Dijiang Huang

According to our database1, Dijiang Huang
  • authored at least 110 papers between 2003 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization.
Future Generation Comp. Syst., 2017

Platooning as a service of autonomous vehicles.
Proceedings of the 18th IEEE International Symposium on A World of Wireless, 2017

A Secure Microservice Framework for IoT.
Proceedings of the 2017 IEEE Symposium on Service-Oriented System Engineering, 2017

ThoTh Lab: A Personalized Learning Framework for CS Hands-on Projects (Abstract Only).
Proceedings of the 2017 ACM SIGCSE Technical Symposium on Computer Science Education, 2017

Privacy-Preserving Matchmaking in Geosocial Networks with Untrusted Servers.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Dynamic Game based Security framework in SDN-enabled Cloud Networking Environments.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

2016
Guest Editors' Introduction: Special Issue on Reliable and Secure VANETs.
IEEE Trans. Dependable Sec. Comput., 2016

A Survey of Mobile VPN Technologies.
IEEE Communications Surveys and Tutorials, 2016

MobiVPN: A mobile VPN providing persistency to applications.
Proceedings of the 2016 International Conference on Computing, 2016

Short term traffic flow prediction based on on-line sequential extreme learning machine.
Proceedings of the Eighth International Conference on Advanced Computational Intelligence, 2016

Security policy checking in distributed SDN based clouds.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

SDN based Scalable MTD solution in Cloud Network.
Proceedings of the 2016 ACM Workshop on Moving Target Defense, 2016

Software Defined Stochastic Model for Moving Target Defense.
Proceedings of the Third International Afro-European Conference for Industrial Advancement, 2016

2015
From RBAC to ABAC: Constructing Flexible Data Access Control for Cloud Storage Services.
IEEE Trans. Services Computing, 2015

Efficient Privacy-Preserving Ciphertext-Policy Attribute Based-Encryption and Broadcast Encryption.
IEEE Trans. Computers, 2015

Efficient Attribute-Based Comparable Data Access Control.
IEEE Trans. Computers, 2015

Establishing A Personal On-Demand Execution Environment for Mobile Cloud Applications.
MONET, 2015

Mobile cloud computing [Guest Edotorial].
IEEE Communications Magazine, 2015

POEM: On Establishing a Personal On-Demand Execution Environment for Mobile Cloud Applications.
Proceedings of the 2015 IEEE International Conference on Mobile Services, MS 2015, New York City, NY, USA, June 27, 2015

MoSeC: Mobile-Cloud Service Composition.
Proceedings of the 3rd IEEE International Conference on Mobile Cloud Computing, 2015

Demo: LIVES: Learning through Interactive Video and Emotion-aware System.
Proceedings of the 16th ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2015

Scalable Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

SeReNe: On Establishing Secure and Resilient Networking Services for an SDN-based Multi-tenant Datacenter Environment.
Proceedings of the IEEE International Conference on Dependable Systems and Networks Workshops, 2015

MTD 2015: Second ACM Workshop on Moving Target Defense.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Cloud-Based Virtual Laboratory for Network Security Education.
IEEE Trans. Education, 2014

STARS: A Statistical Traffic Pattern Discovery System for MANETs.
IEEE Trans. Dependable Sec. Comput., 2014

SeRViTR: A framework, implementation, and a testbed for a trustworthy future Internet.
Computer Networks, 2014

A database oriented management for asynchronous and consistent reconfiguration in Software-Defined Networks.
Proceedings of the 2014 IEEE Network Operations and Management Symposium, 2014

Towards distributed privacy-preserving mobile access control.
Proceedings of the IEEE Global Communications Conference, 2014

QoS-constrained sensing task assignment for mobile crowd sensing.
Proceedings of the IEEE Global Communications Conference, 2014

SDNIPS: Enabling Software-Defined Networking based intrusion prevention system in clouds.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Modeling multi-factor multi-site risk-based offloading for mobile cloud computing.
Proceedings of the 10th International Conference on Network and Service Management, 2014

Attribute-based access control for ICN naming scheme.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

2013
NICE: Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems.
IEEE Trans. Dependable Sec. Comput., 2013

Mobile cloud computing service models: a user-centric approach.
IEEE Network, 2013

Adaptive Computing Resource Allocation for Mobile Cloud Computing.
IJDSN, 2013

A cloud based dual-root trust model for secure mobile online transactions.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Secure Web Referral Services for Mobile Cloud Computing.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

Enabling secure location-based services in mobile cloud computing.
Proceedings of the second ACM SIGCOMM workshop on Mobile cloud computing, 2013

Modeling Anonymous MANET Communications Using Super-Nodes.
Proceedings of the 32th IEEE Military Communications Conference, 2013

MCC-OSGi: An OSGi-based mobile cloud service model.
Proceedings of the 11th International Symposium on Autonomous Decentralized Systems, 2013

A behavior based policy management for adaptive trustworthiness assignment in future network.
Proceedings of the 2013 IFIP/IEEE International Symposium on Integrated Network Management (IM 2013), 2013

SnortFlow: A OpenFlow-Based Intrusion Prevention System in Cloud Environment.
Proceedings of the 2013 Second GENI Research and Educational Experiment Workshop, 2013

An Efficient and Anonymous Attribute-Based group setup scheme.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

Making offloading decisions resistant to network unavailability for mobile cloud collaboration.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

Non-intrusive process-based monitoring system to mitigate and prevent VM vulnerability explorations.
Proceedings of the 9th IEEE International Conference on Collaborative Computing: Networking, 2013

How to use attribute-based encryption to implement role-based access control in the cloud.
Proceedings of the 2013 International Workshop on Security in Cloud Computing, 2013

2012
An SMDP-Based Service Model for Interdomain Resource Allocation in Mobile Cloud Networks.
IEEE Trans. Vehicular Technology, 2012

Cloud Computing, Networking, and Services.
J. Network Syst. Manage., 2012

Gradual identity exposure using attribute-based encryption.
IJIPSI, 2012

V-Lab: A Mobile, Cloud-Based Virtual Laboratory Platform for Hands-On Networking Courses.
IJCBPL, 2012

Geographic-Based Service Request Scheduling Model for Mobile Cloud Computing.
Proceedings of the 11th IEEE International Conference on Trust, 2012

VehiCloud: Cloud Computing Facilitating Routing in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

Cheater Detection in Vehicular Networks.
Proceedings of the 11th IEEE International Conference on Trust, 2012

SeRViTR: A framework for trust and policy management for a secure Internet and its proof-of-concept implementation.
Proceedings of the 2012 IEEE Network Operations and Management Symposium, 2012

V-lab: a cloud-based virtual laboratory platform for hands-on networking courses.
Proceedings of the Annual Conference on Innovation and Technology in Computer Science Education, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Secure web referral service.
Proceedings of the 2012 International Conference on Information Networking, 2012

Constructing a virtual networking environment in a Geo-distributed programmable layer-2 networking environment (G-PLaNE).
Proceedings of IEEE International Conference on Communications, 2012

Efficient and secure data storage operations for mobile cloud computing.
Proceedings of the 8th International Conference on Network and Service Management, 2012

MobiCloud: A geo-distributed mobile cloud computing platform.
Proceedings of the 8th International Conference on Network and Service Management, 2012

2011
PACP: An Efficient Pseudonymous Authentication-Based Conditional Privacy Protocol for VANETs.
IEEE Trans. Intelligent Transportation Systems, 2011

Policy Management for Secure Data Access Control in Vehicular Networks.
J. Network Syst. Manage., 2011

Efficient and Secure Data Storage Operations for Mobile Cloud Computing.
IACR Cryptology ePrint Archive, 2011

Least Squares Disclosure Attack in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2011

2010
Low-latency Mix Using Split and Merge Operations.
J. Network Syst. Manage., 2010

On Efficient Ciphertext-Policy Attribute Based Encryption and Broadcast Encryption.
IACR Cryptology ePrint Archive, 2010

Situation-aware trust architecture for vehicular networks.
IEEE Communications Magazine, 2010

MobiCloud: Building Secure Cloud Framework for Mobile Computing and Communication.
Proceedings of the Fifth IEEE International Symposium on Service-Oriented System Engineering, 2010

Gradual Identity Exposure Using Attribute-Based Encryption.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Email-based Social Network Trust.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

Dynamic highway congestion detection and prediction based on shock waves.
Proceedings of the Seventh International Workshop on Vehicular Ad Hoc Networks, 2010

On Economic Mobile Cloud Computing Model.
Proceedings of the Mobile Computing, Applications, and Services, 2010

Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption.
Proceedings of the 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop, 2010

An Optimal Key Distribution Scheme for Secure Multicast Group Communication.
Proceedings of the INFOCOM 2010. 29th IEEE International Conference on Computer Communications, 2010

Establishing Secure Virtual Trust Routing and Provisioning Domains for Future Internet.
Proceedings of the Global Communications Conference, 2010

On Measuring Email-Based Social Network Trust.
Proceedings of the Global Communications Conference, 2010

Anonymous Certification Services.
Proceedings of the Global Communications Conference, 2010

On efficient ciphertext-policy attribute based encryption and broadcast encryption: extended abstract.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

2009
Optimal Multicast Group Communication.
IACR Cryptology ePrint Archive, 2009

ASPE: attribute-based secure policy enforcement in vehicular ad hoc networks.
Ad Hoc Networks, 2009

Towards Lightweight Secure Communication Protocols for Passive RFIDs.
Proceedings of the Sixth Annual IEEE Communications Society Conference on Sensor, 2009

On an information theoretic approach to model anonymous MANET communications.
Proceedings of the IEEE International Symposium on Information Theory, 2009

SEAS: A Secure and Efficient Anonymity Scheme for Low-Cost RFID Tags.
Proceedings of IEEE International Conference on Communications, 2009

Secret-Sharing Based Secure Communication Protocols for Passive RFIDs.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Distributed Data-Theft Detection in Wireless Sensor Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
Unlinkability Measure for IEEE 802.11 Based MANETs.
IEEE Trans. Wireless Communications, 2008

Computing cryptographic pairing in sensors.
SIGBED Review, 2008

FPGA implementations of elliptic curve cryptography and Tate pairing over a binary field.
Journal of Systems Architecture - Embedded Systems Design, 2008

BGKM: An Efficient Secure Broadcasting Group Key Management Scheme.
IACR Cryptology ePrint Archive, 2008

A secure group key management scheme for hierarchical mobile ad hoc networks.
Ad Hoc Networks, 2008

Privacy preservation services: challenges and solutions.
Proceedings of the 2008 ACM Symposium on Applied Computing (SAC), 2008

C-Mix: A Lightweight Anonymous Routing Approach.
Proceedings of the Information Hiding, 10th International Workshop, 2008

SRK: A Distributed RFID Data Access Control Mechanism.
Proceedings of IEEE International Conference on Communications, 2008

2007
Secure pairwise key establishment in large-scale sensor networks: An area partitioning and multigroup key predistribution approach.
TOSN, 2007

Modeling pairwise key establishment for random key predistribution in large-scale sensor networks.
IEEE/ACM Trans. Netw., 2007

Pseudonym-based cryptography for anonymous communications in mobile ad hoc networks.
IJSN, 2007

RFID Keeper: An RFID Data Access Control Mechanism.
Proceedings of the Global Communications Conference, 2007

A Distributed ePedigree Architecture.
Proceedings of the 11th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2007

2006
New architecture for intra-domain network security issues.
Commun. ACM, 2006

Traffic analysis-based unlinkability measure for IEEE 802.11b-based communication systems.
Proceedings of the 2006 ACM Workshop on Wireless Security, 2006

On Measuring Anonymity For Wireless Mobile Ad-hoc Networks.
Proceedings of the LCN 2006, 2006

2005
Using Delaunay triangulation to construct obstacle detour mobility model.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

A Byzantine Resilient Multi-Path Key Establishment Scheme and Its Robustness Analysis for Sensor Networks.
Proceedings of the 19th International Parallel and Distributed Processing Symposium (IPDPS 2005), 2005

RINK-RKP: a scheme for key predistribution and shared-key discovery in sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

A key distribution scheme for double authentication in link state routing protocol.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

Source routing based pairwise key establishment protocol for sensor networks.
Proceedings of the 24th IEEE International Performance Computing and Communications Conference, 2005

2004
A key-chain-based keying scheme for many-to-many secure group communication.
ACM Trans. Inf. Syst. Secur., 2004

Location-aware key management scheme for wireless sensor networks.
Proceedings of the 2nd ACM Workshop on Security of ad hoc and Sensor Networks, 2004

2003
A double authentication scheme to detect impersonation attack in link state routing protocols.
Proceedings of IEEE International Conference on Communications, 2003


  Loading...