Dijiang Huang
Citado por
Citado por
A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities
A Alshamrani, S Myneni, A Chowdhary, D Huang
IEEE Communications Surveys & Tutorials 21 (2), 1851-1877, 2019
NICE: Network intrusion detection and countermeasure selection in virtual network systems
CJ Chung, P Khatkar, T Xing, J Lee, D Huang
IEEE transactions on dependable and secure computing 10 (4), 198-211, 2013
Location-aware key management scheme for wireless sensor networks
D Huang, M Mehta, D Medhi, L Harn
Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004
Efficient and secure data storage operations for mobile cloud computing
Z Zhou, D Huang
2012 8th international conference on network and service management (cnsm …, 2012
MobiCloud: building secure cloud framework for mobile computing and communication
D Huang, X Zhang, M Kang, J Luo
2010 fifth IEEE international symposium on service oriented system …, 2010
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization
Y Zhang, M Chen, D Huang, D Wu, Y Li
Future Generation Computer Systems 66, 30-35, 2017
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs
D Huang, S Misra, M Verma, G Xue
IEEE Transactions on Intelligent Transportation Systems 12 (3), 736-746, 2011
A survey of moving target defenses for network security
S Sengupta, A Chowdhary, A Sabur, A Alshamrani, D Huang, ...
IEEE Communications Surveys & Tutorials 22 (3), 1909-1941, 2020
Mobile cloud computing
D Huang
IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter 6 …, 2011
Snortflow: A openflow-based intrusion prevention system in cloud environment
T Xing, D Huang, L Xu, CJ Chung, P Khatkar
2013 second GENI research and educational experiment workshop, 89-92, 2013
Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption
Z Zhou, D Huang, Z Wang
IEEE Transactions on Computers 64 (1), 126-138, 2013
An SMDP-based service model for interdomain resource allocation in mobile cloud networks
H Liang, LX Cai, D Huang, X Shen, D Peng
IEEE transactions on vehicular technology 61 (5), 2222-2232, 2012
Secure data processing framework for mobile cloud computing
D Huang, Z Zhou, L Xu, T Xing, Y Zhong
2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011
Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication
D Huang
US Patent 10,425,411, 2019
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks
D Huang, M Verma
Ad Hoc Networks 7 (8), 1526-1535, 2009
Cloud-based virtual laboratory for network security education
L Xu, D Huang, WT Tsai
IEEE Transactions on Education 57 (3), 145-150, 2013
On efficient ciphertext-policy attribute based encryption and broadcast encryption
Z Zhou, D Huang
Proceedings of the 17th ACM conference on Computer and communications …, 2010
Mobile cloud computing service models: a user-centric approach
D Huang, T Xing, H Wu
IEEE network 27 (5), 6-11, 2013
Towards temporal access control in cloud computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
2012 Proceedings IEEE Infocom, 2576-2580, 2012
Attribute-based access control for ICN naming scheme
B Li, D Huang, Z Wang, Y Zhu
IEEE Transactions on Dependable and Secure Computing 15 (2), 194-206, 2016
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20