Hongxin Hu

According to our database1, Hongxin Hu
  • authored at least 105 papers between 2007 and 2018.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
PAM: When Overloaded, Push Your Neighbor Aside!
CoRR, 2018

CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV.
CoRR, 2018

Enhancing Security Education Through Designing SDN Security Labs in CloudLab.
Proceedings of the 49th ACM Technical Symposium on Computer Science Education, 2018

Challenges Towards Protecting VNF With SGX.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing.
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2018

GEN: A GPU-Accelerated Elastic Framework for NFV.
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018

2017
SDPA: Toward a Stateful Data Plane in Software-Defined Networking.
IEEE/ACM Trans. Netw., 2017

CHAOS: An SDN-Based Moving Target Defense System.
Security and Communication Networks, 2017

Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos.
PACMHCI, 2017

HYPER: A Hybrid High-Performance Framework for Network Function Virtualization.
IEEE Journal on Selected Areas in Communications, 2017

Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention.
CoRR, 2017

CrescendoNet: A Simple Deep Convolutional Neural Network with Ensemble Behavior.
CoRR, 2017

CHAOS: an SDN-based Moving Target Defense System.
CoRR, 2017

ThinGs In a Fog: System Illustration with Connected Vehicles.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

PRAM: Priority-aware Flow Migration Scheme in NFV Networks.
Proceedings of the Symposium on SDN Research, 2017

NFP: Enabling Network Function Parallelism in NFV.
Proceedings of the Conference of the ACM Special Interest Group on Data Communication, 2017

Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

On the Safety and Efficiency of Virtual Firewall Elasticity Control.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Load-aware and congestion-free state management in network function virtualization.
Proceedings of the 2017 International Conference on Computing, 2017

Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images.
Proceedings of the 2017 IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2017

Towards Effective Virtualization of Intrusion Detection Systems.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks.
Proceedings of the 3rd ACM on International Workshop on Security And Privacy Analytics, 2017

Dynamic Defense Provision via Network Functions Virtualization.
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, 2017

Building a Security OS With Software Defined Infrastructure.
Proceedings of the 8th Asia-Pacific Workshop on Systems, Mumbai, India, September 2, 2017, 2017

2016
Supporting virtualized network functions with stateful data plane abstraction.
IEEE Network, 2016

TripleMon: A multi-layer security framework for mediating inter-process communication on Android.
Journal of Computer Security, 2016

Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT).
IJDSN, 2016

Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces.
IEEE Security & Privacy, 2016

SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

State-aware Network Access Management for Software-Defined Networks.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

HetSDN: Exploiting SDN for intelligent network usage in heterogeneous wireless networks.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

NeSMA: Enabling network-level state-aware applications in SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network.
Proceedings of the 15th IEEE International Conference on Machine Learning and Applications, 2016

Comprehensive view of security practices in vehicular networks.
Proceedings of the 2016 International Conference on Connected Vehicles and Expo, 2016

Performance considerations of network functions virtualization using containers.
Proceedings of the 2016 International Conference on Computing, 2016

2015
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation.
ACM Trans. Inf. Syst. Secur., 2015

Towards Automated Risk Assessment and Mitigation of Mobile Applications.
IEEE Trans. Dependable Sec. Comput., 2015

VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls.
Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks, 2015

SDPA: Enhancing Stateful Forwarding for Software-Defined Networking.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing.
Proceedings of the IEEE Conference on Collaboration and Internet Computing, 2015

2014
Secure and efficient random functions with variable-length output.
J. Network and Computer Applications, 2014

FLOWGUARD: building robust firewalls for software-defined networks.
Proceedings of the third workshop on Hot topics in software defined networking, 2014

Game theoretic analysis of multiparty access control in online social networks.
Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, 2014

Towards a Reliable SDN Firewall.
Proceedings of the Open Networking Summit 2014 - Research Track, 2014

LPM: Layered Policy Management for Software-Defined Networks.
Proceedings of the Data and Applications Security and Privacy XXVIII, 2014

Defensive maneuver cyber platform modeling with Stochastic Petri Nets.
Proceedings of the 10th IEEE International Conference on Collaborative Computing: Networking, 2014

RiskMon: continuous and automated risk assessment of mobile applications.
Proceedings of the Fourth ACM Conference on Data and Application Security and Privacy, 2014

POSTER: An E2E Trusted Cloud Infrastructure.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

Morpheus: automatically generating heuristics to detect Android emulators.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
Dynamic Audit Services for Outsourced Storages in Clouds.
IEEE Trans. Services Computing, 2013

Multiparty Access Control for Online Social Networks: Model and Mechanisms.
IEEE Trans. Knowl. Data Eng., 2013

Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy.
IEEE Trans. Information Forensics and Security, 2013

Discovery and Resolution of Anomalies in Web Access Control Policies.
IEEE Trans. Dependable Sec. Comput., 2013

On the Security of Picture Gesture Authentication.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

Towards a Security-Enhanced Firewall Application for OpenFlow Networks.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing.
Proceedings of the Cloud Computing - 4th International Conference, CloudComp 2013, Wuhan, 2013

2012
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage.
IEEE Trans. Parallel Distrib. Syst., 2012

Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Sec. Comput., 2012

Remote Attestation with Domain-Based Integrity Model and Policy Analysis.
IEEE Trans. Dependable Sec. Comput., 2012

Detecting and Resolving Firewall Policy Anomalies.
IEEE Trans. Dependable Sec. Comput., 2012

Efficient audit service outsourcing for data integrity in clouds.
Journal of Systems and Software, 2012

Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL.
Information & Software Technology, 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.
IJCMAM, 2012

Secure Collaborative Integrity Verification for Hybrid Cloud Environments.
Int. J. Cooperative Inf. Syst., 2012

Efficient construction of provably secure steganography under ordinary covert channels.
SCIENCE CHINA Information Sciences, 2012

Model-Based Conformance Testing for Android.
Proceedings of the Advances in Information and Computer Security, 2012

Towards temporal access control in cloud computing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Towards HIPAA-compliant healthcare systems.
Proceedings of the ACM International Health Informatics Symposium, 2012

Secure and efficient constructions of hash, MAC and PRF for mobile devices.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Enabling Collaborative data sharing in Google+.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

SocialImpact: Systematic Analysis of Underground Social Dynamics.
Proceedings of the Computer Security - ESORICS 2012, 2012

Secure sharing of electronic health records in clouds.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

Comparison-based encryption for fine-grained access control in clouds.
Proceedings of the Second ACM Conference on Data and Application Security and Privacy, 2012

2011
Provably Secure Role-Based Encryption with Revocation Mechanism.
J. Comput. Sci. Technol., 2011

Patient-centric authorization framework for electronic healthcare services.
Computers & Security, 2011

Zero-knowledge proofs of retrievability.
SCIENCE CHINA Information Sciences, 2011

Automatic Extraction of Secrets from Malware.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

Anomaly discovery and resolution in web access control policies.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Dynamic audit services for integrity verification of outsourced storages in clouds.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Examining Social Dynamics for Countering Botnet Attacks.
Proceedings of the Global Communications Conference, 2011

Multiparty Authorization Framework for Data Sharing in Online Social Networks.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Collaborative integrity verification in hybrid clouds.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Ontology-based policy anomaly management for autonomic computing.
Proceedings of the 7th International Conference on Collaborative Computing: Networking, 2011

Poster: temporal attribute-based encryption in clouds.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Detecting and resolving privacy conflicts for collaborative data sharing in online social networks.
Proceedings of the Twenty-Seventh Annual Computer Security Applications Conference, 2011

2010
Constructing Authorization Systems Using Assurance Management Framework.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2010

Efficient provable data possession for hybrid clouds.
IACR Cryptology ePrint Archive, 2010

A Collaborative Framework for Privacy Protection in Online Social Networks.
IACR Cryptology ePrint Archive, 2010

Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy.
IACR Cryptology ePrint Archive, 2010

FAME: a firewall anomaly management environment.
Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration, 2010

Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

DR@FT: Efficient Remote Attestation Framework for Dynamic Systems.
Proceedings of the Computer Security, 2010

Representing and Reasoning about Web Access Control Policies.
Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

A collaborative framework for privacy protection in online social networks.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

Efficient provable data possession for hybrid clouds.
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010

Cryptographic role-based security mechanisms based on role-key hierarchy.
Proceedings of the 5th ACM Symposium on Information, 2010

2009
Security-Enhanced OSGi Service Environments.
IEEE Trans. Systems, Man, and Cybernetics, Part C, 2009

Patient-centric authorization framework for sharing electronic health records.
Proceedings of the 14th ACM Symposium on Access Control Models and Technologies, 2009

2008
Enabling verification and conformance testing for access control model.
Proceedings of the 13th ACM Symposium on Access Control Models and Technologies, 2008

Towards Role-Based Authorization for OSGi Service Environments.
Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems, 2008

2007
Towards realizing a formal RBAC model in real systems.
Proceedings of the 12th ACM Symposium on Access Control Models and Technologies, 2007

Towards trust-aware access management for ad-hoc collaborations.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007


  Loading...