang, "Mobile Cloud Computing", E-Letter of Multimedia Communications Technical Committee (MMTC), IEEE Communications Society, 2011. (invited paper)
  117. Dijiang Huang, Wei-Tek Tsai, Yi-hsin Tseng, "Policy Management for Secure Data Access Control in Vehicular Networks," Springer Journal of Network and Systems Management (JNSM), Vol. 19, No. 4, pages 448-471, 2011
  118. Samia Bouzefrane, Pierre Paradinas, and Dijiang Huang, "An OSGi-based Service Oriented Architecture for Android Platforms", in Proceedings of the 23rd International Conference on Software & Systems Engineering and their Applications (ICSSEA), 2011.
  119. Dijiang Huang, Zhibin Zhou, Le Xu, Tianyi Xing, and Yunji Zhong, "Secure Data Processing Framework for Mobile Cloud Computing", In Proceedings of IEEE INFOCOM"s Workshop on Cloud Computing, 2011.
  120. Hongbin Liang, Dijiang Huang, Lin X. Cai, Xuemin (Sherman) Shen, Daiyuan Peng, "Resource Allocation for Security Services in Mobile Cloud Computing", In Proceedings of the IEEE INFOCOM"s Workshop on Machine-to-Machine Communications and Networking (M2MCN), 2011
  121. Yang Qin and Dijiang Huang, "Least Squares Disclosure Attack in Mobile Ad Hoc Networks", In Proceedings of the IEEE International Conference on Communications (ICC), Japan, 2011.
  122. Zhibin Zhou and Dijiang Huang, "Efficient and Secure Data Storage Operations for Mobile Cloud Computing", https://eprint.iacr.org/2011/185, 2011

    2010 [top]

  123. Nirav Shah and Dijiang Huang, "DRP: Data Regulation Protocol for Source-End Mitgation of Distributed Denial of Service," Network Security, Administration and Management: Advancing Technologies and Practices, D. C. Kar and M. R. Syed (Eds), Book Chapter,  IGI Global, 2010
  124. Dijiang Huang, Xiaoyan Hong, and Mario Gerla, "Situation-Aware Trust Architecture for Vehicular Networks", IEEE Communications Magazine, Volume 48, No. 11, Pages 128-135, 2010
  125. Dijiang Huang and Vinayak Kandiah, "Low-latency Mix using Split and Merge Operations," The third special issue on Security and Management, Springer Journal of Network and Systems Management (JNSM), Volume 18, Number 3, Pages 244-264, September, 2010.
  126. Hongbin Liang, Dijiang Huang, Daiyuan Peng, "On Economic Mobile Cloud Computing Model", in Proceedings of the International Workshop on Mobile Computing and Clouds (MobiCloud in conjunction with MobiCASE), (invited paper), 2010.
  127. Zhibin Zhou and Dijiang Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", Poster, 17th ACM Conference on Computer and Communications Security (CCS), 2010.
  128. Dijiang Huang, Swaroop Shere, Soyoung Ahn, "Dynamic Highway Congestion Detection And Prediction Based On Shock Waves," In Proceedings of the ACM VANET (in conjunction of ACM Mobicom), 2010
  129. Dijiang Huang, "Anonymous Certification Services," In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  130. Dijiang Huang and Vetri Arasan, "On Measuring Email-based Social Network Trust," In Proceedings of the Communication & Information System Security Symposium, IEEE Globecom 2010.
  131. Dijiang Huang, Shingo Ata, and Deep Medhi, "Establishing Secure Virtual Trust Routing And Provisioning Domains For Future Internet," In Proceedings of the Next Generation Networking Symposium, IEEE Globecom 2010.
  132. Dijiang Huang, Vetri Arasan, "Email-based Social Network Trust," In Proceedings of the Symposium on Social Intelligence and Networking (SIN), SocialCom, pages 363-370, 2010
  133. Dijiang Huang, Zhibin Zhou, Yan Zhu, "Gradual Identity Exposure Using Attribute-Based Encryption," In Proceedings of the Second IEEE International Conference on Information Privacy, Security, Risk and Trust (PASSAT), pages 881-888, 2010.
  134. Nanxi Chen, Mario Gerla, Dijiang Huang, and Xiaoyan Hong, "Secure, Selective Group Broadcast in Vehicular Networks using Dynamic Attribute Based Encryption", In Proceedings of The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc-Net), 2010.
  135. Dijiang Huang and Utkarsh Agarwal, "Countering Repacketization Watermarking Attacks on Tor Network", In proceedings of the International Conference on Applied Cryptography and Network Security (ACNS), 2010.
  136. Dijiang Huang, Xiwen Zhang, Myong Kang, and Jim Luo "MobiCloud: A Secure Mobile Cloud Framework for Pervasive Mobile Computing And Communication,"  In Proceedings of the 5th IEEE International Symposium on Service-Oriented System Engineering (SOSE), pages 27-34, 2010. (invited paper)
  137. Nirav Shah and Dijiang Huang , "A-WEOR: Communication Privacy Protection for Wireless Mesh Networks using Encoded Opportunistic Routing", In Proceedings of the Scond International Workshop on CARier-grade wireless MEsh Networks (CARMEN), in conjunction with IEEE Infocom, 2010.
  138. Zhibin Zhou and Dijiang Huang, "Constructing Efficient Attribute-Based Broadcast Encryption", In Proceedings of IEEE Conference on Computer Communications (Infocom, poster) 2010.
  139. Zhibin Zhou and Dijiang Huang, "An Optimal Key Distribution Scheme for Multicast Group Communication," In Proceedings of IEEE Conference on Computer Communications (Infocom, mini conference), 2010.
  140. Dijiang Huang, Zhibin Zhou, Xiaoyan Hong, Mario Gerla, "Establishing Email-based Social Network Trust for Vehicular Networks", In Proceedings of IEEE CCNC, Special Session on Social Networking, 2010
  141. Vijayakrishnan Nagaraja, Vetri Arasan, and Dijiang Huang, "Using Power Hopping to Counter MAC Spoof Attacks in WLAN", In Proceedings of IEEE CCNC, 2010
  142. Sushma Myneni and Dijiang Huang, "IEEE 802.11 Wireless LAN Control Frame Protection", In Proceedings of IEEE CCNC, 2010.
  143. Zhibin Zhou and Dijiang Huang, "On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption", https://eprint.iacr.org/2010/395, 2010

    2009 [top]

  144. Sean A. Williams and Dijiang Huang, "Group force mobility model and its obstacle avoidance capability", Journal of the International Academy of Astronautics, Acta Astronautica, Volume 65, Issues 7-8, Pages 949-957, October-November 2009.
  145. Dijiang Huang and Mayank Verma, "ASPE: Attribute Based Secure Policy Enforcement for Data Access Control in Vehicular Ad Hoc Networks", Ad Hoc Networks Journal (Special Issue of Privacy & Security in WSNs), Vol 7, Issue 8, pages 1526-1535, 2009.
  146. Yang Qin and Dijiang Huang, "A Statistical Traffic Pattern Discovery System for MANETs", In Proceedings of  Milcom, 2009.
  147. Dijiang Huang, "Secure Multi-path Data Delivery in Sensor Networks," In Proceedings of Milcom, 2009.
     Mukesh Jagasia and Dijiang Huang, "Distributed Data-theft Detection in Wireless Sensor Networks", In Proceedings of IEEE Globecom, AHSN, 2009.
  148. Harsh Kapoor and Dijiang Huang, "Secret-sharing based secure communication protocols for passive RFIDs", In Proceedings of IEEE Globecom, CISS, 2009.
  149. Dijiang Huang and Harsh Kapoor, "Towards lightweight secure communication protocols for passive RFIDs", In Proceedings of the 6th IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) , pages 1-7, 2009.
  150. Dijiang Huang, "On An Information Theoretic Approach to Model Anonymous MANET Communications", In Proceedings of IEEE International Symposium on Information Theory (ISIT), pages 1629-1633, 2009.
  151. Satyajayant Misra, Mayank Verma, Dijiang Huang, Guoliang Xue, "SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID tags", In Proceedings of  IEEE ICC Wireless Networking, pages 1-6,2009.
  152. Mayank Verma and Dijiang Huang, "SeGCom: Secure Group Communication in VANETs", Accepted to appear at IEEE Intelligent Vehicular Communications System (ICVS), 2009.
  153. Zhibin Zhou and Dijiang Huang, "Optimal Multicast Group Communication", https://eprint.iacr.org/2009/010, 2009

    2008 [top]

  154. Hao Li, Jian Huang, Philip Sweany, and Dijiang Huang, "FPGA Implementations of Elliptic Curve Cryptography and Tate Pairing over a Binary Field",  Journal of Systems Architecture (an Elsevier journal), Vol 54, Issue 12, Pages 1077-1088, Dec 2008.
  155. Dijiang Huang, "Unlinkability Measure for IEEE 802.11 based MANETs", IEEE Transactions on Wireless Communications, Vol. 7, NO. 2, Pages 1025-1034, Feb 2008.
  156. Dijiang Huang, Deep Medhi, "A Secure Group Key Management Scheme for Hierarchical Mobile Ad-hoc Networks," Ad Hoc Networks Journal, Vol. 6 NO. 4, Pages 560-577, Feb, 2008.
  157. Zhibin Zhou and Dijiang Huang, "Computing Cryptographic Pairing in Sensors"
  158. ACM SIGBED Review, Special Issue on the RTSS Forum on Deeply Embedded Real-Time Computing, Vol. 5, NO. 1, Jan, 2008.
  159. Yang Qin, Yin Yin, Dijiang Huang, and Nirav Shah, "A Comparative Study of Anonymous 802.11 Protocols", Accepted to appear at Milcom, 2008.
  160. Dijiang Huang and Zhibin Zhou, "A Secure RFID Access Control Mechanism,"Security in RFID and Sensor Networks, Y. Zhang, P. Kitsos (Eds), Auerbach Publications, CRC Press, Book Chapter, Taylor and Francis Group, 2008
  161. Dijiang Huang, "Secure Multi-Path Data Delivery in Wireless Sensor Networks,"Wireless and Sensor Networks Security, Z. Jiang, Y. Pan (Eds), Book Chapter, Nova Science Publishers, Inc. 2008.
  162. Xiaoyan Hong, Dijiang Huang, Mario Gerla, Zhen Cao, "SAT: Building New Trust Architecture for Vehicular Networks", in Proceedings of the 3rd ACM International Workshop on Mobility in the Evolving Internet Architecture (ACM MobiArch), pages 31-36, 2008.
  163. Vinayak Kandiah, Dijiang Huang, and Harsh Kapoor, "C-Mix: A lightweight Anonymous Routing Approach", Information Hiding (IH), Lecture Notes in Computer Science, vol. 5284 LNCS, pages 294-308, 2008.
  164. Yang Qin, Dijiang Huang, and Vinayak Kandiah, "OLAR: On-demand Lightweight Anonymous Routing in MANETs", In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 72-79, 2008. (Best paper award)
  165. Dijiang Huang and Yang Qin, "An Information Theoretic Approach for MANET Unlinkability Measure", In Proceedings of The Fourth International Conference on Mobile Computing and Ubiquitous Networking (ICMU), pages 132-139, 2008.
  166. Zhibin Zhou and Dijiang Huang, "SRK: A Distributed RFID Data Access Control Mechanism" in proceedings of the IEEE International Conference on Communications (ICC) , pages 2854-2858, 2008.
  167. Dijiang Huang, Mayank Verma, and Vinayak Kandiah,  "Privacy Preservation Services: Challenges and Solutions", Accepted by ACM Symposium of Applied Computing (SAC), Computer Security Track, pages 2110-2115, 2008.

    2007 [top]

  168. Deep Medhi and Dijiang Huang, "Secure and Resilient Routing: A Framework for Resilient Network Architectures," Information Assurance: Dependability and Security in Networked Systems, Y. Qian, D. Tipper, P. Krishnamurthy, and J. Joshi, (Eds.), Book Chapter, Morgan Kaufmann Publishers (an imprint of Elsevier), 2007.
  169. Dijiang Huang, "Elliptic & Curve Cryptography and Their Applications," Tutorial, The Fourth IASTED International Conference on Communication, Network, and Information Security (CNIS) 2007, September 24-26, 2007, UC Berkeley, Berkeley, California, USA
  170. Dijiang Huang, Manish Mehta, Appie van de Liefvoort, and Deep Medhi, "Modeling Pairwise Key Establishment for Random Key Predistribution in Large-scale Sensor Networks," IEEE/ACM Transactions on Networking, Vol 15, Issue 5, Pages 1204-1215, Oct. 2007.
  171. Dijiang Huang and Deep Medhi, "Secure Pairwise Key Establishment in Large-scale Sensor Networks: an Area Partitioning and Multi-group Key Predistribution Approach," ACM Transactions on Sensor Networks, Vol 3, Issue 3, No. 16, Aug. 2007.
  172. Dijiang Huang, "Pseudonym-Based Cryptography for Anonymous Communications in Mobile Ad-hoc Networks," Special Issue on Cryptography in Networks, int. J. Security and Networks, Vol. 2, NOs. 3/4, pages 272-283, 2007.
  173. Zhibin Zhou and Dijiang Huang, "RFID Keeper: An RFID Data Access Control Mechanism," In Proceedings of IEEE Globecom, pages 4570-4574, 2007.
  174. Archana Ramachandran, Zhibin Zhou, and Dijiang Huang, "Computing Cryptographic Algorithms in Portable and Embedded Devices," In Proceedings of the IEEE International Conference on Portable Information Devices (PORTABLE), pages 1-7,2007.
  175. Dijiang Huang, Mayank Verma, Archana Ramachandran, and Zhibin Zhou, "A Distributed ePedigree Architecture," in Proceedings of the 11th International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2007), pages 220-227, Mar. 2007.

    2006 [top]

  176. Dijiang Huang, Qing Cao, Amit Sinha, Marc Schniederjans, Cory Beard, Lein Harn, and Deep Medhi, "New architecture for Intra-domain network security issues," Communications of the ACM, Vol 49, Issue 11, Pages: 64 - 72, Nov. 2006.
  177. Dijiang Huang, "On Measuring Anonymity for Wireless Mobile Ad-hoc Networks," in Proceedings of the 2nd IEEE International Workshop on Performance and Management of Wireless and Mobile Networks (P2MNet), pages 779-786, Nov. 2006.
  178. Dijiang Huang, "Traffic Analysis-based Unlinkability Measure for IEEE 802.11b-based Communication Systems," in Proceedings of the ACM Workshop on Wireless Security (WiSe, in conjunction with ACM MobiCom), Pages 65-74, Sep. 2006.
  179. Sean Williams and Dijiang Huang, "A group force mobility model," in Proceedings of the 9th Communications and Networking Simulation Symposium, pages 333-340, Apr. 2006.
  180. Sean. A. Williams and Dijiang Huang, "Group Force Mobility Models and Their Obstacle Avoidance Capability," In Proceedings of the AIAA 57th International Astronautical Congress (IAC 2006), vol. 4, pp. 2759-2766, 2006.
  181. Dijiang Huang and Hao Li, "Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices," in Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium, pages 53-56, Apr. 2006.
  182. Dijiang Huang, Amit Sinha, and Deep Medhi, "On Providing Confidentiality in Link State Routing Protocol," in Proceedings of the IEEE Consumer Communications and Networking Conference, pages 671-675, Jan. 2006.
  183. Dijiang Huang and Hao Li, "Admissibility and Anonymity Based Cryptography and Its Implementation in Embedded Devices", in Proceedings of Work-in-Progress Session IEEE Real-Time and Embedded Technology and Applications Symposium, pages 53-56, 2006.

    2005 [top]

  184. Dijiang Huang, "An Identity-Based Blind Key Generation and Signature Scheme", in Proceedings of the Conference on information Security and Cryptology (CISC), pages 65-73, Dec. 2005.
  185. Gaurav Agrawal, Dijiang Huang, and Deep Medhi, "Network Protection Design for Reliable MPLS Networks," in Proceedings of the 5th International Workshop on Design of Reliable Communication Networks (DRCN), pages, 481-486, Oct. 2005.
  186. Dijiang Huang and Deep Medhi, "A Byzantine Resilient Multi-path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks," in Proceedings of the 5th IEEE International Workshop on Algorithms for Wireless, Mobile, Ad Hoc and Sensor Networks (IEEE WMAN, in conjunction with IPDPS), pages 240b, Apr. 2005.
  187. Dijiang Huang, Manish Mehta, and Deep Medhi, "Source Routing Based Pairwise Key Establishment Protocol for Sensor Networks," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 177 - 183. Apr. 2005.
  188. Dijiang Huang, Amit Sinha, and Deep Medhi, "A Key Distribution Scheme for Double Authentication in Link State Routing Protocol," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 19 - 24., Apr. 2005.
  189. Manish Mehta, Dijiang Huang, and Lein Harn, "RINK-RKP: A Scheme for Key Predistribution and Shared-Key Discovery in Sensor Networks," in Proceedings of the 24th IEEE International Performance Computing and Communications Conference, pages 193-197, Apr. 2005.
  190. Dijiang Huang, "Using Delaunay Triangulation to Construct Obstacle Detour Mobility Model," in Proceedings of the IEEE Wireless Communications and Networking Conference (WCNC), pages 1644-1649, Vol. 3, Mar. 2005.

    2004 [top]

  191. Dijiang Huang, "Many-to-Many Secure Group Communication and Its Applications," PhD Dissertation, Department: Computer Science and Electrical Engineering, University of Missouri-Kansas City,  December 17 2004
  192. Dijiang Huang and Deep Medhi, "A Key-chain Based Keying Scheme for Many-to-Many Secure Group Communication," ACM Transactions on information and System Security (TISSEC), Vol 7, NO. 4, Pages 523-552, Nov. 2004.
  193. Dijiang Huang, Manish Mehta, Deep Medhi, and Lein Harn, "Location-aware Key Management Scheme for Wireless Sensor Networks," in Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN "04, in conjunction with ACM CCS2004), pages 29-42, Oct. 2004.
  194. Dijiang Huang and Qing Cao, "Constructing Realistic Mobility Model: A New Framework," Presented in the 35th Annual Meeting of the Decision Sciences institute (DSI), Nov. 2004. Boston, Massachusetts.

    2003 [top]

  195. Dijiang Huang, Deep Medhi, Cory Beard, and Lein Harn "Trust Analysis of Link State Network Routing", in Proceedings of the 2nd International Workshop on Trusted internet (TIW), Hyderabad, India, December 17, 2003.
  196. Dijiang Huang, Amit Sinha, and Deep Medhi, "A Double Authentication Scheme to Detect Impersonation Attack in Link State Routing Protocols," in Proceedings of the IEEE International Conference on Communications (ICC), pages 1723 - 1727, Vol. 3, May. 2003.
  197. Dijiang Huang, "Secure Link State Routing Protocol: A Framework," In the Doctoral Symposium, International Conference on Distributed Computing System (ICDCS), Providence, RI, May 19-22, 2003. 
Copyright 2018