Huaping Hu

Orcid: 0000-0002-1651-0385

According to our database1, Huaping Hu authored at least 20 papers between 2003 and 2022.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Efficient boolean SSE: A novel encrypted database (EDB) for biometric authentication.
Int. J. Intell. Syst., December, 2022

2021
Intrusion Detection System Based on RF-SVM Model Optimized with Feature Selection.
Proceedings of the International Conference on Communications, 2021

2020
Efficient Boolean SSE: A Novel Encrypted Database (EDB).
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2013
Using All-or-Nothing Encryption to Enhance the Security of Searchable Encryption.
Proceedings of the 16th IEEE International Conference on Computational Science and Engineering, 2013

2012
Design and Implementation of Facebook Crawler Based on Interaction Simulation.
Proceedings of the 11th IEEE International Conference on Trust, 2012

A Layered Malware Detection Model Using VMM.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Robustness of RED in Mitigating LDoS Attack.
KSII Trans. Internet Inf. Syst., 2011

2008
ASG Automated Signature Generation for Worm-Like P2P Traffic Patterns.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

A Novel Worm Detection Model Based on Host Packet Behavior Ranking.
Proceedings of the On the Move to Meaningful Internet Systems: OTM 2008, 2008

Performance Analysis of the HLLACF.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

ALHACF: An Anonymity-Level Selected Hierarchical Anonymous Communication Framework.
Proceedings of the 2008 IEEE/IPIP International Conference on Embedded and Ubiquitous Computing (EUC 2008), 2008

SFMD: A Secure Data Forwarding and Malicious Routers Detecting Protocol.
Proceedings of the The Third International Conference on Availability, 2008

2007
An Intelligent Network-Warning Model with Strong Survivability.
Proceedings of the Cryptology and Network Security, 6th International Conference, 2007

2006
A Dynamic Trust Model Based on Feedback Control Mechanism for P2P Applications.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006

2005
HVSM: A New Sequential Pattern Mining Algorithm Using Bitmap Representation.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005

2004
A Sequential Pattern Mining Algorithm for Misuse Intrusion Detection.
Proceedings of the Grid and Cooperative Computing, 2004

Modeling Time-Related Trust.
Proceedings of the Grid and Cooperative Computing, 2004

Building a Secure Infrastructure for P2P Applications in Mobile Ad Hoc Networks.
Proceedings of the Grid and Cooperative Computing, 2004

Researches on Scalable Architecture for Security Information Distribution Service.
Proceedings of the Grid and Cooperative Computing, 2004

2003
A Scalable Peer-to-Peer Lookup Model.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...