A survey on advanced persistent threats: Techniques, solutions, challenges, and research opportunities A Alshamrani, S Myneni, A Chowdhary, D Huang IEEE Communications Surveys & Tutorials 21 (2), 1851-1877, 2019 | 442 | 2019 |
NICE: Network intrusion detection and countermeasure selection in virtual network systems CJ Chung, P Khatkar, T Xing, J Lee, D Huang IEEE transactions on dependable and secure computing 10 (4), 198-211, 2013 | 423 | 2013 |
Location-aware key management scheme for wireless sensor networks D Huang, M Mehta, D Medhi, L Harn Proceedings of the 2nd ACM workshop on Security of ad hoc and sensor …, 2004 | 341 | 2004 |
Efficient and secure data storage operations for mobile cloud computing Z Zhou, D Huang 2012 8th international conference on network and service management (cnsm …, 2012 | 329 | 2012 |
MobiCloud: building secure cloud framework for mobile computing and communication D Huang, X Zhang, M Kang, J Luo 2010 fifth IEEE international symposium on service oriented system …, 2010 | 292 | 2010 |
iDoctor: Personalized and professionalized medical recommendations based on hybrid matrix factorization Y Zhang, M Chen, D Huang, D Wu, Y Li Future Generation Computer Systems 66, 30-35, 2017 | 272 | 2017 |
PACP: An efficient pseudonymous authentication-based conditional privacy protocol for VANETs D Huang, S Misra, M Verma, G Xue IEEE Transactions on Intelligent Transportation Systems 12 (3), 736-746, 2011 | 272 | 2011 |
A survey of moving target defenses for network security S Sengupta, A Chowdhary, A Sabur, A Alshamrani, D Huang, ... IEEE Communications Surveys & Tutorials 22 (3), 1909-1941, 2020 | 239 | 2020 |
Snortflow: A openflow-based intrusion prevention system in cloud environment T Xing, D Huang, L Xu, CJ Chung, P Khatkar 2013 second GENI research and educational experiment workshop, 89-92, 2013 | 218 | 2013 |
Mobile cloud computing D Huang IEEE COMSOC Multimedia Communications Technical Committee (MMTC) E-Letter 6 …, 2011 | 215 | 2011 |
Efficient privacy-preserving ciphertext-policy attribute based-encryption and broadcast encryption Z Zhou, D Huang, Z Wang IEEE Transactions on Computers 64 (1), 126-138, 2013 | 209 | 2013 |
An SMDP-based service model for interdomain resource allocation in mobile cloud networks H Liang, LX Cai, D Huang, X Shen, D Peng IEEE transactions on vehicular technology 61 (5), 2222-2232, 2012 | 174 | 2012 |
Systems and apparatuses for a secure mobile cloud framework for mobile computing and communication D Huang US Patent 10,425,411, 2019 | 173 | 2019 |
ASPE: Attribute-based secure policy enforcement in vehicular ad hoc networks D Huang, M Verma Ad Hoc Networks 7 (8), 1526-1535, 2009 | 173 | 2009 |
Secure data processing framework for mobile cloud computing D Huang, Z Zhou, L Xu, T Xing, Y Zhong 2011 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS …, 2011 | 172 | 2011 |
Cloud-based virtual laboratory for network security education L Xu, D Huang, WT Tsai IEEE Transactions on Education 57 (3), 145-150, 2013 | 168 | 2013 |
On efficient ciphertext-policy attribute based encryption and broadcast encryption Z Zhou, D Huang Proceedings of the 17th ACM conference on Computer and communications …, 2010 | 145 | 2010 |
Mobile cloud computing service models: a user-centric approach D Huang, T Xing, H Wu IEEE network 27 (5), 6-11, 2013 | 131 | 2013 |
Attribute-based access control for ICN naming scheme B Li, D Huang, Z Wang, Y Zhu IEEE Transactions on Dependable and Secure Computing 15 (2), 194-206, 2016 | 129 | 2016 |
Towards temporal access control in cloud computing Y Zhu, H Hu, GJ Ahn, D Huang, S Wang 2012 Proceedings IEEE Infocom, 2576-2580, 2012 | 126 | 2012 |