Dijiang Huang
Orcid: 0000-0003-3257-6349
According to our database1,
Dijiang Huang
authored at least 175 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
2005
2010
2015
2020
0
5
10
15
20
25
1
1
6
1
2
9
5
2
5
3
3
4
3
3
2
4
3
1
1
1
2
1
12
13
10
6
6
8
11
9
1
14
6
3
2
3
6
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Dependable Secur. Comput., 2024
2023
Comput. Networks, May, 2023
Proceedings of the IEEE/ACM Symposium on Edge Computing, 2023
2022
IEEE Trans. Netw. Serv. Manag., December, 2022
LICALITY - Likelihood and Criticality: Vulnerability Risk Prioritization Through Logical Reasoning and Deep Learning.
IEEE Trans. Netw. Serv. Manag., 2022
SCVS: On AI and Edge Clouds Enabled Privacy-preserved Smart-city Video Surveillance Services.
ACM Trans. Internet Things, 2022
IEEE Trans. Dependable Secur. Comput., 2022
Comput. Networks, 2022
Comput. Networks, 2022
2021
NeoCyberKG: Enhancing Cybersecurity Laboratories with a Machine Learning-enabled Knowledge Graph.
Proceedings of the ITiCSE '21: Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V.1, Virtual Event, Germany, June 26, 2021
Global Feature Analysis and Comparative Evaluation of Freestyle In-Air-Handwriting Passcode for User Authentication.
Proceedings of the ACSAC '21: Annual Computer Security Applications Conference, Virtual Event, USA, December 6, 2021
2020
IEEE Commun. Surv. Tutorials, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
2019
Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments.
IEEE Trans. Dependable Secur. Comput., 2019
A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities.
IEEE Commun. Surv. Tutorials, 2019
Proceedings of the 2019 IEEE Wireless Communications and Networking Conference, 2019
Building private blockchains over public blockchains (PoP): an attribute-based access control approach.
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
S3: A DFW-based Scalable Security State Analysis Framework for Large-Scale Data Center Networks.
Proceedings of the 22nd International Symposium on Research in Attacks, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the International Conference on Computing, Networking and Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
General Sum Markov Games for Strategic Detection of Advanced Persistent Threats Using Moving Target Defense in Cloud Networks.
Proceedings of the Decision and Game Theory for Security - 10th International Conference, 2019
Proceedings of the ACM Conference on Global Computing Education, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
2018
IEEE Trans. Dependable Secur. Comput., 2018
PHE: An Efficient Traitor Tracing and Revocation for Encrypted File Syncing-and-Sharing in Cloud.
IEEE Trans. Cloud Comput., 2018
Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks.
CoRR, 2018
FMCode: A 3D In-the-Air Finger Motion Based User Login Framework for Gesture Interface.
CoRR, 2018
Conceptualizing Student Engagement in Virtual Hands-on Lab: Preliminary Findings from a Computer Network Security Course (Abstract Only).
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018
A Sliding Window Based Monitoring Scheme to Detect and Prevent DDoS Attack in Data Center Networks in a Dynamic Traffic Environment.
Proceedings of the 39th IEEE Sarnoff Symposium 2018, Newark, NJ, USA, 2018
Proceedings of the 2018 IEEE Military Communications Conference, 2018
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Prompt Lightweight VPN Session Resumption for Rapid Client Mobility and MTD Enablement for VPN Servers.
Proceedings of the 2018 IEEE International Conference on Communications, 2018
Proceedings of the 2018 International Conference on Biometrics, 2018
Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation.
Proceedings of the IEEE Global Communications Conference, 2018
Proceedings of the Decision and Game Theory for Security - 9th International Conference, 2018
Improving student learning performance in a virtual hands-on lab system in cybersecurity education.
Proceedings of the IEEE Frontiers in Education Conference, 2018
Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education.
Proceedings of the IEEE Frontiers in Education Conference, 2018
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018
Achieving Fine-Grained Access Control with Discretionary User Revocation over Cloud Data.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
IR-CP-ABE: Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Flexible Secure Group-Based Communication.
IACR Cryptol. ePrint Arch., 2017
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption.
IACR Cryptol. ePrint Arch., 2017
HIR-CP-ABE: Hierarchical Identity Revocable Ciphertext-Policy Attribute-Based Encryption for Secure and Flexible Data Sharing.
IACR Cryptol. ePrint Arch., 2017
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization.
Future Gener. Comput. Syst., 2017
Comput. Sci. Rev., 2017
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017
Improving Attack Graph Scalability for the Cloud Through SDN-Based Decomposition and Parallel Processing.
Proceedings of the Ubiquitous Networking - Third International Symposium, 2017
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017
ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017
Proceedings of the 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks, 2017
Proceedings of the 15th ACM International Symposium on Mobility Management and Wireless Access, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE International Joint Conference on Biometrics, 2017
Optimized Security as a Service Platforms via Stochastic Modeling and Dynamic Programming.
Proceedings of the Innovations in Bio-Inspired Computing and Applications, 2017
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017
2016
IEEE Trans. Dependable Secur. Comput., 2016
Proceedings of the First International Workshop on Internet of Vehicles and Vehicles of Internet, 2016
Proceedings of the 2016 International Conference on Computing, 2016
Short term traffic flow prediction based on on-line sequential extreme learning machine.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016
2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Serv. Comput., 2015
Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption.
IEEE Trans. Computers, 2015
IEEE Trans. Computers, 2015
Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
Mob. Networks Appl., 2015
POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015
Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
IEEE Trans. Educ., 2014
IEEE Trans. Dependable Secur. Comput., 2014
SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet.
Comput. Networks, 2014
A database oriented management for asynchronous and consistent reconfiguration in Software-Defined Networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the 2014 IEEE Military Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
Proceedings of the IEEE Global Communications Conference, 2014
SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds.
Proceedings of the 10th International Conference on Network and Service Management, 2014
Proceedings of the 10th International Conference on Network and Service Management, 2014
Proceedings of the IEEE Conference on Communications and Network Security, 2014
2013
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
IEEE Trans. Dependable Secur. Comput., 2013
Int. J. Distributed Sens. Networks, 2013
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013
Proceedings of the 32th IEEE Military Communications Conference, 2013
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013
A behavior based policy management for adaptive trustworthiness assignment in future network.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013
Proceedings of the 2013 IEEE Global Communications Conference, 2013
Making offloading decisions resistant to network unavailability for mobile cloud collaboration.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013
How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013
2012
An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks.
IEEE Trans. Veh. Technol., 2012
Int. J. Inf. Priv. Secur. Integr., 2012
V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses.
Int. J. Cyber Behav. Psychol. Learn., 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
Proceedings of the 11th IEEE International Conference on Trust, 2012
SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012
Proceedings of the 2012 International Conference on Information Networking, 2012
Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE).
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 8th International Conference on Network and Service Management, 2012
2011
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs.
IEEE Trans. Intell. Transp. Syst., 2011
J. Netw. Syst. Manag., 2011
IACR Cryptol. ePrint Arch., 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
IACR Cryptol. ePrint Arch., 2010
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010
Proceedings of the Mobile Computing, Applications, and Services, 2010
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010
Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet.
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
Proceedings of the 7th IEEE Consumer Communications and Networking Conference, 2010
2009
Ad Hoc Networks, 2009
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009
Proceedings of the IEEE International Symposium on Information Theory, 2009
Proceedings of IEEE International Conference on Communications, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009
2008
FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field.
J. Syst. Archit., 2008
Ad Hoc Networks, 2008
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of IEEE International Conference on Communications, 2008
2007
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach.
ACM Trans. Sens. Networks, 2007
Modeling pairwise key establishment for random key predistribution in large-scale sensor networks.
IEEE/ACM Trans. Netw., 2007
Int. J. Secur. Networks, 2007
Proceedings of the Global Communications Conference, 2007
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007
2006
Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006
Proceedings of the LCN 2006, 2006
Proceedings of the 3rd IEEE Consumer Communications and Networking Conference, 2006
2005
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005
A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005
RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005
Proceedings of the 5th International Workshop on Design of Reliable Communication Networks, 2005
2004
ACM Trans. Inf. Syst. Secur., 2004
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004
2003
A double authentication scheme to detect impersonation attack in link state routing protocols.
Proceedings of IEEE International Conference on Communications, 2003