Dijiang Huang, Ph.D. - Publications

Affiliations: 
2004 University of Missouri - Kansas City, USA 
Area:
Computer Science

34 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Sengupta S, Chowdhary A, Sabur A, Alshamrani A, Huang D, Kambhampati S. A Survey of Moving Target Defenses for Network Security Ieee Communications Surveys and Tutorials. 22: 1909-1941. DOI: 10.1109/Comst.2020.2982955  0.401
2019 Pisharody S, Natarajan J, Chowdhary A, Alshalan A, Huang D. Brew: A Security Policy Analysis Framework for Distributed SDN-Based Cloud Environments Ieee Transactions On Dependable and Secure Computing. 16: 1011-1025. DOI: 10.1109/Tdsc.2017.2726066  0.404
2019 Alshamrani A, Myneni S, Chowdhary A, Huang D. A Survey on Advanced Persistent Threats: Techniques, Solutions, Challenges, and Research Opportunities Ieee Communications Surveys and Tutorials. 21: 1851-1877. DOI: 10.1109/Comst.2019.2891891  0.372
2019 Zhu Y, Yu R, Chen E, Huang D. An efficient broadcast encryption supporting designation and revocation mechanisms Chinese Journal of Electronics. 28: 445-456. DOI: 10.1049/Cje.2019.02.005  0.355
2018 Li B, Huang D, Wang Z, Zhu Y. Attribute-based Access Control for ICN Naming Scheme Ieee Transactions On Dependable and Secure Computing. 15: 194-206. DOI: 10.1109/Tdsc.2016.2550437  0.425
2017 Lu D, Xu K, Huang D. A data driven in-air-handwriting biometric authentication system International Journal of Central Banking. 531-537. DOI: 10.1109/Btas.2017.8272739  0.323
2017 Hong JB, Kim DS, Chung CJ, Huang D. A survey on the usability and practical applications of Graphical Security Models Computer Science Review. 26: 1-16. DOI: 10.1016/J.Cosrev.2017.09.001  0.377
2016 Alshalan A, Pisharody S, Huang D. A Survey of Mobile VPN Technologies Ieee Communications Surveys and Tutorials. 18: 1177-1196. DOI: 10.1109/Comst.2015.2496624  0.395
2016 Mir IE, Chowdhary A, Huang D, Pisharody S, Kim DS, Haqiq A. Software Defined Stochastic Model for Moving Target Defense Advances in Intelligent Systems and Computing. 565: 188-197. DOI: 10.1007/978-3-319-60834-1_20  0.393
2015 Zhu Y, Huang D, Hu CJ, Wang X. From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services Ieee Transactions On Services Computing. 8: 601-616. DOI: 10.1109/Tsc.2014.2363474  0.395
2015 Wang Z, Huang D, Zhu Y, Li B, Chung CJ. Efficient Attribute-Based Comparable Data Access Control Ieee Transactions On Computers. 64: 3430-3443. DOI: 10.1109/Tc.2015.2401033  0.396
2015 Zhou Z, Huang D, Wang Z. Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption Ieee Transactions On Computers. 64: 126-138. DOI: 10.1109/Tc.2013.200  0.363
2015 Fu X, Secci S, Huang D, Jana R. Mobile cloud computing [Guest Edotorial] Ieee Communications Magazine. 53: 61-62. DOI: 10.1109/Mcom.2015.7060483  0.317
2015 Wu H, Huang D, Zhu Y. Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications Mobile Networks and Applications. 20: 297-307. DOI: 10.1007/S11036-015-0617-0  0.338
2014 Xu L, Huang D, Tsai W. Cloud-Based Virtual Laboratory for Network Security Education Ieee Transactions On Education. 57: 145-150. DOI: 10.1109/Te.2013.2282285  0.357
2014 Qin Y, Huang D, Li B. STARS: A Statistical Traffic Pattern Discovery System for MANETs Ieee Transactions On Dependable and Secure Computing. 11: 181-192. DOI: 10.1109/Tdsc.2013.33  0.33
2014 Ata S, Huang D, Liu X, Wada A, Xing T, Juluri P, Chung CJ, Sato Y, Medhi D. SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet Computer Networks. 63: 128-146. DOI: 10.1016/J.Bjp.2013.12.028  0.602
2013 Liang H, Xing T, Cai LX, Huang D, Peng D, Liu Y. Adaptive Computing Resource Allocation for Mobile Cloud Computing International Journal of Distributed Sensor Networks. 9: 181426. DOI: 10.1155/2013/181426  0.359
2013 Chung CJ, Khatkar P, Xing T, Lee J, Huang D. NICE: Network intrusion detection and countermeasure selection in virtual network systems Ieee Transactions On Dependable and Secure Computing. 10: 198-211. DOI: 10.1109/Tdsc.2013.8  0.413
2013 Huang D, Xing T, Wu H. Mobile cloud computing service models: a user-centric approach Ieee Network. 27: 6-11. DOI: 10.1109/Mnet.2013.6616109  0.343
2012 Zhou Z, Huang D. Gradual identity exposure using attribute-based encryption Journal of Information Privacy and Security. 1: 278-297. DOI: 10.1504/Ijipsi.2012.046136  0.363
2012 Liang H, Cai LX, Huang D, Shen X, Peng D. An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks Ieee Transactions On Vehicular Technology. 61: 2222-2232. DOI: 10.1109/Tvt.2012.2194748  0.328
2012 Khasnabish B, Huang D, Bai X, Bellavista P, Martinez G, Antonopoulos N. Cloud Computing, Networking, and Services Journal of Network and Systems Management. 20: 463-467. DOI: 10.1007/S10922-012-9254-0  0.333
2011 Huang D, Misra S, Verma M, Xue G. PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs Ieee Transactions On Intelligent Transportation Systems. 12: 736-746. DOI: 10.1109/Tits.2011.2156790  0.403
2011 Huang D, Tsai W, Tseng Y. Policy Management for Secure Data Access Control in Vehicular Networks Journal of Network and Systems Management. 19: 448-471. DOI: 10.1007/S10922-010-9197-2  0.411
2010 Huang D, Hong X, Gerla M. Situation-aware trust architecture for vehicular networks Ieee Communications Magazine. 48: 128-135. DOI: 10.1109/Mcom.2010.5621979  0.407
2010 Huang D, Kandiah V. Low-latency Mix Using Split and Merge Operations Journal of Network and Systems Management. 18: 244-264. DOI: 10.1007/S10922-010-9170-0  0.4
2009 Williams SA, Huang D. Group force mobility model and its obstacle avoidance capability Acta Astronautica. 65: 949-957. DOI: 10.1016/J.Actaastro.2009.01.030  0.342
2008 Li H, Huang J, Sweany P, Huang D. FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field Journal of Systems Architecture. 54: 1077-1088. DOI: 10.1016/J.Sysarc.2008.04.012  0.342
2007 Huang D. Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks International Journal of Security and Networks. 2: 272-283. DOI: 10.1504/Ijsn.2007.013180  0.37
2007 Huang D, Medhi D. Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach Acm Transactions On Sensor Networks. 3. DOI: 10.1145/1267060.1267064  0.583
2007 Huang D, Mehta M, van de Liefvoort A, Medhi D. Modeling pairwise key establishment for random key predistribution in large-scale sensor networks Ieee/Acm Transactions On Networking. 15: 1204-1215. DOI: 10.1109/Tnet.2007.896259  0.545
2006 Huang D, Cao Q, Sinha A, Schniederjans MJ, Beard C, Harn L, Medhi D. New architecture for intra-domain network security issues Communications of the Acm. 49: 64-72. DOI: 10.1145/1167838.1167839  0.545
2004 Huang D, Medhi D. A key-chain-based keying scheme for many-to-many secure group communication Acm Transactions On Information and System Security. 7: 523-552. DOI: 10.1145/1042031.1042033  0.555
Show low-probability matches.