Huirong Fu

According to our database1, Huirong Fu authored at least 94 papers between 1999 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification.
CoRR, 2023

2021
Statistical inference attack against PHY-layer key extraction and countermeasures.
Wirel. Networks, 2021

2020
Ransomware in Windows and Android Platforms.
CoRR, 2020

2019
<i>LiveForen</i>: Ensuring Live Forensic Integrity in the Cloud.
IEEE Trans. Inf. Forensics Secur., 2019

An Intelligent Behavior-Based Ransomware Detection System For Android Platform.
Proceedings of the First IEEE International Conference on Trust, 2019

PUREDroid: Permission Usage and Risk Estimation for Android Applications.
Proceedings of the 3rd International Conference on Information System and Data Mining, 2019

HECTor: Homomorphic Encryption Enabled Onion Routing.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
CMAPS: A Chess-Based Multi-Facet Password Scheme for Mobile Devices.
IEEE Access, 2018

DDefender: Android application threat detection using static and dynamic analysis.
Proceedings of the IEEE International Conference on Consumer Electronics, 2018

Information-Theoretic Security and Energy Efficiency for Information and Power Transfer in Two-Hop Wireless Relay Networks.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Location Privacy Challenges in Spatial Crowdsourcing.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

T-PAAD: Trajectory Privacy Attack on Autonomous Driving.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

DOPA: Detecting Open Ports in Android OS.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2017
Empirical statistical inference attack against PHY-layer key extraction in real environments.
Proceedings of the 2017 IEEE Military Communications Conference, 2017

Multi-asymmetric cryptographic RSA scheme.
Proceedings of the 12th Annual Conference on Cyber and Information Security Research, 2017

2016
Evaluating Location Privacy in Vehicular Communications and Applications.
IEEE Trans. Intell. Transp. Syst., 2016

Effect on vehicle safety of nonexistent or silenced basic safety messages.
Proceedings of the 2016 International Conference on Computing, 2016

Implicit Authentication for Mobile Devices Using Typing Behavior.
Proceedings of the Human Aspects of Information Security, Privacy, and Trust, 2016

2015
MAPS: A Multi-Dimensional Password Scheme for Mobile Authentication.
Proceedings of the 2015 International Conference on Interactive Tabletops & Surfaces, 2015

Ambiguous Multi-Symmetric Cryptography.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

QoE Provisioning by Random Access in Next-Generation Wireless Networks.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

2014
On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks.
IEEE Trans. Wirel. Commun., 2014

On Topology of Sensor Networks Deployed for Multitarget Tracking.
IEEE Trans. Intell. Transp. Syst., 2014

A multi-priority supported medium access control in Vehicular Ad Hoc Networks.
Comput. Commun., 2014

Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services.
Proceedings of the 2014 IEEE Intelligent Vehicles Symposium Proceedings, 2014

Evaluation of active position detection in Vehicular Ad Hoc Networks.
Proceedings of the 2014 International Joint Conference on Neural Networks, 2014

2013
Knowing the Enemy at the Gates: Measuring Attacker Motivation.
Int. J. Interdiscip. Telecommun. Netw., 2013

Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications.
Int. J. Interdiscip. Telecommun. Netw., 2013

Endpoint protection zone (EPZ): Protecting LBS user location privacy against deanonymization and collusion in vehicular networks.
Proceedings of the International Conference on Connected Vehicles and Expo, 2013

2012
An IEEE 802.11p-Based Multichannel MAC Scheme With Channel Coordination for Vehicular Ad Hoc Networks.
IEEE Trans. Intell. Transp. Syst., 2012

A multi-priority supported p-persistent MAC protocol for Vehicular Ad Hoc Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

On tracking multiple indistinguishable targets.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs).
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

Attacks and countermeasures in wireless cellular networks.
Proceedings of the 2012 Information Security Curriculum Development Conference, 2012

2011
Medium access control in vehicular <i>ad hoc</i> networks.
Wirel. Commun. Mob. Comput., 2011

Verifying position and velocity for vehicular ad-hoc networks.
Secur. Commun. Networks, 2011

Preserving Privacy in Time Series Data Mining.
Int. J. Data Warehous. Min., 2011

Traffic analysis attacks on Skype VoIP calls.
Comput. Commun., 2011

On Topology of Sensor Networks Deployed for Tracking.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2011

A QoS Supported Multi-Channel MAC for Vehicular Ad Hoc Networks.
Proceedings of the 73rd IEEE Vehicular Technology Conference, 2011

Enhancing unlinkability in Vehicular Ad Hoc Networks.
Proceedings of the 2011 IEEE International Conference on Intelligence and Security Informatics, 2011

2010
The Formal Model of DBMS Enforcing Multiple Security Polices.
J. Softw., 2010

On privacy-preserving time series data classification.
Int. J. Data Min. Model. Manag., 2010

A new class of attacks on time series data mining\m{1}.
Intell. Data Anal., 2010

Enhancement of IEEE 802.11 modules in ns-2 and performance evaluation with error rate.
Proceedings of the 2010 Spring Simulation Multiconference, 2010

Anonymous service access for Vehicular Ad hoc Networks.
Proceedings of the Sixth International Conference on Information Assurance and Security, 2010

2009
Preserving Privacy in Time Series Data Classification by Discretization.
Proceedings of the Machine Learning and Data Mining in Pattern Recognition, 2009

On Privacy of Skype VoIP Calls.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Privacy Issues for Vehicular Ad-Hoc Network.
Proceedings of the Communication and Networking, 2009

A Novel Dual Busy Tone Aided MAC Protocol for Multi-hop Wireless Networks.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009

Usage Control in Conditional Access System with malicious Set-top Box.
Proceedings of the 2009 International Conference on Security & Management, 2009

Security Threats and Countermeasures for Intra-vehicle Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Position Verification in Multi-hop Vehicular Networks.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Replication attack on random key pre-distribution schemes for wireless sensor networks.
Comput. Commun., 2008

On Privacy in Time Series Data Mining.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2008

Robustness of Grid-based Deployment in Wireless Sensors Network.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Modeling Attacks on Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Wireless Networks, 2008

Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains.
Proceedings of the Networks for Grid Applications, Second International Conference, 2008

Measuring the performance of IEEE 802.11p using ns-2 simulator for vehicular networks.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

Key management in vehicular ad-hoc networks.
Proceedings of the 2008 IEEE International Conference on Electro/Information Technology, 2008

Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management.
Proceedings of the 2008 International Conference on Security & Management, 2008

Intrusion Detection System for Wireless Sensor Networks.
Proceedings of the 2008 International Conference on Security & Management, 2008

2007
A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile <i>Ad Hoc</i> Networks.
IEEE Trans. Veh. Technol., 2007

Mobility analysis of mobile hosts with random walking in ad hoc networks.
Comput. Networks, 2007

Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks.
Proceedings of the 27th International Conference on Distributed Computing Systems Workshops (ICDCS 2007 Workshops), 2007

Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation.
Proceedings of the Future Generation Communication and Networking, 2007

Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain.
Proceedings of the Future Generation Communication and Networking, 2007

Security and Privacy: Open Issues with RFID.
Proceedings of the 2007 International Conference on Security & Management, 2007

An Overview of Multi-modal Biometrics for Authentication.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Authentication and Key Agreement Protocols Preserving Anonymity.
Int. J. Netw. Secur., 2006

On parameter estimation of a simple real-time flow aggregation model.
Int. J. Commun. Syst., 2006

Online adaptive firewall allocation in internet data center.
Comput. Commun., 2006

Blom-based Q-composite: A Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks.
Proceedings of the 2006 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2006

2005
Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

Unified Solution to Registration, Authentication and Billing for Wireless Hotspots: Architecture and Protocols.
Proceedings of the 2005 International Conference on Wireless Networks, 2005

2004
End-to-End Mobility Management: A Two-Phase Deployment Scheme for Personal Use.
Proceedings of the International Conference on Wireless Networks, 2004

Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure.
Proceedings of the International Conference on Wireless Networks, 2004

Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

2003
A simple model of real-time flow aggregation.
IEEE/ACM Trans. Netw., 2003

Variable segmentation based on intrinsic video rate characteristics to transport pre-stored video across networks.
Int. J. Commun. Syst., 2003

Low cost pre-stored video transmission across networks.
Comput. Commun., 2003

Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks.
Proceedings of the International Conference on Wireless Networks, 2003

Recent Advances on Intrusion Detection Techniques.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

Video Segmentation for Transporting Pre-Stored Video across Networks.
Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, 2003

2001
Dynamic bandwidth allocation and buffer dimensioning under equal segment scheme to support video-on-demand services.
Int. J. Commun. Syst., 2001

Adaptive bandwidth allocation based on playback tunnel to support video on demand service over ATM networks.
Comput. Commun., 2001

Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks.
Comput. Commun., 2001

Aggregation and Scalable QoS: A Performance Study.
Proceedings of the Quality of Service, 2001

2000
Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks.
Comput. Commun., 2000

A novel scheme of transporting pre-stored MPEG video to support video-on-demand (VoD) services.
Comput. Commun., 2000

1999
Methodology for traffic modeling using two-state Markov-modulated Bernoulli process.
Comput. Commun., 1999

A novel scheme of transporting pre-stored MPEG video in ATM networks.
Proceedings of the IEEE International Conference on Networks 1999, 1999


  Loading...