Dijiang Huang
Title
Cited by
Cited by
Year
NICE: Network intrusion detection and countermeasure selection in virtual network systems
CJ Chung, P Khatkar, T Xing, J Lee, D Huang
IEEE transactions on dependable and secure computing 10 (4), 198-211, 2013
3362013
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
3312004
Efficient and secure data storage operations for mobile cloud computing
Z Zhou, D Huang
2012 8th international conference on network and service management (cnsm …, 2012
2832012
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
2622010
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
D Huang, S Misra, M Verma, G Xue
IEEE Transactions on Intelligent Transportation Systems 12 (3), 736-746, 2011
2022011
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization
Y Zhang, M Chen, D Huang, D Wu, Y Li
Future Generation Computer Systems 66, 30-35, 2017
1942017
Mobile cloud computing
D Huang
IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter 6 …, 2011
1812011
Snortflow: A openflow-based intrusion prevention system in cloud environment
T Xing, D Huang, L Xu, CJ Chung, P Khatkar
2013 second GENI research and educational experiment workshop, 89-92, 2013
1732013
Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption
Z Zhou, D Huang, Z Wang
IEEE Transactions on Computers 64 (1), 126-138, 2013
1622013
Secure data processing framework for mobile cloud computing
D Huang, Z Zhou, L Xu, T Xing, Y Zhong
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
1582011
An SMDP-based service model for interdomain resource allocation in mobile cloud networks
H Liang, LX Cai, D Huang, X Shen, D Peng
IEEE transactions on vehicular technology 61 (5), 2222-2232, 2012
1522012
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
D Huang, M Verma
Ad Hoc Networks 7 (8), 1526-1535, 2009
1462009
Cloud-based virtual laboratory for network security education
L Xu, D Huang, WT Tsai
IEEE Transactions on Education 57 (3), 145-150, 2013
1322013
On efficient ciphertext-policy attribute based encryption and broadcast encryption
Z Zhou, D Huang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
1222010
Mobile cloud computing service models: a user-centric approach
D Huang, T Xing, H Wu
IEEE network 27 (5), 6-11, 2013
1172013
Towards temporal access control in cloud computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
2012 Proceedings IEEE INFOCOM, 2576-2580, 2012
1102012
Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
D Huang
US Patent 10,425,411, 2019
1092019
Secure, selective group broadcast in vehicular networks using dynamic attribute based encryption
N Chen, M Gerla, D Huang, X Hong
2010 The 9th IFIP Annual Mediterranean Ad Hoc Networking Workshop (Med-Hoc …, 2010
1052010
A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
A Alshamrani, S Myneni, A Chowdhary, D Huang
IEEE Communications Surveys & Tutorials 21 (2), 1851-1877, 2019
1032019
A Secure RFID Access Control Mechanism
D Huang, Z Zhou
Security in RFID and Sensor Networks, 237, 2009
88*2009
The system can't perform the operation now. Try again later.
Articles 1–20