Cooperative provable data possession for integrity verification in multicloud storage Y Zhu, H Hu, GJ Ahn, M Yu Parallel and Distributed Systems, IEEE Transactions on 23 (12), 2231-2244, 2012 | 692 | 2012 |
Dynamic audit services for outsourced storages in clouds Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu IEEE transactions on services computing 6 (2), 227-238, 2011 | 412 | 2011 |
Dynamic audit services for integrity verification of outsourced storages in clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011 | 381 | 2011 |
FlowGuard: Building Robust Firewalls for Software-Defined Network H Hu, W Han, GJ Ahn, Z Zhao Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined …, 2014 | 370 | 2014 |
Multiparty access control for online social networks: model and mechanisms H Hu, GJ Ahn, J Jorgensen Knowledge and Data Engineering, IEEE Transactions on 25 (7), 1614-1627, 2013 | 292 | 2013 |
NFP: Enabling network function parallelism in NFV C Sun, J Bi, Z Zheng, H Yu, H Hu Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017 | 267 | 2017 |
Detecting and Resolving Firewall Policy Anomalies H Hu, GJ Ahn, K Kulkarni IEEE Transactions on Dependable and Secure Computing, 2012 | 236 | 2012 |
Efficient provable data possession for hybrid clouds Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 205 | 2010 |
On the safety of iot device physical interaction control W Ding, H Hu Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 198 | 2018 |
Poseidon: Mitigating volumetric ddos attacks with programmable switches M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020 | 190 | 2020 |
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks H Hu, GJ Ahn, J Jorgensen Proceedings of the 27th annual computer security applications conference …, 2011 | 174 | 2011 |
Efficient audit service outsourcing for data integrity in clouds Y Zhu, H Hu, GJ Ahn, SS Yau Journal of Systems and Software 85 (5), 1083-1095, 2012 | 142 | 2012 |
Morpheus: automatically generating heuristics to detect android emulators Y Jing, Z Zhao, GJ Ahn, H Hu Proceedings of the 30th Annual Computer Security Applications Conference …, 2014 | 130 | 2014 |
Cyberbullying detection with a pronunciation based convolutional neural network X Zhang, J Tong, N Vishwamitra, E Whittaker, JP Mazer, R Kowalski, H Hu, ... 2016 15th IEEE international conference on machine learning and applications …, 2016 | 128 | 2016 |
Secure sharing of electronic health records in clouds R Wu, GJ Ahn, H Hu 8th international conference on collaborative computing: networking …, 2012 | 126 | 2012 |
Towards Temporal Access Control in Cloud Computing Y Zhu, H Hu, GJ Ahn, D Huang, S Wang Proceedings of 31st IEEE International Conference on Computer Communications, 2012 | 126 | 2012 |
LPM: Layered policy management for software-defined networks W Han, H Hu, GJ Ahn Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014 | 119 | 2014 |
Interpreting Deep Learning-Based Networking Systems HH Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020 | 107 | 2020 |
Riskmon: Continuous and automated risk assessment of mobile applications Y Jing, GJ Ahn, Z Zhao, H Hu Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014 | 105 | 2014 |
Patient-centric authorization framework for sharing electronic health records J Jin, GJ Ahn, H Hu, MJ Covington, X Zhang Proceedings of the 14th ACM symposium on Access control models and …, 2009 | 105 | 2009 |