default search action
Hongxin Hu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Mengda Yang, Wenzhe Yi, Juan Wang, Hongxin Hu, Xiaoyang Xu, Ziang Li:
Penetralium: Privacy-preserving and memory-efficient neural network inference at the edge. Future Gener. Comput. Syst. 156: 30-41 (2024) - [j49]Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, Hongxin Hu:
End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 8(3): 89:1-89:28 (2024) - [j48]Menghao Zhang, Guanyu Li, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Toward a Fast, Scalable and Reconfigurable In-Network Scanner With Programmable Switches. IEEE Trans. Inf. Forensics Secur. 19: 601-615 (2024) - [j47]Fei Ding, Yin Yang, Hongxin Hu, Venkat Krovi, Feng Luo:
Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation. IEEE Trans. Neural Networks Learn. Syst. 35(2): 2425-2435 (2024) - [c124]Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao, Hongxin Hu:
Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform. AsiaCCS 2024 - [c123]Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. CCS 2024: 1226-1240 - [c122]Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, Hongxin Hu:
A First Look at Security and Privacy Risks in the RapidAPI Ecosystem. CCS 2024: 1626-1640 - [c121]Guo Freeman, Julian Frommel, Regan L. Mandryk, Jan Gugenheimer, Lingyuan Li, Daniel Johnson, Cecilia Aragon, Syed Ali Asif, Jakki O. Bailey, Meryem Barkallah, Braeden Burger, Sebastian Cmentowski, Jamie Hancock, Leanne Hides, Hongxin Hu, Yang Hu, Wangfan Li, Ruchi Panchanadikar, Niloofar Sayadi, Devin Tebbe, Leslie Wöhler, Xinyue You, Zinan Zhang, Douglas Zytko:
Understanding and Mitigating New Harms in Immersive and Embodied Virtual Spaces: A Speculative Dystopian Design Fiction Approach. CSCW Companion 2024: 288-295 - [c120]Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang, Yaxin Liu:
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack Against Split Learning. CVPR 2024: 12130-12139 - [c119]Zili Meng, Xiao Kong, Jing Chen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu, Xue Wei:
Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming. NSDI 2024 - [c118]Xi Tan, Sagar Mohan, Md. Armanuzzaman, Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Hongxin Hu, Ziming Zhao:
Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems. SAC 2024: 1350-1357 - [c117]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. SP 2024: 788-806 - [c116]Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu:
Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision-Language Models. USENIX Security Symposium 2024 - [c115]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
SoK: Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. WOOT @ USENIX Security Symposium 2024: 149-169 - [c114]Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, Hongxin Hu:
Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces. WWW 2024: 1081-1091 - [e6]Hongxin Hu, Andrew H. Sung, Rakesh M. Verma:
Proceedings of the 10th ACM International Workshop on Security and Privacy Analytics, IWSPA 2024, Porto, Portugal, 21 June 2024. ACM 2024 [contents] - [i28]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. CoRR abs/2401.03346 (2024) - [i27]Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, Ziming Zhao:
Where's the "up"?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems. CoRR abs/2401.15289 (2024) - [i26]Yu Nong, Mohammed Aldeen, Long Cheng, Hongxin Hu, Feng Chen, Haipeng Cai:
Chain-of-Thought Prompting of Large Language Models for Discovering and Fixing Software Vulnerabilities. CoRR abs/2402.17230 (2024) - [i25]Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra, Hongxin Hu:
Moderating Illicit Online Image Promotion for Unsafe User-Generated Content Games Using Large Vision-Language Models. CoRR abs/2403.18957 (2024) - [i24]Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang, Yaxin Liu:
A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning. CoRR abs/2405.04115 (2024) - [i23]Keyan Guo, Guo Freeman, Hongxin Hu:
Moderating Embodied Cyber Threats Using Generative AI. CoRR abs/2405.05928 (2024) - [i22]Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Song Liao, Long Cheng, Hongxin Hu, Yongkai Wu, Xiaohong Yuan, Jeannette Wade, Sajad Khorsandroo:
AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab. CoRR abs/2405.08125 (2024) - [i21]Yu Nong, Haoran Yang, Long Cheng, Hongxin Hu, Haipeng Cai:
Automated Software Vulnerability Patching using Large Language Models. CoRR abs/2408.13597 (2024) - [i20]Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, Xingyu Zhao:
Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks. CoRR abs/2409.00426 (2024) - 2023
- [j46]Matthew Costello, Nishant Vishwamitra, Song Liao, Long Cheng, Feng Luo, Hongxin Hu:
COVID-19 and Sinophobia: Detecting Warning Signs of Radicalization on Twitter and Reddit. Cyberpsychology Behav. Soc. Netw. 26(7): 546-553 (2023) - [j45]John Anderson, Qiqing Huang, Long Cheng, Hongxin Hu:
A Zero-Trust Architecture for Connected and Autonomous Vehicles. IEEE Internet Comput. 27(5): 7-14 (2023) - [j44]Juan Wang, Jie Wang, Chengyang Fan, Fei Yan, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Mengda Yang, Hongxin Hu:
SvTPM: SGX-Based Virtual Trusted Platform Modules for Cloud Computing. IEEE Trans. Cloud Comput. 11(3): 2936-2953 (2023) - [j43]Sungmin Hong, Lei Xu, Jianwei Huang, Hongda Li, Hongxin Hu, Guofei Gu:
SysFlow: Toward a Programmable Zero Trust Framework for System Security. IEEE Trans. Inf. Forensics Secur. 18: 2794-2809 (2023) - [c113]Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, Hongxin Hu:
Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter. ASONAM 2023: 103-107 - [c112]Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. CCS 2023: 2321-2335 - [c111]Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu, Ziming Zhao:
Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense. DAC 2023: 1-6 - [c110]Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra, Hongxin Hu:
An Investigation of Large Language Models for Real-World Hate Speech Detection. ICMLA 2023: 1568-1573 - [c109]Song Liao, Ebuka Okpala, Long Cheng, Mingqi Li, Nishant Vishwamitra, Hongxin Hu, Feng Luo, Matthew Costello:
Analysis of COVID-19 Offensive Tweets and Their Targets. KDD 2023: 4473-4484 - [c108]Ziang Li, Mengda Yang, Yaxin Liu, Juan Wang, Hongxin Hu, Wenzhe Yi, Xiaoyang Xu:
GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference. NeurIPS 2023 - [c107]Zili Meng, Tingfeng Wang, Yixin Shen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu, Xue Wei:
Enabling High Quality Real-Time Communications with Adaptive Frame-Rate. NSDI 2023: 1429-1450 - [c106]Wenbo Ding, Song Liao, Keyan Guo, Fuqiang Zhang, Long Cheng, Ziming Zhao, Hongxin Hu:
Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles. SmartSP 2023: 3-14 - [c105]Feng Wei, Hongda Li, Ziming Zhao, Hongxin Hu:
xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses. USENIX Security Symposium 2023: 4337-4354 - [i19]Song Liao, Long Cheng, Haipeng Cai, Linke Guo, Hongxin Hu:
SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase. CoRR abs/2309.05867 (2023) - [i18]Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao, Hongxin Hu:
Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models. CoRR abs/2312.15099 (2023) - 2022
- [j42]Juan Wang, Shirong Hao, Hongxin Hu, Bo Zhao, Hongda Li, Wenhui Zhang, Jun Xu, Peng Liu, Jing Ma:
S-Blocks: Lightweight and Trusted Virtual Security Function With SGX. IEEE Trans. Cloud Comput. 10(2): 1082-1099 (2022) - [c104]Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu, Ziming Zhao:
Understanding and Detecting Remote Infection on Linux-based IoT Devices. AsiaCCS 2022: 873-887 - [c103]Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao, Gail-Joon Ahn:
Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks. CODASPY 2022: 65-76 - [c102]Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu, Feng Luo:
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model. EMNLP 2022: 3097-3106 - [c101]John Anderson, Qiqing Huang, Long Cheng, Hongxin Hu:
BYOZ: Protecting BYOD Through Zero Trust Network Security. NAS 2022: 1-8 - [c100]Mengda Yang, Ziang Li, Juan Wang, Hongxin Hu, Ao Ren, Xiaoyang Xu, Wenzhe Yi:
Measuring Data Reconstruction Defenses in Collaborative Inference Systems. NeurIPS 2022 - [c99]Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu, Fenghua Li:
IMap: Fast and Scalable In-Network Scanning with Programmable Switches. NSDI 2022: 667-681 - [c98]Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu, Huixing Deng:
SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild. USENIX Security Symposium 2022: 1113-1130 - [i17]Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu, Feng Luo:
Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model. CoRR abs/2211.01200 (2022) - 2021
- [j41]Xincai Fei, Fangming Liu, Qixia Zhang, Hai Jin, Hongxin Hu:
Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions. ACM Comput. Surv. 53(4): 73:1-73:42 (2021) - [j40]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Problematic Privacy Policies of Voice Assistant Applications. IEEE Secur. Priv. 19(6): 66-73 (2021) - [j39]Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Liqiang Zhang, Hongxin Hu, Rongxing Lu:
IoT-Praetor: Undesired Behaviors Detection for IoT Devices. IEEE Internet Things J. 8(2): 927-940 (2021) - [j38]Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao:
Context-Rich Privacy Leakage Analysis Through Inferring Apps in Smart Home IoT. IEEE Internet Things J. 8(4): 2736-2750 (2021) - [j37]Zili Meng, Yaning Guo, Yixin Shen, Jing Chen, Chao Zhou, Minhu Wang, Jia Zhang, Mingwei Xu, Chen Sun, Hongxin Hu:
Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning. IEEE/ACM Trans. Netw. 29(2): 723-736 (2021) - [j36]Guanyu Li, Menghao Zhang, Shicheng Wang, Chang Liu, Mingwei Xu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Jianping Wu:
Enabling Performant, Flexible and Cost-Efficient DDoS Defense With Programmable Switches. IEEE/ACM Trans. Netw. 29(4): 1509-1526 (2021) - [j35]Heng Yu, Zhilong Zheng, Junxian Shen, Congcong Miao, Chen Sun, Hongxin Hu, Jun Bi, Jianping Wu, Jilong Wang:
Octans: Optimal Placement of Service Function Chains in Many-Core Systems. IEEE Trans. Parallel Distributed Syst. 32(9): 2202-2215 (2021) - [c97]Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwe Xu, Hongxin Hu:
Switches are Scanners Too!: A Fast and Scalable In-Network Scanner with Programmable Switches. HotNets 2021: 77-83 - [c96]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. ICML 2021: 1640-1650 - [c95]Mingqi Li, Song Liao, Ebuka Okpala, Max Tong, Matthew Costello, Long Cheng, Hongxin Hu, Feng Luo:
COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection. ICMLA 2021: 233-238 - [c94]Jing Chen, Zili Meng, Yaning Guo, Mingwei Xu, Hongxin Hu:
HierTopo: Towards High-Performance and Efficient Topology Optimization for Dynamic Networks. IWQoS 2021: 1-10 - [c93]Wenbo Ding, Hongxin Hu, Long Cheng:
IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery. NDSS 2021 - [c92]Nishant Vishwamitra, Hongxin Hu, Feng Luo, Long Cheng:
Towards Understanding and Detecting Cyberbullying in Real-world Images. NDSS 2021 - [c91]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. SSCI 2021: 1-8 - [e5]Jorge Lobo, Roberto Di Pietro, Omar Chowdhury, Hongxin Hu:
SACMAT '21: The 26th ACM Symposium on Access Control Models and Technologies, Virtual Event, Spain, June 16-18, 2021. ACM 2021, ISBN 978-1-4503-8365-3 [contents] - [i16]Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen, Qi Li:
CARTL: Cooperative Adversarially-Robust Transfer Learning. CoRR abs/2106.06667 (2021) - [i15]Nishant Vishwamitra, Hongxin Hu, Ziming Zhao, Long Cheng, Feng Luo:
Understanding and Measuring Robustness of Multimodal Learning. CoRR abs/2112.12792 (2021) - 2020
- [c90]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. ACSAC 2020: 856-869 - [c89]Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao, Rong Ge:
DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels. AsiaCCS 2020: 33-46 - [c88]Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong, Hongxin Hu:
Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms. CCS 2020: 1699-1716 - [c87]Yifang Li, Nishant Vishwamitra, Hongxin Hu, Kelly Caine:
Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos. CHI 2020: 1-14 - [c86]Shuhe Wang, Zili Meng, Chen Sun, Minhu Wang, Mingwei Xu, Jun Bi, Tong Yang, Qun Huang, Hongxin Hu:
SmartChain: Enabling High-Performance Service Chain Partition between SmartNIC and CPU. ICC 2020: 1-7 - [c85]Shuhe Wang, Chen Sun, Zili Meng, Minhu Wang, Jiamin Cao, Mingwei Xu, Jun Bi, Qun Huang, Masoud Moshref, Tong Yang, Hongxin Hu, Gong Zhang:
Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs. ICNP 2020: 1-12 - [c84]Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu, Jianping Wu:
Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches. NDSS 2020 - [c83]Jiasong Bai, Menghao Zhang, Guanyu Li, Chang Liu, Mingwei Xu, Hongxin Hu:
FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches. SPIN@SIGCOMM 2020: 1-7 - [c82]Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao, Hongxin Hu:
Interpreting Deep Learning-Based Networking Systems. SIGCOMM 2020: 154-171 - [i14]Song Liao, Christin Wilson, Long Cheng, Hongxin Hu, Huixing Deng:
Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications. CoRR abs/2007.14570 (2020) - [i13]Fei Ding, Feng Luo, Hongxin Hu, Yin Yang:
Multi-level Knowledge Distillation. CoRR abs/2012.00573 (2020)
2010 – 2019
- 2019
- [j34]Hongxin Hu, Wonkyu Han, Sukwha Kyung, Juan Wang, Gail-Joon Ahn, Ziming Zhao, Hongda Li:
Towards a reliable firewall for software-defined networks. Comput. Secur. 87 (2019) - [j33]Menghao Zhang, Jun Bi, Kai Gao, Yi Qiao, Guanyu Li, Xiao Kong, Zhaogeng Li, Hongxin Hu:
Tripod: Towards a Scalable, Efficient and Resilient Cloud Gateway. IEEE J. Sel. Areas Commun. 37(3): 570-585 (2019) - [j32]Zili Meng, Jun Bi, Haiping Wang, Chen Sun, Hongxin Hu:
MicroNF: An Efficient Framework for Enabling Modularized Service Chains in NFV. IEEE J. Sel. Areas Commun. 37(8): 1851-1865 (2019) - [j31]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Guest Editors' Introduction: Special Section on Security in Emerging Networking Technologies. IEEE Trans. Dependable Secur. Comput. 16(6): 913-914 (2019) - [c81]Hongda Li, Feng Wei, Hongxin Hu:
Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN. SDN-NFV@CODASPY 2019: 13-16 - [c80]Menghao Zhang, Jiasong Bai, Guanyu Li, Zili Meng, Hongda Li, Hongxin Hu, Mingwei Xu:
When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs. ICNP 2019: 1-6 - [c79]Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu, Jianping Wu:
Octans: Optimal Placement of Service Function Chains in Many-Core Systems. INFOCOM 2019: 307-315 - [c78]Zili Meng, Jing Chen, Yaning Guo, Chen Sun, Hongxin Hu, Mingwei Xu:
PiTree: Practical Implementation of ABR Algorithms Using Decision Trees. ACM Multimedia 2019: 2431-2439 - [c77]Younghee Park, Hongxin Hu, Xiaohong Yuan:
Security Labs for Software Defined Networks in CloudLab. SIGCSE 2019: 1235 - [e4]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
SDN-NFV@CODASPY 2019 - roceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, Richardson, TX, USA, March 27, 2019. ACM 2019, ISBN 978-1-4503-6179-8 [contents] - [i12]Joseph Clements, Yuzhe Yang, Ankur A Sharma, Hongxin Hu, Yingjie Lao:
Rallying Adversarial Techniques against Deep Learning for Network Security. CoRR abs/1903.11688 (2019) - [i11]Juan Wang, Chengyang Fan, Jie Wang, Yueqiang Cheng, Yinqian Zhang, Wenhui Zhang, Peng Liu, Hongxin Hu:
SvTPM: A Secure and Efficient vTPM in the Cloud. CoRR abs/1905.08493 (2019) - [i10]Zili Meng, Minhu Wang, Mingwei Xu, Hongzi Mao, Jiasong Bai, Hongxin Hu:
Explaining Deep Learning-Based Networked Systems. CoRR abs/1910.03835 (2019) - 2018
- [j30]Chen Sun, Jun Bi, Zili Meng, Tong Yang, Xiao Zhang, Hongxin Hu:
Enabling NFV Elasticity Control With Optimized Flow Migration. IEEE J. Sel. Areas Commun. 36(10): 2288-2303 (2018) - [c76]Zhilong Zheng, Jun Bi, Chen Sun, Heng Yu, Hongxin Hu, Zili Meng, Shuhe Wang, Kai Gao, Jianping Wu:
GEN: A GPU-Accelerated Elastic Framework for NFV. APNet 2018: 57-64 - [c75]Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn, Fuqiang Zhang:
vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems. CCS 2018: 17-34 - [c74]Wenbo Ding, Hongxin Hu:
On the Safety of IoT Device Physical Interaction Control. CCS 2018: 832-846 - [c73]Juan Wang, Shirong Hao, Yi Li, Chengyang Fan, Jie Wang, Lin Han, Zhi Hong, Hongxin Hu:
Challenges Towards Protecting VNF With SGX. SDN-NFV@CODASPY 2018: 39-42 - [c72]Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu, Richard R. Brooks:
Towards Efficient Traffic Monitoring for Science DMZ with Side-Channel based Traffic Winnowing. SDN-NFV@CODASPY 2018: 55-58 - [c71]Zili Meng, Jun Bi, Haiping Wang, Chen Sun, Hongxin Hu:
CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV. ICC 2018: 1-7 - [c70]Kang Chen, Jianwei Liu, James Martin, Kuang-Ching Wang, Hongxin Hu:
Improving Integrated LTE-WiFi Network Performance with SDN Based Flow Scheduling. ICCCN 2018: 1-9 - [c69]Xiang Zhang, Nishant Vishwamitra, Hongxin Hu, Feng Luo:
CrescendoNet: A New Deep Convolutional Neural Network with Ensemble Behavior. ICMLA 2018: 311-317 - [c68]Zhilong Zheng, Jun Bi, Haiping Wang, Chen Sun, Heng Yu, Hongxin Hu, Kai Gao, Jianping Wu:
Grus: Enabling Latency SLOs for GPU-Accelerated NFV Systems. ICNP 2018: 154-164 - [c67]Chen Sun, Jun Bi, Zili Meng, Xiao Zhang, Hongxin Hu:
OFM: Optimized Flow Migration for NFV Elasticity Control. IWQoS 2018: 1-10 - [c66]Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang, Hongxin Hu:
PAM: When Overloaded, Push Your Neighbor Aside! SIGCOMM Posters and Demos 2018: 63-65 - [c65]Younghee Park, Hongxin Hu, Xiaohong Yuan, Hongda Li:
Enhancing Security Education Through Designing SDN Security Labs in CloudLab. SIGCSE 2018: 185-190 - [e3]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2018, Tempe, AZ, USA, March 19-21, 2018. ACM 2018 [contents] - [i9]Zili Meng, Jun Bi, Chen Sun, Haiping Wang, Hongxin Hu:
CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV. CoRR abs/1804.05468 (2018) - [i8]Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang, Hongxin Hu:
PAM: When Overloaded, Push Your Neighbor Aside! CoRR abs/1805.10434 (2018) - [i7]Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, Hongxin Hu:
Vision-based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards. CoRR abs/1810.03967 (2018) - 2017
- [j29]Chen Sun, Jun Bi, Zhilong Zheng, Hongxin Hu:
HYPER: A Hybrid High-Performance Framework for Network Function Virtualization. IEEE J. Sel. Areas Commun. 35(11): 2490-2500 (2017) - [j28]Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, Kelly Caine:
Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos. Proc. ACM Hum. Comput. Interact. 1(CSCW): 67:1-67:24 (2017) - [j27]Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, Bo Zhao:
CHAOS: An SDN-Based Moving Target Defense System. Secur. Commun. Networks 2017: 3659167:1-3659167:11 (2017) - [j26]Chen Sun, Jun Bi, Haoxian Chen, Hongxin Hu, Zhilong Zheng, Shuyong Zhu, Chenghui Wu:
SDPA: Toward a Stateful Data Plane in Software-Defined Networking. IEEE/ACM Trans. Netw. 25(6): 3294-3308 (2017) - [c64]Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin, Donald E. Porter:
Building a Security OS With Software Defined Infrastructure. APSys 2017: 4:1-4:8 - [c63]Nishant Vishwamitra, Xiang Zhang, Jonathan Tong, Hongxin Hu, Feng Luo, Robin M. Kowalski, Joseph P. Mazer:
MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks. IWSPA@CODASPY 2017: 37-42 - [c62]Younghee Park, Pritesh Chandaliya, Akshaya Muralidharan, Nikash Kumar, Hongxin Hu:
Dynamic Defense Provision via Network Functions Virtualization. SDN-NFV@CODASPY 2017: 43-46 - [c61]Nuyun Zhang, Hongda Li, Hongxin Hu, Younghee Park:
Towards Effective Virtualization of Intrusion Detection Systems. SDN-NFV@CODASPY 2017: 47-50 - [c60]Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu, Kelly Caine:
Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images. CVPR Workshops 2017: 1343-1351 - [c59]Jinwei Liu, Haiying Shen, Hongxin Hu:
Load-aware and congestion-free state management in network function virtualization. ICNC 2017: 303-307 - [c58]Juan Deng, Hongda Li, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
On the Safety and Efficiency of Virtual Firewall Elasticity Control. NDSS 2017 - [c57]Hongda Li, Juan Deng, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao, Wonkyu Han:
Poster: On the Safety and Efficiency of Virtual Firewall Elasticity Control. SACMAT 2017: 129-131 - [c56]Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine, Gail-Joon Ahn:
Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks. SACMAT 2017: 155-166 - [c55]Chen Sun, Jun Bi, Zhilong Zheng, Heng Yu, Hongxin Hu:
NFP: Enabling Network Function Parallelism in NFV. SIGCOMM 2017: 43-56 - [c54]Zili Meng, Jun Bi, Chen Sun, Anmin Xu, Hongxin Hu:
PRAM: Priority-aware Flow Migration Scheme in NFV Networks. SOSR 2017: 183-184 - [c53]Anjan Rayamajhi, Mizanur Rahman, Manveen Kaur, Jianwei Liu, Mashrur Chowdhury, Hongxin Hu, Jerome McClendon, Kuang-Ching Wang, Abhimanyu Gosain, Jim Martin:
ThinGs In a Fog: System Illustration with Connected Vehicles. VTC Spring 2017: 1-6 - [e2]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFVSec@CODASPY 2017, Scottsdale, Arizona, USA, March 24, 2017. ACM 2017, ISBN 978-1-4503-4908-6 [contents] - [i6]Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Huanguo Zhang:
CHAOS: an SDN-based Moving Target Defense System. CoRR abs/1704.01482 (2017) - [i5]Xiang Zhang, Nishant Vishwamitra, Hongxin Hu, Feng Luo:
CrescendoNet: A Simple Deep Convolutional Neural Network with Ensemble Behavior. CoRR abs/1710.11176 (2017) - [i4]Mhafuzul Islam, Mashrur Chowdhury, Hongda Li, Hongxin Hu:
Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and their Prevention. CoRR abs/1711.10651 (2017) - 2016
- [j25]Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Thomas J. Holt, Yiming Jing, Hongxin Hu:
Mules, Seals, and Attacking Tools: Analyzing 12 Online Marketplaces. IEEE Secur. Priv. 14(3): 32-43 (2016) - [j24]Namje Park, Hongxin Hu, Qun Jin:
Security and Privacy Mechanisms for Sensor Middleware and Application in Internet of Things (IoT). Int. J. Distributed Sens. Networks 12(1): 2965438:1-2965438:3 (2016) - [j23]Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, Ziming Zhao:
TripleMon: A multi-layer security framework for mediating inter-process communication on Android. J. Comput. Secur. 24(4): 405-426 (2016) - [j22]Jun Bi, Shuyong Zhu, Chen Sun, Guang Yao, Hongxin Hu:
Supporting virtualized network functions with stateful data plane abstraction. IEEE Netw. 30(3): 40-45 (2016) - [c52]Jason W. Anderson, Hongxin Hu, Udit Agarwal, Craig Lowery, Hongda Li, Amy W. Apon:
Performance considerations of network functions virtualization using containers. ICNC 2016: 1-7 - [c51]Manveen Kaur, James Martin, Hongxin Hu:
Comprehensive view of security practices in vehicular networks. ICCVE 2016: 19-26 - [c50]Xiang Zhang, Jonathan Tong, Nishant Vishwamitra, Elizabeth Whittaker, Joseph P. Mazer, Robin M. Kowalski, Hongxin Hu, Feng Luo, Jamie Macbeth, Edward Dillon:
Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network. ICMLA 2016: 740-745 - [c49]Chen Sun, Jun Bi, Hongxin Hu, Zhilong Zheng:
NeSMA: Enabling network-level state-aware applications in SDN. ICNP 2016: 1-7 - [c48]Kang Chen, Ryan Izard, Hongxin Hu, Kuang-Ching Wang, James Martin, Juan Deng:
HetSDN: Exploiting SDN for intelligent network usage in heterogeneous wireless networks. IWQoS 2016: 1-6 - [c47]Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang, Juan Deng:
State-aware Network Access Management for Software-Defined Networks. SACMAT 2016: 1-11 - [c46]Hitesh Padekar, Younghee Park, Hongxin Hu, Sang-Yoon Chang:
Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks. SACMAT 2016: 51-61 - [c45]Chen Sun, Jun Bi, Zhilong Zheng, Hongxin Hu:
SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization. SIGCOMM 2016: 581-582 - [e1]Gail-Joon Ahn, Guofei Gu, Hongxin Hu, Seungwon Shin:
Proceedings of the 2016 ACM International Workshop on Security in Software Defined Networks & Network Function Virtualization, SDN-NFV@CODASPY 2016, New Orleans, LA, USA, March 11, 2016. ACM 2016, ISBN 978-1-4503-4078-6 [contents] - 2015
- [j21]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
Towards Automated Risk Assessment and Mitigation of Mobile Applications. IEEE Trans. Dependable Secur. Comput. 12(5): 571-584 (2015) - [j20]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation. ACM Trans. Inf. Syst. Secur. 17(4): 14:1-14:37 (2015) - [c44]Khaled Riad, Yan Zhu, Hongxin Hu, Gail-Joon Ahn:
AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing. CIC 2015: 28-35 - [c43]Shuyong Zhu, Jun Bi, Chen Sun, Chenhui Wu, Hongxin Hu:
SDPA: Enhancing Stateful Forwarding for Software-Defined Networking. ICNP 2015: 323-333 - [c42]Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi, Younghee Park:
VNGuard: An NFV/SDN combination framework for provisioning and managing virtual firewalls. NFV-SDN 2015: 107-114 - 2014
- [j19]Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn, Hongxin Hu:
Secure and efficient random functions with variable-length output. J. Netw. Comput. Appl. 45: 121-133 (2014) - [c41]Yiming Jing, Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Morpheus: automatically generating heuristics to detect Android emulators. ACSAC 2014: 216-225 - [c40]Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Fajiang Yu, Liqiang Zhang, Hongxin Hu:
POSTER: An E2E Trusted Cloud Infrastructure. CCS 2014: 1517-1519 - [c39]Yiming Jing, Gail-Joon Ahn, Ziming Zhao, Hongxin Hu:
RiskMon: continuous and automated risk assessment of mobile applications. CODASPY 2014: 99-110 - [c38]William Clay Moody, Hongxin Hu, Amy W. Apon:
Defensive maneuver cyber platform modeling with Stochastic Petri Nets. CollaborateCom 2014: 531-538 - [c37]Wonkyu Han, Hongxin Hu, Gail-Joon Ahn:
LPM: Layered Policy Management for Software-Defined Networks. DBSec 2014: 356-363 - [c36]Hongxin Hu, Gail-Joon Ahn, Wonkyu Han, Ziming Zhao:
Towards a Reliable SDN Firewall. ONS 2014 - [c35]Hongxin Hu, Gail-Joon Ahn, Ziming Zhao, Dejun Yang:
Game theoretic analysis of multiparty access control in online social networks. SACMAT 2014: 93-102 - [c34]Hongxin Hu, Wonkyu Han, Gail-Joon Ahn, Ziming Zhao:
FLOWGUARD: building robust firewalls for software-defined networks. HotSDN 2014: 97-102 - 2013
- [j18]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Discovery and Resolution of Anomalies in Web Access Control Policies. IEEE Trans. Dependable Secur. Comput. 10(6): 341-354 (2013) - [j17]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma, Shan-Biao Wang:
Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy. IEEE Trans. Inf. Forensics Secur. 8(12): 2138-2153 (2013) - [j16]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Multiparty Access Control for Online Social Networks: Model and Mechanisms. IEEE Trans. Knowl. Data Eng. 25(7): 1614-1627 (2013) - [j15]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An, Changjun Hu:
Dynamic Audit Services for Outsourced Storages in Clouds. IEEE Trans. Serv. Comput. 6(2): 227-238 (2013) - [c33]Juan Wang, Xuhui Xie, Qingfei Wang, Fei Yan, Hongxin Hu, Sijun Zhou, Tao Wang:
Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing. CloudComp 2013: 90-101 - [c32]Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi, Longjie Zeng:
Towards a Security-Enhanced Firewall Application for OpenFlow Networks. CSS 2013: 92-103 - [c31]Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo, Hongxin Hu:
On the Security of Picture Gesture Authentication. USENIX Security Symposium 2013: 383-398 - 2012
- [b1]Hongxin Hu:
Assurance Management Framework for Access Control Systems. Arizona State University, Tempe, USA, 2012 - [j14]Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn, Hong-Jia Zhao:
Efficient construction of provably secure steganography under ordinary covert channels. Sci. China Inf. Sci. 55(7): 1639-1649 (2012) - [j13]Yan Zhu, Shan-Biao Wang, Hongxin Hu, Gail-Joon Ahn, Di Ma:
Secure Collaborative Integrity Verification for Hybrid Cloud Environments. Int. J. Cooperative Inf. Syst. 21(3): 165-198 (2012) - [j12]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Towards HIPAA-Compliant Healthcare Systems in Cloud Computing. Int. J. Comput. Model. Algorithms Medicine 3(2): 1-22 (2012) - [j11]Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu, Gail-Joon Ahn:
Comprehensive two-level analysis of role-based delegation and revocation policies with UML and OCL. Inf. Softw. Technol. 54(12): 1396-1417 (2012) - [j10]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Stephen S. Yau:
Efficient audit service outsourcing for data integrity in clouds. J. Syst. Softw. 85(5): 1083-1095 (2012) - [j9]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Mitigation for MANET Routing Attacks. IEEE Trans. Dependable Secur. Comput. 9(2): 250-260 (2012) - [j8]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Detecting and Resolving Firewall Policy Anomalies. IEEE Trans. Dependable Secur. Comput. 9(3): 318-331 (2012) - [j7]Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn, Jean-Pierre Seifert:
Remote Attestation with Domain-Based Integrity Model and Policy Analysis. IEEE Trans. Dependable Secur. Comput. 9(3): 429-442 (2012) - [j6]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu:
Cooperative Provable Data Possession for Integrity Verification in Multicloud Storage. IEEE Trans. Parallel Distributed Syst. 23(12): 2231-2244 (2012) - [c30]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Mengyang Yu, Hong-Jia Zhao:
Comparison-based encryption for fine-grained access control in clouds. CODASPY 2012: 105-116 - [c29]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Secure sharing of electronic health records in clouds. CollaborateCom 2012: 711-718 - [c28]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu, Deepinder Mahi:
SocialImpact: Systematic Analysis of Underground Social Dynamics. ESORICS 2012: 877-894 - [c27]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Enabling Collaborative data sharing in Google+. GLOBECOM 2012: 720-725 - [c26]Yan Zhu, Shan-Biao Wang, Di Ma, Hongxin Hu, Gail-Joon Ahn:
Secure and efficient constructions of hash, MAC and PRF for mobile devices. GLOBECOM 2012: 949-954 - [c25]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu:
Towards HIPAA-compliant healthcare systems. IHI 2012: 593-602 - [c24]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang, Shan-Biao Wang:
Towards temporal access control in cloud computing. INFOCOM 2012: 2576-2580 - [c23]Yiming Jing, Gail-Joon Ahn, Hongxin Hu:
Model-Based Conformance Testing for Android. IWSEC 2012: 1-18 - 2011
- [j5]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu:
Zero-knowledge proofs of retrievability. Sci. China Inf. Sci. 54(8): 1608-1617 (2011) - [j4]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for electronic healthcare services. Comput. Secur. 30(2-3): 116-127 (2011) - [j3]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang, Shan-Biao Wang:
Provably Secure Role-Based Encryption with Revocation Mechanism. J. Comput. Sci. Technol. 26(4): 697-710 (2011) - [c22]Hongxin Hu, Gail-Joon Ahn, Jan Jorgensen:
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. ACSAC 2011: 103-112 - [c21]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong, Shimin Chen:
Poster: temporal attribute-based encryption in clouds. CCS 2011: 881-884 - [c20]Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han, Shimin Chen:
Collaborative integrity verification in hybrid clouds. CollaborateCom 2011: 191-200 - [c19]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Ontology-based policy anomaly management for autonomic computing. CollaborateCom 2011: 487-494 - [c18]Hongxin Hu, Gail-Joon Ahn:
Multiparty Authorization Framework for Data Sharing in Online Social Networks. DBSec 2011: 29-43 - [c17]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Examining Social Dynamics for Countering Botnet Attacks. GLOBECOM 2011: 1-5 - [c16]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Dynamic audit services for integrity verification of outsourced storages in clouds. SAC 2011: 1550-1557 - [c15]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
Anomaly discovery and resolution in web access control policies. SACMAT 2011: 165-174 - [c14]Ziming Zhao, Gail-Joon Ahn, Hongxin Hu:
Automatic Extraction of Secrets from Malware. WCRE 2011: 159-168 - 2010
- [j2]Hongxin Hu, Gail-Joon Ahn:
Constructing Authorization Systems Using Assurance Management Framework. IEEE Trans. Syst. Man Cybern. Part C 40(4): 396-405 (2010) - [c13]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic role-based security mechanisms based on role-key hierarchy. AsiaCCS 2010: 314-319 - [c12]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. CCS 2010: 756-758 - [c11]Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu, Mukesh Singhal:
Information flow control in cloud computing. CollaborateCom 2010: 1-7 - [c10]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A collaborative framework for privacy protection in online social networks. CollaborateCom 2010: 1-10 - [c9]Gail-Joon Ahn, Hongxin Hu, Joohyung Lee, Yunsong Meng:
Representing and Reasoning about Web Access Control Policies. COMPSAC 2010: 137-146 - [c8]Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang, Jean-Pierre Seifert:
DR@FT: Efficient Remote Attestation Framework for Dynamic Systems. ESORICS 2010: 182-198 - [c7]Ziming Zhao, Hongxin Hu, Gail-Joon Ahn, Ruoyu Wu:
Risk-Aware Response for Mitigating MANET Routing Attacks. GLOBECOM 2010: 1-6 - [c6]Hongxin Hu, Gail-Joon Ahn, Ketan Kulkarni:
FAME: a firewall anomaly management environment. SafeConfig 2010: 17-26 - [i3]Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Huaixi Wang:
Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy. IACR Cryptol. ePrint Arch. 2010: 188 (2010) - [i2]Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau:
Efficient provable data possession for hybrid clouds. IACR Cryptol. ePrint Arch. 2010: 234 (2010) - [i1]Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu, Gail-Joon Ahn:
A Collaborative Framework for Privacy Protection in Online Social Networks. IACR Cryptol. ePrint Arch. 2010: 491 (2010)
2000 – 2009
- 2009
- [j1]Gail-Joon Ahn, Hongxin Hu, Jing Jin:
Security-Enhanced OSGi Service Environments. IEEE Trans. Syst. Man Cybern. Part C 39(5): 562-571 (2009) - [c5]Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael J. Covington, Xinwen Zhang:
Patient-centric authorization framework for sharing electronic health records. SACMAT 2009: 125-134 - 2008
- [c4]Gail-Joon Ahn, Hongxin Hu, Jing Jin:
Towards Role-Based Authorization for OSGi Service Environments. FTDCS 2008: 23-29 - [c3]Hongxin Hu, Gail-Joon Ahn:
Enabling verification and conformance testing for access control model. SACMAT 2008: 195-204 - 2007
- [c2]Jing Jin, Gail-Joon Ahn, Mohamed Shehab, Hongxin Hu:
Towards trust-aware access management for ad-hoc collaborations. CollaborateCom 2007: 41-48 - [c1]Gail-Joon Ahn, Hongxin Hu:
Towards realizing a formal RBAC model in real systems. SACMAT 2007: 215-224
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:04 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint