Huirong Fu
According to our database1,
Huirong Fu
authored at least 98 papers
between 1999 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2023
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification.
CoRR, 2023
2021
Wirel. Networks, 2021
Proceedings of the International Conference on Computational Science and Computational Intelligence, 2021
2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Proceedings of the First IEEE International Conference on Trust, 2019
Proceedings of the 3rd International Conference on Information System and Data Mining, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
IEEE Access, 2018
Proceedings of the IEEE International Conference on Consumer Electronics, 2018
Information-Theoretic Security and Energy Efficiency for Information and Power Transfer in Two-Hop Wireless Relay Networks.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018
2017
Empirical statistical inference attack against PHY-layer key extraction in real environments.
Proceedings of the 2017 IEEE Military Communications Conference, 2017
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017
Location Privacy, Application Overhead and Congestion in VANET Location Based Services.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
2016
IEEE Trans. Intell. Transp. Syst., 2016
Proceedings of the 2016 International Conference on Computing, 2016
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016
2015
Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
IEEE Trans. Wirel. Commun., 2014
IEEE Trans. Intell. Transp. Syst., 2014
Comput. Commun., 2014
Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014
2013
Int. J. Interdiscip. Telecommun. Netw., 2013
Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications.
Int. J. Interdiscip. Telecommun. Netw., 2013
Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013
2012
An IEEE 802.11p-Based Multichannel MAC Scheme With Channel Coordination for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012
A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs).
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012
2011
Wirel. Commun. Mob. Comput., 2011
Secur. Commun. Networks, 2011
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011
2010
Int. J. Data Min. Model. Manag., 2010
Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate.
Proceedings of the 2010 Spring Simulation Multiconference, 2010
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010
2009
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
Proceedings of the Communication and Networking, 2009
Proceedings of the Eighth IEEE International Conference on Dependable, 2009
Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009
2008
Replication attack on random key pre-distribution schemes for wireless sensor networks.
Comput. Commun., 2008
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008
Robustness of Grid-based Deployment in Wireless Sensors Network.
Proceedings of the 2008 International Conference on Wireless Networks, 2008
Modeling Attacks on Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Wireless Networks, 2008
Proceedings of the Networks for Grid Applications, Second International Conference, 2008
Measuring the performance of IEEE 802.11p using ns-2 simulator for vehicular networks.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008
Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management.
Proceedings of the 2008 International Conference on Security & Management, 2008
Intrusion Detection System for Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Security & Management, 2008
2007
A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile <i>Ad Hoc</i> Networks.
IEEE Trans. Veh. Technol., 2007
Comput. Networks, 2007
Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007
Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation.
Proceedings of the Future Generation Communication and Networking, 2007
Proceedings of the Future Generation Communication and Networking, 2007
Security and Privacy: Open Issues with RFID.
Proceedings of the 2007 International Conference on Security & Management, 2007
An Overview of Multi-modal Biometrics for Authentication.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Int. J. Netw. Secur., 2006
Int. J. Commun. Syst., 2006
Blom-based Q-composite: A Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006
2005
Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
Unified Solution to Registration, Authentication and Billing for Wireless Hotspots: Architecture and Protocols.
Proceedings of the 2005 International Conference on Wireless Networks, 2005
2004
End-to-End Mobility Management: A Two-Phase Deployment Scheme for Personal Use.
Proceedings of the International Conference on Wireless Networks, 2004
Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure.
Proceedings of the International Conference on Wireless Networks, 2004
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004
2003
Variable segmentation based on intrinsic video rate characteristics to transport pre-stored video across networks.
Int. J. Commun. Syst., 2003
Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2003
Recent Advances on Intrusion Detection Techniques.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
Video Segmentation for Transporting Pre-Stored Video across Networks.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003
2001
Dynamic bandwidth allocation and buffer dimensioning under equal segment scheme to support video-on-demand services.
Int. J. Commun. Syst., 2001
Adaptive bandwidth allocation based on playback tunnel to support video on demand service over ATM networks.
Comput. Commun., 2001
Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks.
Comput. Commun., 2001
Proceedings of the Quality of Service, 2001
2000
Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks.
Comput. Commun., 2000
A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services.
Comput. Commun., 2000
1999
Comput. Commun., 1999
Proceedings of the IEEE International Conference on Networks 1999, 1999