Year |
Citation |
Score |
2020 |
Sengupta S, Chowdhary A, Sabur A, Alshamrani A, Huang D, Kambhampati S. A Survey of Moving Target Defenses for Network Security Ieee Communications Surveys and Tutorials. 22: 1909-1941. DOI: 10.1109/Comst.2020.2982955 |
0.401 |
|
2019 |
Pisharody S, Natarajan J, Chowdhary A, Alshalan A, Huang D. Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments Ieee Transactions On Dependable and Secure Computing. 16: 1011-1025. DOI: 10.1109/Tdsc.2017.2726066 |
0.404 |
|
2019 |
Alshamrani A, Myneni S, Chowdhary A, Huang D. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities Ieee Communications Surveys and Tutorials. 21: 1851-1877. DOI: 10.1109/Comst.2019.2891891 |
0.372 |
|
2019 |
Zhu Y, Yu R, Chen E, Huang D. An efficient broadcast encryption supporting designation and revocation mechanisms Chinese Journal of Electronics. 28: 445-456. DOI: 10.1049/Cje.2019.02.005 |
0.355 |
|
2018 |
Li B, Huang D, Wang Z, Zhu Y. Attribute-based Access Control for ICN Naming Scheme Ieee Transactions On Dependable and Secure Computing. 15: 194-206. DOI: 10.1109/Tdsc.2016.2550437 |
0.425 |
|
2017 |
Lu D, Xu K, Huang D. A data driven in-air-handwriting biometric authentication system International Journal of Central Banking. 531-537. DOI: 10.1109/Btas.2017.8272739 |
0.323 |
|
2017 |
Hong JB, Kim DS, Chung CJ, Huang D. A survey on the usability and practical applications of Graphical Security Models Computer Science Review. 26: 1-16. DOI: 10.1016/J.Cosrev.2017.09.001 |
0.377 |
|
2016 |
Alshalan A, Pisharody S, Huang D. A Survey of Mobile VPN Technologies Ieee Communications Surveys and Tutorials. 18: 1177-1196. DOI: 10.1109/Comst.2015.2496624 |
0.395 |
|
2016 |
Mir IE, Chowdhary A, Huang D, Pisharody S, Kim DS, Haqiq A. Software Defined Stochastic Model for Moving Target Defense Advances in Intelligent Systems and Computing. 565: 188-197. DOI: 10.1007/978-3-319-60834-1_20 |
0.393 |
|
2015 |
Zhu Y, Huang D, Hu CJ, Wang X. From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services Ieee Transactions On Services Computing. 8: 601-616. DOI: 10.1109/Tsc.2014.2363474 |
0.395 |
|
2015 |
Wang Z, Huang D, Zhu Y, Li B, Chung CJ. Efficient Attribute-Based Comparable Data Access Control Ieee Transactions On Computers. 64: 3430-3443. DOI: 10.1109/Tc.2015.2401033 |
0.396 |
|
2015 |
Zhou Z, Huang D, Wang Z. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption Ieee Transactions On Computers. 64: 126-138. DOI: 10.1109/Tc.2013.200 |
0.363 |
|
2015 |
Fu X, Secci S, Huang D, Jana R. Mobile cloud computing [Guest Edotorial] Ieee Communications Magazine. 53: 61-62. DOI: 10.1109/Mcom.2015.7060483 |
0.317 |
|
2015 |
Wu H, Huang D, Zhu Y. Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications Mobile Networks and Applications. 20: 297-307. DOI: 10.1007/S11036-015-0617-0 |
0.338 |
|
2014 |
Xu L, Huang D, Tsai W. Cloud-Based Virtual Laboratory for Network Security Education Ieee Transactions On Education. 57: 145-150. DOI: 10.1109/Te.2013.2282285 |
0.357 |
|
2014 |
Qin Y, Huang D, Li B. STARS: A Statistical Traffic Pattern Discovery System for MANETs Ieee Transactions On Dependable and Secure Computing. 11: 181-192. DOI: 10.1109/Tdsc.2013.33 |
0.33 |
|
2014 |
Ata S, Huang D, Liu X, Wada A, Xing T, Juluri P, Chung CJ, Sato Y, Medhi D. SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet Computer Networks. 63: 128-146. DOI: 10.1016/J.Bjp.2013.12.028 |
0.602 |
|
2013 |
Liang H, Xing T, Cai LX, Huang D, Peng D, Liu Y. Adaptive Computing Resource Allocation for Mobile Cloud Computing International Journal of Distributed Sensor Networks. 9: 181426. DOI: 10.1155/2013/181426 |
0.359 |
|
2013 |
Chung CJ, Khatkar P, Xing T, Lee J, Huang D. NICE: Network intrusion detection and countermeasure selection in virtual network systems Ieee Transactions On Dependable and Secure Computing. 10: 198-211. DOI: 10.1109/Tdsc.2013.8 |
0.413 |
|
2013 |
Huang D, Xing T, Wu H. Mobile cloud computing service models: a user-centric approach Ieee Network. 27: 6-11. DOI: 10.1109/Mnet.2013.6616109 |
0.343 |
|
2012 |
Zhou Z, Huang D. Gradual identity exposure using attribute-based encryption Journal of Information Privacy and Security. 1: 278-297. DOI: 10.1504/Ijipsi.2012.046136 |
0.363 |
|
2012 |
Liang H, Cai LX, Huang D, Shen X, Peng D. An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks Ieee Transactions On Vehicular Technology. 61: 2222-2232. DOI: 10.1109/Tvt.2012.2194748 |
0.328 |
|
2012 |
Khasnabish B, Huang D, Bai X, Bellavista P, Martinez G, Antonopoulos N. Cloud Computing, Networking, and Services Journal of Network and Systems Management. 20: 463-467. DOI: 10.1007/S10922-012-9254-0 |
0.333 |
|
2011 |
Huang D, Misra S, Verma M, Xue G. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs Ieee Transactions On Intelligent Transportation Systems. 12: 736-746. DOI: 10.1109/Tits.2011.2156790 |
0.403 |
|
2011 |
Huang D, Tsai W, Tseng Y. Policy Management for Secure Data Access Control in Vehicular Networks Journal of Network and Systems Management. 19: 448-471. DOI: 10.1007/S10922-010-9197-2 |
0.411 |
|
2010 |
Huang D, Hong X, Gerla M. Situation-aware trust architecture for vehicular networks Ieee Communications Magazine. 48: 128-135. DOI: 10.1109/Mcom.2010.5621979 |
0.407 |
|
2010 |
Huang D, Kandiah V. Low-latency Mix Using Split and Merge Operations Journal of Network and Systems Management. 18: 244-264. DOI: 10.1007/S10922-010-9170-0 |
0.4 |
|
2009 |
Williams SA, Huang D. Group force mobility model and its obstacle avoidance capability Acta Astronautica. 65: 949-957. DOI: 10.1016/J.Actaastro.2009.01.030 |
0.342 |
|
2008 |
Li H, Huang J, Sweany P, Huang D. FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field Journal of Systems Architecture. 54: 1077-1088. DOI: 10.1016/J.Sysarc.2008.04.012 |
0.342 |
|
2007 |
Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks International Journal of Security and Networks. 2: 272-283. DOI: 10.1504/Ijsn.2007.013180 |
0.37 |
|
2007 |
Huang D, Medhi D. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1267060.1267064 |
0.583 |
|
2007 |
Huang D, Mehta M, van de Liefvoort A, Medhi D. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks Ieee/Acm Transactions On Networking. 15: 1204-1215. DOI: 10.1109/Tnet.2007.896259 |
0.545 |
|
2006 |
Huang D, Cao Q, Sinha A, Schniederjans MJ, Beard C, Harn L, Medhi D. New architecture for intra-domain network security issues Communications of the Acm. 49: 64-72. DOI: 10.1145/1167838.1167839 |
0.545 |
|
2004 |
Huang D, Medhi D. A key-chain-based keying scheme for many-to-many secure group communication Acm Transactions On Information and System Security. 7: 523-552. DOI: 10.1145/1042031.1042033 |
0.555 |
|
Show low-probability matches. |