Jie Huang
Orcid: 0000-0002-8011-5603Affiliations:
- Southeast University, School of Cyber Science and Engineering, Nanjing, China (since 2018)
- Purple Mountain Laboratories, Nanjing, China
- Southeast University, School of Information Science and Engineering, Nanjing, China (2004 - 2018)
- Huazhong University of Science and Technology, Wuhan, China (PhD 2004)
According to our database1,
Jie Huang
authored at least 43 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
6
7
8
1
5
5
1
3
4
3
1
3
2
1
1
3
2
3
1
4
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Analyze and Improve Differentially Private Federated Learning: A Model Robustness Perspective.
IEEE Trans. Inf. Forensics Secur., 2025
2024
Defending against model extraction attacks with OOD feature learning and decision boundary confusion.
Comput. Secur., January, 2024
SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning.
Neural Networks, 2024
Differentially private federated learning with local momentum updates and gradients filtering.
Inf. Sci., 2024
SecureEI: Proactive intellectual property protection of AI models for edge intelligence.
Comput. Networks, 2024
Proactive Privacy and Intellectual Property Protection of Multimedia Retrieval Models in Edge Intelligence.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024
2023
Inf. Sci., November, 2023
IEEE Syst. J., September, 2023
SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks.
Entropy, April, 2023
IEEE Trans. Inf. Forensics Secur., 2023
An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay.
PeerJ Comput. Sci., 2023
BGET: A Blockchain-Based Grouping-EigenTrust Reputation Management Approach for P2P Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023
2022
PeerJ Comput. Sci., 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Wirel. Commun. Mob. Comput., 2021
PeerJ Comput. Sci., 2021
Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.
PeerJ Comput. Sci., 2021
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021
2020
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2020
Defending pollution attacks in network coding enabled wireless <i>ad hoc</i> networks: a game-theoretic framework.
IET Commun., 2020
Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks.
Ad Hoc Networks, 2020
Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Clust. Comput., 2019
Clust. Comput., 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs.
Sensors, 2017
2015
PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors.
J. Sensors, 2015
An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
2014
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter.
Sensors, 2014
A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks.
Secur. Commun. Networks, 2014
A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014