Jie Huang

Orcid: 0000-0002-8011-5603

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China
  • Purple Mountain Laboratories, Nanjing, China
  • Southeast University, School of Information Science and Engineering, Nanjing, China (since 2004)
  • Huazhong University of Science and Technology, Wuhan, China (PhD 2004)


According to our database1, Jie Huang authored at least 25 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Defending against model extraction attacks with OOD feature learning and decision boundary confusion.
Comput. Secur., January, 2024

2023
Compromise privacy in large-batch Federated Learning via model poisoning.
Inf. Sci., November, 2023

SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks.
Entropy, April, 2023

2022
Randomness analysis of end-to-end delay in random forwarding networks.
PeerJ Comput. Sci., 2022

A Novel Backdoor Attack Adapted to Transfer Learning.
Proceedings of the IEEE Smartworld, 2022

Compromise Privacy in Large-Batch Federated Learning via Malicious Model Parameters.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
Proceedings of the IEEE Global Communications Conference, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.
PeerJ Comput. Sci., 2021

2020
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2020

Defending pollution attacks in network coding enabled wireless <i>ad hoc</i> networks: a game-theoretic framework.
IET Commun., 2020

Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks.
Ad Hoc Networks, 2020

A Novel Mobile-Coverage Scheme for Hybrid Sensor Networks.
IEEE Access, 2020

2019
A Privacy-Preserving Signature Scheme for Network Coding.
IEEE Access, 2019

2018
Public Auditing for Network Coding Based Secure Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

2017
A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs.
Sensors, 2017

2015
PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors.
J. Sensors, 2015

An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015

An Intrusion Tolerance Method Based on Energy Attack for Wireless Sensor Network.
Int. J. Distributed Sens. Networks, 2015

2014
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter.
Sensors, 2014

A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks.
Secur. Commun. Networks, 2014

A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Key Pre-distribution Scheme in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

A Novel Identity-Based Security Scheme for Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

The Location Privacy of Wireless Sensor Networks: Attacks and Countermeasures.
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014


  Loading...