Chin-Tser Huang

Orcid: 0000-0003-3983-972X

According to our database1, Chin-Tser Huang authored at least 100 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Blockchain-Based E-Voting Mechanisms: A Survey and a Proposal.
Network, 2024

The universal federator: A third-party authentication solution to federated cloud, edge, and fog.
J. Netw. Comput. Appl., 2024

Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.
Proceedings of the Data and Applications Security and Privacy XXXVIII, 2024

2023
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.
Proceedings of the Ubiquitous Security, 2023

SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.
Proceedings of the Ubiquitous Security, 2023

SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.
Proceedings of the Provable and Practical Security, 2023

Evaluation of Different Time Series Forecasting Models for 5G V2V Networks.
Proceedings of the International Conference on Computing, Networking and Communications, 2023

Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement.
Proceedings of the 15th International Conference on COMmunication Systems & NETworkS, 2023

2022
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment.
Network, 2022

Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022

The Effect of Dust and Sand on the Propagating EM Millimeter Plane Wave.
Proceedings of the IEEE International Conference on Wireless for Space and Extreme Environments, 2022

Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers.
Proceedings of the IEEE International Conference on Trust, 2022

A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022

2021
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2021

Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework.
CoRR, 2021

The Effect of Dust and Sand on the 5G Terrestrial Links.
CoRR, 2021

The effect of Dust and Sand on the 5G Millimeter-Wave links.
Proceedings of the 2021 IEEE International Conference on Wireless for Space and Extreme Environments, 2021

Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain.
Proceedings of the 30th International Conference on Computer Communications and Networks, 2021

Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising.
IEEE Trans. Dependable Secur. Comput., 2020

Maximizing accuracy in multi-scanner malware detection systems.
Comput. Networks, 2020

Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.
IEEE Access, 2020

Detecting Counterfeit ICs with Blockchain-based Verification Framework.
Proceedings of the IEEE International Smart Cities Conference, 2020

2019
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.
IEEE Access, 2019

Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions.
Proceedings of the 2019 IEEE International Smart Cities Conference, 2019

Data Dependencies Preserving Shuffle in Relational Database.
Proceedings of the 2nd International Conference on Data Intelligence and Security, 2019

A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Securing Relational Database Storage with Attribute Association Aware Shuffling.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network.
Opt. Switch. Netw., 2018

A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis.
Comput. Hum. Behav., 2018

Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment.
Proceedings of the IEEE International Smart Cities Conference, 2018

2017
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.
Int. J. Netw. Secur., 2017

Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates.
Electron. Commer. Res., 2017

MIST: Mobility-inspired software-defined fog system.
Proceedings of the IEEE International Conference on Consumer Electronics, 2017

A game theoretic approach for inspecting web-based malvertising.
Proceedings of the IEEE International Conference on Communications, 2017

Probabilistic treatment of service assurance in distributed information systems.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

Benefits and schemes of prefetching from cloud to fog networks.
Proceedings of the 6th IEEE International Conference on Cloud Networking, 2017

2016
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations.
J. Electr. Comput. Eng., 2016

Cloud Security.
IEEE Cloud Comput., 2016

Privacy preserving proximity testing using elliptic curves.
Proceedings of the 26th International Telecommunication Networks and Applications Conference, 2016

Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network.
Proceedings of the Information Security Practice and Experience, 2016

Jamming mobility in 802.11p networks: Modeling, evaluation, and detection.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

Poster Abstract: Smart Urban Surveillance Using Fog Computing.
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2016

2015
Automated Collection and Analysis of Malware Disseminated via Online Advertising.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Feedback-based smartphone strategic sampling for BYOD security.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014

2013
PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications.
Proceedings of the 33rd International Conference on Distributed Computing Systems Workshops (ICDCS 2013 Workshops), 2013

Smartphone strategic sampling in defending enterprise network security.
Proceedings of IEEE International Conference on Communications, 2013

2012
Traffic-aware geographic forwarding in vehicular ad hoc networks.
Proceedings of the ninth ACM international workshop on Vehicular inter-networking, 2012

A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud.
Proceedings of the 41st International Conference on Parallel Processing Workshops, 2012

Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Textact: A text-action based web authentication scheme.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

A practical implementation of veiled certificate for user-centric privacy protection.
Proceedings of the 50th Annual Southeast Regional Conference, 2012

2011
Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks.
Comput. Commun., 2011

Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations.
Proceedings of IEEE International Conference on Communications, 2011

Automatic Selection of Routers for Placing Early Filters of Malicious Traffic.
Proceedings of the Global Communications Conference, 2011

2010
Stabilization of Flood Sequencing Protocols in Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2010

Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks.
Proceedings of IEEE International Conference on Communications, 2010

2009
An Adaptive Approach to Granular Real-Time Anomaly Detection.
EURASIP J. Adv. Signal Process., 2009

Signal Processing Applications in Network Intrusion Detection Systems.
EURASIP J. Adv. Signal Process., 2009

Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements.
Comput. Secur., 2009

Stabilization of Maximal-Metric Routing without Knowledge of Network Size.
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009

On the Benefits of Early Filtering of Botnet Unwanted Traffic.
Proceedings of the 18th International Conference on Computer Communications and Networks, 2009

Privacy-preserving multi-dimensional credentialing using veiled certificates.
Proceedings of the Fifth Cyber Security and Information Intelligence Research Workshop, 2009

P2F: A User-Centric Privacy Protection Framework.
Proceedings of the The Forth International Conference on Availability, 2009

2008
Secure Multicast in WiMAX.
J. Networks, 2008

Mutual information applied to anomaly detection.
J. Commun. Networks, 2008

Responding to Security Issues in WiMAX Networks.
IT Prof., 2008

Wavelet-based Real Time Detection of Network Traffic Anomalies.
Int. J. Netw. Secur., 2008

LOFT: Low-Overhead Freshness Transmission in Sensor Networks.
Proceedings of the IEEE International Conference on Sensor Networks, 2008

Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR.
Proceedings of the 2008 5th International Symposium on Wireless Communication Systems, 2008

2007
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.
Int. J. Sens. Networks, 2007

Securing VoIP Services in Multi-Hop Wireless Mesh Networks.
Proceedings of the 4th IEEE International Symposium on Wireless Communication Systems, 2007

Summarization of Wearable Videos Based on User Activity Analysis.
Proceedings of the Ninth IEEE International Symposium on Multimedia, 2007

Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

Containing Hitlist-Based Worms with Polymorphic Signatures.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Fates: A Granular Approach to Real-Time Anomaly Detection.
Proceedings of the 16th International Conference on Computer Communications and Networks, 2007

Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks.
Proceedings of the Global Communications Conference, 2007

Chinese remainder theorem based group key management.
Proceedings of the 45th Annual Southeast Regional Conference, 2007

2006
Convergence of IPsec in presence of resets.
J. High Speed Networks, 2006

Fault Masking in Tri-redundant Systems.
Proceedings of the Stabilization, 2006

Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions.
Proceedings of the 3rd IEEE International Symposium on Wireless Communication Systems, 2006

On capturing and containing E-mail worms.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2006

Security issues in privacy and key management protocols of IEEE 802.16.
Proceedings of the 44st Annual Southeast Regional Conference, 2006

Hop Integrity in the Internet
Advances in Information Security 21, Springer, ISBN: 978-0-387-24426-6, 2006

2005
A Dual Authentication Protocol for IEEE 802.11 Wireless LANs.
Proceedings of the 2nd IEEE International Symposium on Wireless Communication Systems, 2005

State Checksum and Its Role in System Stabilization.
Proceedings of the 25th International Conference on Distributed Computing Systems Workshops (ICDCS 2005 Workshops), 2005

A secure cookie protocol.
Proceedings of the 14th International Conference On Computer Communications and Networks, 2005

2003
A secure address resolution protocol.
Comput. Networks, 2003

2002
Hop integrity in computer networks.
IEEE/ACM Trans. Netw., 2002

Key Trees and the Security of Interval Multicast.
Proceedings of the 22nd International Conference on Distributed Computing Systems (ICDCS'02), 2002

2001
On the Security and Vulnerability of PING.
Proceedings of the Self-Stabilizing Systems, 5th International Workshop, 2001

An anti-replay window protocol with controlled shift.
Proceedings of the 10th International Conference on Computer Communications and Networks, 2001

2000
Anti-replay window protocols for secure IP.
Proceedings of the Proceedings Ninth International Conference on Computer Communications and Networks, 2000


  Loading...