default search action
Chin-Tser Huang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Asad Ali, Ying-Dar Lin, Jian Liu, Chin-Tser Huang:
The universal federator: A third-party authentication solution to federated cloud, edge, and fog. J. Netw. Comput. Appl. 229: 103922 (2024) - [c74]Tieming Geng, Chin-Tser Huang:
SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security. DBSec 2024: 55-70 - [c73]Nawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran:
DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks. ICCCN 2024: 1-6 - [c72]Jian Liu, Chin-Tser Huang:
Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach. ICNC 2024: 451-455 - 2023
- [c71]Venkat Venkateswaran, Chin-Tser Huang, Kaliappa Ravindran:
Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement. COMSNETS 2023: 505-512 - [c70]Jian Liu, Chin-Tser Huang:
Evaluation of Different Time Series Forecasting Models for 5G V2V Networks. ICNC 2023: 278-282 - [c69]Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng:
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. ProvSec 2023: 115-130 - [c68]Tieming Geng, Chin-Tser Huang, Csilla Farkas:
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. UbiSec 2023: 163-176 - [c67]Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng:
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. UbiSec 2023: 436-449 - [i3]Nawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran:
DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks. CoRR abs/2310.07881 (2023) - 2022
- [j25]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. Network 2(1): 66-80 (2022) - [c66]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks. SenSys 2022: 1222-1228 - [c65]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. TrustCom 2022: 835-842 - [c64]Esmail M. M. Abuhdima, Gurcan Comert, Nabeyou Tadessa, Fred Chambers, Kibonke Niyomugabo, Pierluigi Pisu, Amirhossein Nazeri, Chin-Tser Huang, Jian Liu, Chunheng Zhao:
The Effect of Dust and Sand on the Propagating EM Millimeter Plane Wave. WiSEE 2022: 1-5 - [c63]Jian Liu, Amirhossein Nazeri, Chunheng Zhao, Esmail M. M. Abuhdima, Gurcan Comert, Chin-Tser Huang, Pierluigi Pisu:
Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather. WiSEE 2022: 12-17 - 2021
- [j24]Qiang Zeng, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li, Chin-Tser Huang, Csilla Farkas:
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. IEEE Trans. Dependable Secur. Comput. 18(6): 2582-2600 (2021) - [c62]Tieming Geng, Laurent Njilla, Chin-Tser Huang:
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification. DSC 2021: 1-8 - [c61]Jian Liu, Chin-Tser Huang:
Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain. ICCCN 2021: 1-6 - [c60]Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed Elqaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu:
The effect of Dust and Sand on the 5G Millimeter-Wave links. WiSEE 2021: 60-65 - [i2]Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed El Qaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu:
The Effect of Dust and Sand on the 5G Terrestrial Links. CoRR abs/2108.09226 (2021) - [i1]Esmail M. M. Abuhdima, Ahmed El Qaouaq, Shakendra Alston, Kirk Ambrose, Gurcan Comert, Jian Liu, Chunheng Zhao, Chin-Tser Huang, Pierluigi Pisu:
Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework. CoRR abs/2111.09418 (2021) - 2020
- [j23]Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng:
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus. IEEE Access 8: 26623-26636 (2020) - [j22]Muhammad N. Sakib, Chin-Tser Huang, Ying-Dar Lin:
Maximizing accuracy in multi-scanner malware detection systems. Comput. Networks 169: 107027 (2020) - [j21]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. IEEE Trans. Dependable Secur. Comput. 17(6): 1257-1268 (2020) - [c59]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Detecting Counterfeit ICs with Blockchain-based Verification Framework. ISC2 2020: 1-8
2010 – 2019
- 2019
- [j20]Xudong He, Jiabing Liu, Chin-Tser Huang, Dejun Wang, Bo Meng:
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology. IEEE Access 7: 131050-131067 (2019) - [c58]Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas:
Securing Relational Database Storage with Attribute Association Aware Shuffling. DSC 2019: 1-8 - [c57]Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua:
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. ICNC 2019: 457-462 - [c56]Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, Csilla Farkas:
Data Dependencies Preserving Shuffle in Relational Database. ICDIS 2019: 180-187 - [c55]Chin-Tser Huang, Laurent Njilla, Tieming Geng:
Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions. ISC2 2019: 1-8 - 2018
- [j19]S. Mo Jang, Tieming Geng, Jo-Yun Queenie Li, Ruofan Xia, Chin-Tser Huang, Hwalbin Kim, Jijun Tang:
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis. Comput. Hum. Behav. 84: 103-113 (2018) - [j18]Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi:
Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network. Opt. Switch. Netw. 29: 15-26 (2018) - [c54]Tieming Geng, Chin-Tser Huang:
Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment. ISC2 2018: 1-7 - 2017
- [j17]John H. Gerdes Jr., Chin-Tser Huang, Mohamed Sharaf:
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. Electron. Commer. Res. 17(2): 289-316 (2017) - [j16]Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang:
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model. Int. J. Netw. Secur. 19(1): 138-153 (2017) - [c53]Nawras Alkassab, Chin-Tser Huang, Yu Chen, Baek-Young Choi, Sejun Song:
Benefits and schemes of prefetching from cloud to fog networks. CloudNet 2017: 54-58 - [c52]Kaliappa Ravindran, Chin-Tser Huang:
Probabilistic treatment of service assurance in distributed information systems. DSC 2017: 318-325 - [c51]Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla:
A game theoretic approach for inspecting web-based malvertising. ICC 2017: 1-6 - [c50]Haymanot Gebre-Amlak, Seoungjin Lee, Abdoh M. A. Jabbari, Yu Chen, Baek-Young Choi, Chin-Tser Huang, Sejun Song:
MIST: Mobility-inspired software-defined fog system. ICCE 2017: 94-99 - 2016
- [j15]Peter Mueller, Chin-Tser Huang, Shui Yu, Zahir Tari, Ying-Dar Lin:
Cloud Security. IEEE Cloud Comput. 3(5): 22-24 (2016) - [j14]Jie Huang, Chin-Tser Huang:
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. J. Electr. Comput. Eng. 2016: 9859830:1-9859830:12 (2016) - [c49]Ning Chen, Yu Chen, Sejun Song, Chin-Tser Huang, Xinyue Ye:
Poster Abstract: Smart Urban Surveillance Using Fog Computing. SEC 2016: 95-96 - [c48]Muhammad N. Sakib, Chin-Tser Huang:
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic. ICC 2016: 1-6 - [c47]Sharaf J. Malebary, Wenyuan Xu, Chin-Tser Huang:
Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. IPCCC 2016: 1-7 - [c46]Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb:
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. ISPEC 2016: 315-329 - [c45]Muhammad N. Sakib, Chin-Tser Huang:
Privacy preserving proximity testing using elliptic curves. ITNAC 2016: 121-126 - 2015
- [c44]Muhammad N. Sakib, Chin-Tser Huang:
Automated Collection and Analysis of Malware Disseminated via Online Advertising. TrustCom/BigDataSE/ISPA (1) 2015: 1411-1416 - 2014
- [c43]Wei Peng, Feng Li, Chin-Tser Huang, Xukai Zou:
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. ICC 2014: 804-809 - [c42]Feng Li, Chin-Tser Huang, Jie Huang, Wei Peng:
Feedback-based smartphone strategic sampling for BYOD security. ICCCN 2014: 1-8 - 2013
- [c41]Feng Li, Wei Peng, Chin-Tser Huang, Xukai Zou:
Smartphone strategic sampling in defending enterprise network security. ICC 2013: 2155-2159 - [c40]Mohamed A. Sharaf, Jie Huang, Chin-Tser Huang:
Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications. ICDCS Workshops 2013: 362-367 - [c39]Hyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang:
PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. INFOCOM 2013: 210-214 - 2012
- [c38]Will Goss, Chin-Tser Huang:
A practical implementation of veiled certificate for user-centric privacy protection. ACM Southeast Regional Conference 2012: 335-336 - [c37]Muhammad N. Sakib, Chin-Tser Huang:
Textact: A text-action based web authentication scheme. GLOBECOM 2012: 955-960 - [c36]Jie Huang, Chin-Tser Huang:
A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks. ICCCN 2012: 1-7 - [c35]Chin-Tser Huang, Vipul Gupta:
Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. ICDCS Workshops 2012: 409-416 - [c34]Jie Huang, Mohamed A. Sharaf, Chin-Tser Huang:
A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud. ICPP Workshops 2012: 279-287 - [c33]Yi Xian, Chin-Tser Huang:
Traffic-aware geographic forwarding in vehicular ad hoc networks. VANET@MOBICOM 2012: 107-110 - 2011
- [j13]Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb:
Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks. Comput. Commun. 34(18): 2184-2194 (2011) - [c32]Chin-Tser Huang, Keesook J. Han, James Perretta:
Automatic Selection of Routers for Placing Early Filters of Malicious Traffic. GLOBECOM 2011: 1-5 - [c31]Jie Huang, Chin-Tser Huang:
Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations. ICC 2011: 1-5 - 2010
- [j12]Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda:
Stabilization of Flood Sequencing Protocols in Sensor Networks. IEEE Trans. Parallel Distributed Syst. 21(7): 1042-1055 (2010) - [c30]Chin-Tser Huang, Chang-Ling Huang, J. Morris Chang:
Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks. ICC 2010: 1-5 - [c29]Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb:
Look-ahead routing and Message Scheduling in delay-tolerant networks. LCN 2010: 40-47
2000 – 2009
- 2009
- [j11]John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang:
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. Comput. Secur. 28(5): 248-259 (2009) - [j10]Chin-Tser Huang, Rocky K. C. Chang, Polly Huang:
Signal Processing Applications in Network Intrusion Detection Systems. EURASIP J. Adv. Signal Process. 2009 (2009) - [j9]Chin-Tser Huang, Jeff Janies:
An Adaptive Approach to Granular Real-Time Anomaly Detection. EURASIP J. Adv. Signal Process. 2009 (2009) - [c28]Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas:
P2F: A User-Centric Privacy Protection Framework. ARES 2009: 386-391 - [c27]Chin-Tser Huang, John Gerdes Jr.:
Privacy-preserving multi-dimensional credentialing using veiled certificates. CSIIRW 2009: 32 - [c26]Prasanth Kalakota, Chin-Tser Huang:
On the Benefits of Early Filtering of Botnet Unwanted Traffic. ICCCN 2009: 1-6 - [c25]Jorge Arturo Cobb, Chin-Tser Huang:
Stabilization of Maximal-Metric Routing without Knowledge of Network Size. PDCAT 2009: 306-311 - 2008
- [j8]Chin-Tser Huang, Sachin Thareja, Yong-June Shin:
Wavelet-based Real Time Detection of Network Traffic Anomalies. Int. J. Netw. Secur. 6(3): 309-320 (2008) - [j7]Chin-Tser Huang, J. Morris Chang:
Responding to Security Issues in WiMAX Networks. IT Prof. 10(5): 15-21 (2008) - [j6]Yuliya Kopylova, Duncan A. Buell, Chin-Tser Huang, Jeff Janies:
Mutual information applied to anomaly detection. J. Commun. Networks 10(1): 89-97 (2008) - [j5]Sen Xu, Chin-Tser Huang, Manton M. Matthews:
Secure Multicast in WiMAX. J. Networks 3(2): 48-57 (2008) - [c24]Sen Xu, Chin-Tser Huang, Manton M. Matthews:
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR. ISWCS 2008: 653-657 - [c23]Chin-Tser Huang:
LOFT: Low-Overhead Freshness Transmission in Sensor Networks. SUTC 2008: 241-248 - 2007
- [j4]Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson:
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. Int. J. Sens. Networks 2(5/6): 358-367 (2007) - [c22]Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews:
Chinese remainder theorem based group key management. ACM Southeast Regional Conference 2007: 266-271 - [c21]Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov:
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. GLOBECOM 2007: 2769-2773 - [c20]Jeff Janies, Chin-Tser Huang:
Fates: A Granular Approach to Real-Time Anomaly Detection. ICCCN 2007: 605-610 - [c19]Theodor Richardson, Chin-Tser Huang:
Containing Hitlist-Based Worms with Polymorphic Signatures. ICCCN 2007: 652-657 - [c18]Chung-Kuo Chang, Chin-Tser Huang:
Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. ICPP Workshops 2007: 46 - [c17]Ravi Katpelly, Tiecheng Liu, Chin-Tser Huang:
Summarization of Wearable Videos Based on User Activity Analysis. ISM 2007: 92-99 - [c16]Yi Xian, Chin-Tser Huang:
Securing VoIP Services in Multi-Hop Wireless Mesh Networks. ISWCS 2007: 513-517 - 2006
- [b1]Chin-Tser Huang, Mohamed G. Gouda:
Hop Integrity in the Internet. Advances in Information Security 21, Springer 2006, ISBN 978-0-387-24426-6, pp. 1-112 - [j3]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in presence of resets. J. High Speed Networks 15(2): 173-183 (2006) - [c15]Sen Xu, Manton M. Matthews, Chin-Tser Huang:
Security issues in privacy and key management protocols of IEEE 802.16. ACM Southeast Regional Conference 2006: 113-118 - [c14]Jeff Janies, Chin-Tser Huang, Nathan L. Johnson:
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks. ICC 2006: 3663-3669 - [c13]Chin-Tser Huang, Nathan L. Johnson, Jeff Janies, Alex X. Liu:
On capturing and containing E-mail worms. IPCCC 2006 - [c12]Sen Xu, Chin-Tser Huang:
Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions. ISWCS 2006: 185-189 - [c11]Chin-Tser Huang, Sachin Thareja, Yong-June Shin:
Wavelet-based Real Time Detection of Network Traffic Anomalies. SecureComm 2006: 1-7 - [c10]Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang:
Fault Masking in Tri-redundant Systems. SSS 2006: 304-313 - 2005
- [c9]Alex X. Liu, Jason M. Kovacs, Chin-Tser Huang, Mohamed G. Gouda:
A secure cookie protocol. ICCCN 2005: 333-338 - [c8]Chin-Tser Huang, Mohamed G. Gouda:
State Checksum and Its Role in System Stabilization. ICDCS Workshops 2005: 29-34 - [c7]Xinliang Zheng, Chuming Chen, Chin-Tser Huang, Manton M. Matthews, N. Santhapuri:
A Dual Authentication Protocol for IEEE 802.11 Wireless LANs. ISWCS 2005: 565-569 - 2003
- [j2]Mohamed G. Gouda, Chin-Tser Huang:
A secure address resolution protocol. Comput. Networks 41(1): 57-71 (2003) - [c6]Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy:
Convergence of IPsec in Presence of Resets. ICDCS Workshops 2003: 22-27 - 2002
- [j1]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop integrity in computer networks. IEEE/ACM Trans. Netw. 10(3): 308-319 (2002) - [c5]Mohamed G. Gouda, Chin-Tser Huang, E. N. Elnozahy:
Key Trees and the Security of Interval Multicast. ICDCS 2002: 467-468 - 2001
- [c4]Chin-Tser Huang, Mohamed G. Gouda:
An anti-replay window protocol with controlled shift. ICCCN 2001: 242-247 - [c3]Mohamed G. Gouda, Chin-Tser Huang, Anish Arora:
On the Security and Vulnerability of PING. WSS 2001: 124-135 - 2000
- [c2]Mohamed G. Gouda, Chin-Tser Huang, Eric Li:
Anti-replay window protocols for secure IP. ICCCN 2000: 310-315 - [c1]Mohamed G. Gouda, E. N. Elnozahy, Chin-Tser Huang, Tommy M. McGuire:
Hop Integrity in Computer Networks. ICNP 2000: 3-11
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-12 03:27 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint