Seguir
Hongxin Hu
Hongxin Hu
Professor of Computer Science, University at Buffalo, SUNY
Email confirmado em buffalo.edu - Página inicial
Título
Citado por
Citado por
Ano
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
Parallel and Distributed Systems, IEEE Transactions on 23 (12), 2231-2244, 2012
6862012
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE transactions on services computing 6 (2), 227-238, 2011
4162011
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011
3822011
FlowGuard: Building Robust Firewalls for Software-Defined Network
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined …, 2014
3662014
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
Knowledge and Data Engineering, IEEE Transactions on 25 (7), 1614-1627, 2013
2882013
NFP: Enabling network function parallelism in NFV
C Sun, J Bi, Z Zheng, H Yu, H Hu
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
2562017
Detecting and Resolving Firewall Policy Anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on Dependable and Secure Computing, 2012
2322012
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2022010
On the safety of iot device physical interaction control
W Ding, H Hu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1892018
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
H Hu, GJ Ahn, J Jorgensen
Proceedings of the 27th annual computer security applications conference …, 2011
1742011
Poseidon: Mitigating volumetric ddos attacks with programmable switches
M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu
the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020
1712020
Efficient audit service outsourcing for data integrity in clouds
Y Zhu, H Hu, GJ Ahn, SS Yau
Journal of Systems and Software 85 (5), 1083-1095, 2012
1392012
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1292014
Towards Temporal Access Control in Cloud Computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
Proceedings of 31st IEEE International Conference on Computer Communications, 2012
1282012
Secure sharing of electronic health records in clouds
R Wu, GJ Ahn, H Hu
8th international conference on collaborative computing: networking …, 2012
1272012
Cyberbullying detection with a pronunciation based convolutional neural network
X Zhang, J Tong, N Vishwamitra, E Whittaker, JP Mazer, R Kowalski, H Hu, ...
2016 15th IEEE international conference on machine learning and applications …, 2016
1262016
LPM: Layered policy management for software-defined networks
W Han, H Hu, GJ Ahn
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
1172014
Interpreting Deep Learning-Based Networking Systems
HH Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
1052020
Riskmon: Continuous and automated risk assessment of mobile applications
Y Jing, GJ Ahn, Z Zhao, H Hu
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
1052014
Patient-centric authorization framework for sharing electronic health records
J Jin, GJ Ahn, H Hu, MJ Covington, X Zhang
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1022009
O sistema não pode efectuar a operação agora. Tente mais tarde.
Artigos 1–20