Jie Huang

Orcid: 0000-0002-8011-5603

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China (since 2018)
  • Purple Mountain Laboratories, Nanjing, China
  • Southeast University, School of Information Science and Engineering, Nanjing, China (2004 - 2018)
  • Huazhong University of Science and Technology, Wuhan, China (PhD 2004)


According to our database1, Jie Huang authored at least 41 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Defending against model extraction attacks with OOD feature learning and decision boundary confusion.
Comput. Secur., January, 2024

Aligning the domains in cross domain model inversion attack.
Neural Networks, 2024

SecureNet: Proactive intellectual property protection and model security defense for DNNs based on backdoor learning.
Neural Networks, 2024

Differentially private federated learning with local momentum updates and gradients filtering.
Inf. Sci., 2024

Proactive Privacy and Intellectual Property Protection of Multimedia Retrieval Models in Edge Intelligence.
Proceedings of the 2024 International Conference on Multimedia Retrieval, 2024

2023
Compromise privacy in large-batch Federated Learning via model poisoning.
Inf. Sci., November, 2023

Modeling and Analysis of Malware Propagation for IoT Heterogeneous Devices.
IEEE Syst. J., September, 2023

SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks.
Entropy, April, 2023

Analysis and Utilization of Hidden Information in Model Inversion Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

An anti-collusion attack defense method for physical layer key generation scheme based on transmission delay.
PeerJ Comput. Sci., 2023

BGET: A Blockchain-Based Grouping-EigenTrust Reputation Management Approach for P2P Networks.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2023

2022
Randomness analysis of end-to-end delay in random forwarding networks.
PeerJ Comput. Sci., 2022

A Novel Backdoor Attack Adapted to Transfer Learning.
Proceedings of the IEEE Smartworld, 2022

Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
Proceedings of the IEEE Global Communications Conference, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

Malware homology determination using visualized images and feature fusion.
PeerJ Comput. Sci., 2021

Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.
PeerJ Comput. Sci., 2021

Detection Algorithm of the Mimicry Attack based on Variational Auto-Encoder.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

MCTA: Mobile-Coverage Scheme Based on Trust-Aware for Hybrid WSNs.
Proceedings of the 11th IEEE Annual Computing and Communication Workshop and Conference, 2021

2020
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Defending pollution attacks in network coding enabled wireless <i>ad hoc</i> networks: a game-theoretic framework.
IET Commun., 2020

Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks.
Ad Hoc Networks, 2020

A Novel Mobile-Coverage Scheme for Hybrid Sensor Networks.
IEEE Access, 2020

Modeling and Analysis of Malware Propagation for Cluster-based Wireless Sensor Networks.
Proceedings of the 6th IEEE International Conference on Dependability in Sensor, 2020

FDI: A Fast IoT Device Identification Approach.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

A Novel Lightweight Cryptography Scheme Based on Standardized IOT Data.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
A lightweight physical-layer based security strategy for Internet of things.
Clust. Comput., 2019

Importance-based entropy measures of complex networks' robustness to attacks.
Clust. Comput., 2019

A Privacy-Preserving Signature Scheme for Network Coding.
IEEE Access, 2019

2018
Public Auditing for Network Coding Based Secure Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs.
Sensors, 2017

2015
PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors.
J. Sensors, 2015

An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

2014
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter.
Sensors, 2014

A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks.
Secur. Commun. Networks, 2014

A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Key Pre-distribution Scheme in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Identity-Based Security Scheme for Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014


  Loading...