Jie Huang
Orcid: 0000-0002-8011-5603Affiliations:
- Southeast University, School of Cyber Science and Engineering, Nanjing, China
- Purple Mountain Laboratories, Nanjing, China
- Southeast University, School of Information Science and Engineering, Nanjing, China (since 2004)
- Huazhong University of Science and Technology, Wuhan, China (PhD 2004)
According to our database1,
Jie Huang
authored at least 25 papers
between 2014 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Defending against model extraction attacks with OOD feature learning and decision boundary confusion.
Comput. Secur., January, 2024
2023
Inf. Sci., November, 2023
SpreadRank: A Novel Approach for Identifying Influential Spreaders in Complex Networks.
Entropy, April, 2023
2022
PeerJ Comput. Sci., 2022
Proceedings of the IEEE Smartworld, 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Defending Against DDOS Attacks on IoT Network Throughput: A Trust-Stackelberg Game Model.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Malware propagation model for cluster-based wireless sensor networks using epidemiological theory.
PeerJ Comput. Sci., 2021
2020
Optimal Byzantine Attacker Identification Based on Game Theory in Network Coding Enabled Wireless Ad Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2020
Defending pollution attacks in network coding enabled wireless <i>ad hoc</i> networks: a game-theoretic framework.
IET Commun., 2020
Universal resource allocation framework for preventing pollution attacks in network-coded wireless mesh networks.
Ad Hoc Networks, 2020
2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
2017
A Probabilistically Weakly Secure Network Coding Scheme in Multipath Routing for WSNs.
Sensors, 2017
2015
PKDIP: Efficient Public-Key-Based Data Integrity Protection for Wireless Image Sensors.
J. Sensors, 2015
An Efficient Key Management Scheme Based on ECC and AVL Tree for Large Scale Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Int. J. Distributed Sens. Networks, 2015
2014
An Efficient Identity-Based Key Management Scheme for Wireless Sensor Networks Using the Bloom Filter.
Sensors, 2014
A security key distribution scheme based on energy efficiency for hybrid wireless sensor networks.
Secur. Commun. Networks, 2014
A Key Pre-distribution Scheme Based on Multiple Key Spaces in Wireless Sensor Networks.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
Proceedings of the Ninth International Conference on Broadband and Wireless Computing, 2014