Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Huirong Fu
@article{DBLP:journals/corr/abs-2311-12074, author = {Xuemei Li and Huirong Fu}, title = {SecureBERT and {LLAMA} 2 Empowered Control Area Network Intrusion Detection and Classification}, journal = {CoRR}, volume = {abs/2311.12074}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2311.12074}, doi = {10.48550/ARXIV.2311.12074}, eprinttype = {arXiv}, eprint = {2311.12074}, timestamp = {Wed, 29 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2311-12074.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/winet/ZhuSF21, author = {Rui Zhu and Tao Shu and Huirong Fu}, title = {Statistical inference attack against PHY-layer key extraction and countermeasures}, journal = {Wirel. Networks}, volume = {27}, number = {7}, pages = {4853--4873}, year = {2021}, url = {https://doi.org/10.1007/s11276-021-02769-x}, doi = {10.1007/S11276-021-02769-X}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/winet/ZhuSF21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2005-05571, author = {Abdulrahman Alzahrani and Ali Alshehri and Hani Alshahrani and Huirong Fu}, title = {Ransomware in Windows and Android Platforms}, journal = {CoRR}, volume = {abs/2005.05571}, year = {2020}, url = {https://arxiv.org/abs/2005.05571}, eprinttype = {arXiv}, eprint = {2005.05571}, timestamp = {Thu, 14 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2005-05571.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/LiuFHLL19, author = {Anyi Liu and Huirong Fu and Yuan Hong and Jigang Liu and Yingjiu Li}, title = {\emph{LiveForen}: Ensuring Live Forensic Integrity in the Cloud}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {14}, number = {10}, pages = {2749--2764}, year = {2019}, url = {https://doi.org/10.1109/TIFS.2019.2898841}, doi = {10.1109/TIFS.2019.2898841}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/LiuFHLL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/GumudavallyZFG19, author = {Saikrishna Gumudavally and Ye Zhu and Huirong Fu and Yong Guan}, title = {HECTor: Homomorphic Encryption Enabled Onion Routing}, booktitle = {2019 {IEEE} International Conference on Communications, {ICC} 2019, Shanghai, China, May 20-24, 2019}, pages = {1--6}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/ICC.2019.8762038}, doi = {10.1109/ICC.2019.8762038}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/GumudavallyZFG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icisdm/AlshehriMAAF19, author = {Ali Alshehri and Pawel Marcinek and Abdulrahman Alzahrani and Hani Alshahrani and Huirong Fu}, title = {PUREDroid: Permission Usage and Risk Estimation for Android Applications}, booktitle = {Proceedings of the 3rd International Conference on Information System and Data Mining, {ICISDM} 2019, Houston, TX, USA, April 6-8, 2019}, pages = {179--184}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3325917.3325941}, doi = {10.1145/3325917.3325941}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icisdm/AlshehriMAAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tpsisa/AlzahraniAAF19, author = {Abdulrahman Alzahrani and Hani Alshahrani and Ali Alshehri and Huirong Fu}, title = {An Intelligent Behavior-Based Ransomware Detection System For Android Platform}, booktitle = {First {IEEE} International Conference on Trust, Privacy and Security in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles, CA, USA, December 12-14, 2019}, pages = {28--35}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/TPS-ISA48467.2019.00013}, doi = {10.1109/TPS-ISA48467.2019.00013}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tpsisa/AlzahraniAAF19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhuGCOAFT18, author = {Ye Zhu and Jonathan Gurary and George P. Corser and Jared Oluoch and Nahed Alnahash and Huirong Fu and Junhua Tang}, title = {{CMAPS:} {A} Chess-Based Multi-Facet Password Scheme for Mobile Devices}, journal = {{IEEE} Access}, volume = {6}, pages = {54795--54810}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2872772}, doi = {10.1109/ACCESS.2018.2872772}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhuGCOAFT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/AlshehriAAAFLZ18, author = {Ali Alshehri and Hani Alshahrani and Abdulrahman Alzahrani and Raed Alharthi and Huirong Fu and Anyi Liu and Ye Zhu}, title = {{DOPA:} Detecting Open Ports in Android {OS}}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433207}, doi = {10.1109/CNS.2018.8433207}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/AlshehriAAAFLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/BanihaniAAFC18, author = {Abdelnasser Banihani and Abdulrahman Alzahrani and Raed Alharthi and Huirong Fu and George P. Corser}, title = {{T-PAAD:} Trajectory Privacy Attack on Autonomous Driving}, booktitle = {2018 {IEEE} Conference on Communications and Network Security, {CNS} 2018, Beijing, China, May 30 - June 1, 2018}, pages = {1--2}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/CNS.2018.8433168}, doi = {10.1109/CNS.2018.8433168}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cns/BanihaniAAFC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/AlharthiBAAAFLZ18, author = {Raed Alharthi and Abdelnasser Banihani and Abdulrahman Alzahrani and Ali Alshehri and Hani Alshahrani and Huirong Fu and Anyi Liu and Ye Zhu}, title = {Location Privacy Challenges in Spatial Crowdsourcing}, booktitle = {2018 {IEEE} International Conference on Electro/Information Technology, {EIT} 2018, Rochester, MI, USA, May 3-5, 2018}, pages = {564--569}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EIT.2018.8500311}, doi = {10.1109/EIT.2018.8500311}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/AlharthiBAAAFLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/LiuF18, author = {Anyi Liu and Huirong Fu}, title = {Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics}, booktitle = {2018 {IEEE} International Conference on Electro/Information Technology, {EIT} 2018, Rochester, MI, USA, May 3-5, 2018}, pages = {589--594}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EIT.2018.8500169}, doi = {10.1109/EIT.2018.8500169}, timestamp = {Fri, 31 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/eit/LiuF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/ZhuFS18, author = {Rui Zhu and Huirong Fu and Tao Shu}, title = {Information-Theoretic Security and Energy Efficiency for Information and Power Transfer in Two-Hop Wireless Relay Networks}, booktitle = {2018 {IEEE} International Conference on Electro/Information Technology, {EIT} 2018, Rochester, MI, USA, May 3-5, 2018}, pages = {877--881}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EIT.2018.8500123}, doi = {10.1109/EIT.2018.8500123}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/ZhuFS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/AlzahraniAAAFLZ18, author = {Abdulrahman Alzahrani and Ali Alshehri and Hani Alshahrani and Raed Alharthi and Huirong Fu and Anyi Liu and Ye Zhu}, title = {RanDroid: Structural Similarity Approach for Detecting Ransomware Applications in Android Platform}, booktitle = {2018 {IEEE} International Conference on Electro/Information Technology, {EIT} 2018, Rochester, MI, USA, May 3-5, 2018}, pages = {892--897}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/EIT.2018.8500161}, doi = {10.1109/EIT.2018.8500161}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/AlzahraniAAAFLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccel/AlshahraniMTAAF18, author = {Hani Alshahrani and Harrison Mansourt and Seaver Thorn and Ali Alshehri and Abdulrahman Alzahrani and Huirong Fu}, title = {DDefender: Android application threat detection using static and dynamic analysis}, booktitle = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018, Las Vegas, NV, USA, January 12-14, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICCE.2018.8326293}, doi = {10.1109/ICCE.2018.8326293}, timestamp = {Sun, 06 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccel/AlshahraniMTAAF18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1810-00200, author = {Rui Zhu and Tao Shu and Huirong Fu}, title = {Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures}, journal = {CoRR}, volume = {abs/1810.00200}, year = {2018}, url = {http://arxiv.org/abs/1810.00200}, eprinttype = {arXiv}, eprint = {1810.00200}, timestamp = {Tue, 30 Oct 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1810-00200.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csiirw/MansourDWBFZ17, author = {Ahmad Mansour and Andrew Davis and Matthew Wagner and Richard Bassous and Huirong Fu and Ye Zhu}, editor = {Joseph P. Trien and Stacy J. Prowell and John R. Goodall and Justin M. Beaver and Robert A. Bridges}, title = {Multi-asymmetric cryptographic {RSA} scheme}, booktitle = {Proceedings of the 12th Annual Conference on Cyber and Information Security Research, {CISRC} 2017, Oak Ridge, TN, USA, April 4 - 6, 2017}, pages = {9:1--9:8}, publisher = {{ACM}}, year = {2017}, url = {https://doi.org/10.1145/3064814.3064820}, doi = {10.1145/3064814.3064820}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/csiirw/MansourDWBFZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/milcom/ZhuSF17, author = {Rui Zhu and Tao Shu and Huirong Fu}, title = {Empirical statistical inference attack against PHY-layer key extraction in real environments}, booktitle = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore, MD, USA, October 23-25, 2017}, pages = {46--51}, publisher = {{IEEE}}, year = {2017}, url = {https://doi.org/10.1109/MILCOM.2017.8170755}, doi = {10.1109/MILCOM.2017.8170755}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/milcom/ZhuSF17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/CorserFB16, author = {George P. Corser and Huirong Fu and Abdelnasser Banihani}, title = {Evaluating Location Privacy in Vehicular Communications and Applications}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {17}, number = {9}, pages = {2658--2667}, year = {2016}, url = {https://doi.org/10.1109/TITS.2015.2506579}, doi = {10.1109/TITS.2015.2506579}, timestamp = {Tue, 24 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/CorserFB16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hci/GuraryZAF16, author = {Jonathan Gurary and Ye Zhu and Nahed Alnahash and Huirong Fu}, editor = {Theo Tryfonas}, title = {Implicit Authentication for Mobile Devices Using Typing Behavior}, booktitle = {Human Aspects of Information Security, Privacy, and Trust - 4th International Conference, {HAS} 2016, Held as Part of {HCI} International 2016, Toronto, ON, Canada, July 17-22, 2016, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9750}, pages = {25--36}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-39381-0\_3}, doi = {10.1007/978-3-319-39381-0\_3}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/hci/GuraryZAF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccnc/CorserAF16, author = {George P. Corser and Alejandro Arenas and Huirong Fu}, title = {Effect on vehicle safety of nonexistent or silenced basic safety messages}, booktitle = {2016 International Conference on Computing, Networking and Communications, {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016}, pages = {1--5}, publisher = {{IEEE} Computer Society}, year = {2016}, url = {https://doi.org/10.1109/ICCNC.2016.7440550}, doi = {10.1109/ICCNC.2016.7440550}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccnc/CorserAF16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/YinMLWF15, author = {Jiechen Yin and Yuming Mao and Supeng Leng and Xiang Wang and Huirong Fu}, title = {QoE Provisioning by Random Access in Next-Generation Wireless Networks}, booktitle = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San Diego, CA, USA, December 6-10, 2015}, pages = {1--7}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/GLOCOM.2014.7417656}, doi = {10.1109/GLOCOM.2014.7417656}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/YinMLWF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/BassousBFZ15, author = {Richard Bassous and Roger Bassous and Huirong Fu and Ye Zhu}, title = {Ambiguous Multi-Symmetric Cryptography}, booktitle = {2015 {IEEE} International Conference on Communications, {ICC} 2015, London, United Kingdom, June 8-12, 2015}, pages = {7394--7399}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/ICC.2015.7249508}, doi = {10.1109/ICC.2015.7249508}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/BassousBFZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/tabletop/GuraryZCOAF15, author = {Jonathan Gurary and Ye Zhu and George P. Corser and Jared Oluoch and Nahed Alnahash and Huirong Fu}, editor = {Nuno Jardim Nunes and Enrico Costanza and Patrick Olivier and Johannes Sch{\"{o}}ning}, title = {{MAPS:} {A} Multi-Dimensional Password Scheme for Mobile Authentication}, booktitle = {Proceedings of the 2015 International Conference on Interactive Tabletops {\&} Surfaces, {ITS} 2015, Funchal, Portugal, November 15-18, 2015}, pages = {409--412}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2817721.2823479}, doi = {10.1145/2817721.2823479}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/tabletop/GuraryZCOAF15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ShaoLZF14, author = {Caixing Shao and Supeng Leng and Yan Zhang and Huirong Fu}, title = {A multi-priority supported medium access control in Vehicular Ad Hoc Networks}, journal = {Comput. Commun.}, volume = {39}, pages = {11--21}, year = {2014}, url = {https://doi.org/10.1016/j.comcom.2013.11.002}, doi = {10.1016/J.COMCOM.2013.11.002}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ShaoLZF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhuVF14, author = {Ye Zhu and Anil Vikram and Huirong Fu}, title = {On Topology of Sensor Networks Deployed for Multitarget Tracking}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {15}, number = {4}, pages = {1489--1498}, year = {2014}, url = {https://doi.org/10.1109/TITS.2014.2301033}, doi = {10.1109/TITS.2014.2301033}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/ZhuVF14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/twc/ZhuVFG14, author = {Ye Zhu and Anil Vikram and Huirong Fu and Yong Guan}, title = {On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks}, journal = {{IEEE} Trans. Wirel. Commun.}, volume = {13}, number = {11}, pages = {6496--6510}, year = {2014}, url = {https://doi.org/10.1109/TWC.2014.2329306}, doi = {10.1109/TWC.2014.2329306}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/twc/ZhuVFG14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ijcnn/PennaYFZ14, author = {Kiran Penna and Venkatesh Yalavarthi and Huirong Fu and Ye Zhu}, title = {Evaluation of active position detection in Vehicular Ad Hoc Networks}, booktitle = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014, Beijing, China, July 6-11, 2014}, pages = {2234--2239}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IJCNN.2014.6889978}, doi = {10.1109/IJCNN.2014.6889978}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ijcnn/PennaYFZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ivs/CorserFSDMLZ14, author = {George P. Corser and Huirong Fu and Tao Shu and Patrick D'Errico and Warren Ma and Supeng Leng and Ye Zhu}, title = {Privacy-by-Decoy: Protecting location privacy against collusion and deanonymization in vehicular location based services}, booktitle = {2014 {IEEE} Intelligent Vehicles Symposium Proceedings, Dearborn, MI, USA, June 8-11, 2014}, pages = {1030--1036}, publisher = {{IEEE}}, year = {2014}, url = {https://doi.org/10.1109/IVS.2014.6856595}, doi = {10.1109/IVS.2014.6856595}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ivs/CorserFSDMLZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitn/CaushajFSBWZL13, author = {Eralda Caushaj and Huirong Fu and Ishwar K. Sethi and Haissam Badih and Dion Watson and Ye Zhu and Supeng Leng}, title = {Theoretical Analysis and Experimental Study: Monitoring Data Privacy in Smartphone Communications}, journal = {Int. J. Interdiscip. Telecommun. Netw.}, volume = {5}, number = {2}, pages = {66--82}, year = {2013}, url = {https://doi.org/10.4018/jitn.2013040106}, doi = {10.4018/JITN.2013040106}, timestamp = {Mon, 30 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitn/CaushajFSBWZL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijitn/CorserAOFC13, author = {George P. Corser and Suzan Arslanturk and Jared Oluoch and Huirong Fu and George E. Corser}, title = {Knowing the Enemy at the Gates: Measuring Attacker Motivation}, journal = {Int. J. Interdiscip. Telecommun. Netw.}, volume = {5}, number = {2}, pages = {83--95}, year = {2013}, url = {https://doi.org/10.4018/jitn.2013040107}, doi = {10.4018/JITN.2013040107}, timestamp = {Wed, 01 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijitn/CorserAOFC13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccve/CorserFSDM13, author = {George P. Corser and Huirong Fu and Tao Shu and Patrick D'Errico and Warren Ma}, title = {Endpoint protection zone {(EPZ):} Protecting {LBS} user location privacy against deanonymization and collusion in vehicular networks}, booktitle = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012, Las Vegas, NV, USA, December 2-6, 2013}, pages = {369--374}, publisher = {{IEEE}}, year = {2013}, url = {https://doi.org/10.1109/ICCVE.2013.6799822}, doi = {10.1109/ICCVE.2013.6799822}, timestamp = {Mon, 09 Aug 2021 14:54:01 +0200}, biburl = {https://dblp.org/rec/conf/iccve/CorserFSDM13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/WangLFZ12, author = {Qing Wang and Supeng Leng and Huirong Fu and Yan Zhang}, title = {An {IEEE} 802.11p-Based Multichannel {MAC} Scheme With Channel Coordination for Vehicular Ad Hoc Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {13}, number = {2}, pages = {449--458}, year = {2012}, url = {https://doi.org/10.1109/TITS.2011.2171951}, doi = {10.1109/TITS.2011.2171951}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/WangLFZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/OluochFYZT12, author = {Jared Oluoch and Huirong Fu and Astrid Younang and Ye Zhu and Bao Tri{-}Tran}, editor = {Michael E. Whitman and Humayun Zafar}, title = {A simulation study of impacts of collaborative worm hole attacks in mobile ad hoc networks (MANETs)}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {40--45}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390324}, doi = {10.1145/2390317.2390324}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/OluochFYZT12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infoseccd/CaushajFBSZL12, author = {Eralda Caushaj and Huirong Fu and Haissam Badih and Ishwar K. Sethi and Ye Zhu and Supeng Leng}, editor = {Michael E. Whitman and Humayun Zafar}, title = {Attacks and countermeasures in wireless cellular networks}, booktitle = {Proceedings of the 2012 Information Security Curriculum Development Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012}, pages = {46--52}, publisher = {{ACM}}, year = {2012}, url = {https://doi.org/10.1145/2390317.2390325}, doi = {10.1145/2390317.2390325}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infoseccd/CaushajFBSZL12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mass/ZhuVF12, author = {Ye Zhu and Anil Vikram and Huirong Fu}, title = {On tracking multiple indistinguishable targets}, booktitle = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems, {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012}, pages = {1--9}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/MASS.2012.6502496}, doi = {10.1109/MASS.2012.6502496}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/mass/ZhuVF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcnc/ShaoLZF12, author = {Caixing Shao and Supeng Leng and Yan Zhang and Huirong Fu}, title = {A multi-priority supported p-persistent {MAC} protocol for Vehicular Ad Hoc Networks}, booktitle = {2012 {IEEE} Wireless Communications and Networking Conference, {WCNC} 2012, Paris, France, April 1-4, 2012}, pages = {2532--2537}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/WCNC.2012.6214225}, doi = {10.1109/WCNC.2012.6214225}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/wcnc/ShaoLZF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhuF11, author = {Ye Zhu and Huirong Fu}, title = {Traffic analysis attacks on Skype VoIP calls}, journal = {Comput. Commun.}, volume = {34}, number = {10}, pages = {1202--1212}, year = {2011}, url = {https://doi.org/10.1016/j.comcom.2010.12.007}, doi = {10.1016/J.COMCOM.2010.12.007}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comcom/ZhuF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdwm/ZhuFF11, author = {Ye Zhu and Yongjian Fu and Huirong Fu}, title = {Preserving Privacy in Time Series Data Mining}, journal = {Int. J. Data Warehous. Min.}, volume = {7}, number = {4}, pages = {64--85}, year = {2011}, url = {https://doi.org/10.4018/jdwm.2011100104}, doi = {10.4018/JDWM.2011100104}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdwm/ZhuFF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WeerasingheTF11, author = {Hesiri Weerasinghe and Raymond Tackett and Huirong Fu}, title = {Verifying position and velocity for vehicular ad-hoc networks}, journal = {Secur. Commun. Networks}, volume = {4}, number = {7}, pages = {785--791}, year = {2011}, url = {https://doi.org/10.1002/sec.231}, doi = {10.1002/SEC.231}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WeerasingheTF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/wicomm/LengFWZ11, author = {Supeng Leng and Huirong Fu and Qing Wang and Yan Zhang}, title = {Medium access control in vehicular \emph{ad hoc} networks}, journal = {Wirel. Commun. Mob. Comput.}, volume = {11}, number = {7}, pages = {796--812}, year = {2011}, url = {https://doi.org/10.1002/wcm.869}, doi = {10.1002/WCM.869}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/wicomm/LengFWZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isi/WeerasingheFLZ11, author = {Hesiri Weerasinghe and Huirong Fu and Supeng Leng and Ye Zhu}, title = {Enhancing unlinkability in Vehicular Ad Hoc Networks}, booktitle = {2011 {IEEE} International Conference on Intelligence and Security Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011}, pages = {161--166}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ISI.2011.5983992}, doi = {10.1109/ISI.2011.5983992}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/isi/WeerasingheFLZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/vtc/WangLZF11, author = {Qing Wang and Supeng Leng and Yan Zhang and Huirong Fu}, title = {A QoS Supported Multi-Channel {MAC} for Vehicular Ad Hoc Networks}, booktitle = {Proceedings of the 73rd {IEEE} Vehicular Technology Conference, {VTC} Spring 2011, 15-18 May 2011, Budapest, Hungary}, pages = {1--5}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/VETECS.2011.5956230}, doi = {10.1109/VETECS.2011.5956230}, timestamp = {Tue, 16 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/vtc/WangLZF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wasa/ZhuVF11, author = {Ye Zhu and Anil Vikram and Huirong Fu}, editor = {Yu Cheng and Do Young Eun and Zhiguang Qin and Min Song and Kai Xing}, title = {On Topology of Sensor Networks Deployed for Tracking}, booktitle = {Wireless Algorithms, Systems, and Applications - 6th International Conference, {WASA} 2011, Chengdu, China, August 11-13, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6843}, pages = {60--71}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23490-3\_6}, doi = {10.1007/978-3-642-23490-3\_6}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wasa/ZhuVF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ida/ZhuFF10, author = {Ye Zhu and Yongjian Fu and Huirong Fu}, title = {A new class of attacks on time series data mining{\textbackslash}m\{1\}}, journal = {Intell. Data Anal.}, volume = {14}, number = {3}, pages = {405--418}, year = {2010}, url = {https://doi.org/10.3233/IDA-2010-0428}, doi = {10.3233/IDA-2010-0428}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ida/ZhuFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdmmm/ZhuFF10, author = {Ye Zhu and Yongjian Fu and Huirong Fu}, title = {On privacy-preserving time series data classification}, journal = {Int. J. Data Min. Model. Manag.}, volume = {2}, number = {2}, pages = {117--136}, year = {2010}, url = {https://doi.org/10.1504/IJDMMM.2010.032145}, doi = {10.1504/IJDMMM.2010.032145}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijdmmm/ZhuFF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsw/HeHFQ10, author = {Yong{-}Zhong He and Zhen Han and Huirong Fu and Guangzhi Qu}, title = {The Formal Model of {DBMS} Enforcing Multiple Security Polices}, journal = {J. Softw.}, volume = {5}, number = {5}, pages = {514--521}, year = {2010}, url = {https://doi.org/10.4304/jsw.5.5.514-521}, doi = {10.4304/JSW.5.5.514-521}, timestamp = {Tue, 16 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsw/HeHFQ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WeerasingheFL10, author = {Hesiri Weerasinghe and Huirong Fu and Supeng Leng}, title = {Anonymous service access for Vehicular Ad hoc Networks}, booktitle = {Sixth International Conference on Information Assurance and Security, {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010}, pages = {173--178}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/ISIAS.2010.5604052}, doi = {10.1109/ISIAS.2010.5604052}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/IEEEias/WeerasingheFL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/springsim/JinWF10, author = {Kyohong Jin and Hesiri Weerasinghe and Huirong Fu}, editor = {Robert M. McGraw and Eric S. Imsand and Michael J. Chinni}, title = {Enhancement of {IEEE} 802.11 modules in ns-2 and performance evaluation with error rate}, booktitle = {Proceedings of the 2010 Spring Simulation Multiconference, SpringSim 2010, Orlando, Florida, USA, April 11-15, 2010}, pages = {149}, publisher = {{SCS/ACM}}, year = {2010}, url = {https://doi.org/10.1145/1878537.1878693}, doi = {10.1145/1878537.1878693}, timestamp = {Tue, 09 Mar 2021 09:46:48 +0100}, biburl = {https://dblp.org/rec/conf/springsim/JinWF10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/WamplerFZ09, author = {David Wampler and Huirong Fu and Ye Zhu}, title = {Security Threats and Countermeasures for Intra-vehicle Networks}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {153--157}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.350}, doi = {10.1109/IAS.2009.350}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/WamplerFZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/RajanYNFZ09, author = {Deepa Susan Rajan and Chetan Yeole and Harsha Nakade and Huirong Fu and Ye Zhu}, title = {Position Verification in Multi-hop Vehicular Networks}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {580--584}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.345}, doi = {10.1109/IAS.2009.345}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/RajanYNFZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/HeHF09, author = {Yong{-}Zhong He and Zhen Han and Huirong Fu}, editor = {Hamid R. Arabnia and Kevin Daimi}, title = {Usage Control in Conditional Access System with malicious Set-top Box}, booktitle = {Proceedings of the 2009 International Conference on Security {\&} Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2 Volumes}, pages = {201--205}, publisher = {{CSREA} Press}, year = {2009}, timestamp = {Wed, 04 Nov 2009 14:56:55 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/HeHF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/LiuLFL09, author = {Ke Liu and Supeng Leng and Huirong Fu and Longjiang Li}, title = {A Novel Dual Busy Tone Aided {MAC} Protocol for Multi-hop Wireless Networks}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {373--378}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.20}, doi = {10.1109/DASC.2009.20}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/LiuLFL09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgit/DokEF09, author = {Hang Dok and Ruben Echevarria and Huirong Fu}, editor = {Dominik Slezak and Tai{-}Hoon Kim and Alan Chin{-}Chen Chang and Thanos Vasilakos and Mingchu Li and Kouichi Sakurai}, title = {Privacy Issues for Vehicular Ad-Hoc Network}, booktitle = {Communication and Networking - International Conference, {FGCN/ACN} 2009, Held as Part of the Future Generation Information Technology Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009. Proceedings}, series = {Communications in Computer and Information Science}, volume = {56}, pages = {370--383}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-10844-0\_44}, doi = {10.1007/978-3-642-10844-0\_44}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/fgit/DokEF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/ZhuLVF09, author = {Ye Zhu and Yuanchao Lu and Anil Vikram and Huirong Fu}, title = {On Privacy of Skype VoIP Calls}, booktitle = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM} 2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009}, pages = {1--6}, publisher = {{IEEE}}, year = {2009}, url = {https://doi.org/10.1109/GLOCOM.2009.5425852}, doi = {10.1109/GLOCOM.2009.5425852}, timestamp = {Tue, 24 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/globecom/ZhuLVF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/mldm/ZhuFF09, author = {Ye Zhu and Yongjian Fu and Huirong Fu}, editor = {Petra Perner}, title = {Preserving Privacy in Time Series Data Classification by Discretization}, booktitle = {Machine Learning and Data Mining in Pattern Recognition, 6th International Conference, {MLDM} 2009, Leipzig, Germany, July 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5632}, pages = {53--67}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-03070-3\_5}, doi = {10.1007/978-3-642-03070-3\_5}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/mldm/ZhuFF09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FuKZZ08, author = {Huirong Fu and Satoshi Kawamura and Ming Zhang and Liren Zhang}, title = {Replication attack on random key pre-distribution schemes for wireless sensor networks}, journal = {Comput. Commun.}, volume = {31}, number = {4}, pages = {842--857}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.026}, doi = {10.1016/J.COMCOM.2007.10.026}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FuKZZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WangGF08, author = {Xidong Wang and Charlie Gladden and Huirong Fu}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Secure Inter-Vehicle Vital Signal Communication via Short Dynamic Group Management}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {415--421}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 12:46:27 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WangGF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/QureshiCWF08, author = {Rahat Qureshi and Min Chang and Hesiri Weerasinghe and Huirong Fu}, editor = {Hamid R. Arabnia and Selim Aissi}, title = {Intrusion Detection System for Wireless Sensor Networks}, booktitle = {Proceedings of the 2008 International Conference on Security {\&} Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008}, pages = {582--585}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/QureshiCWF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/LangleyLF08, author = {Christopher Langley and Raul Lucas and Huirong Fu}, title = {Key management in vehicular ad-hoc networks}, booktitle = {2008 {IEEE} International Conference on Electro/Information Technology, {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008}, pages = {223--226}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/EIT.2008.4554301}, doi = {10.1109/EIT.2008.4554301}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/LangleyLF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/eit/MurrayCF08, author = {Todd Murray and Michael Cojocari and Huirong Fu}, title = {Measuring the performance of {IEEE} 802.11p using ns-2 simulator for vehicular networks}, booktitle = {2008 {IEEE} International Conference on Electro/Information Technology, {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20, 2008}, pages = {498--503}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/EIT.2008.4554354}, doi = {10.1109/EIT.2008.4554354}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/eit/MurrayCF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/gridnets/KrupadanamF08, author = {Sireesha Krupadanam and Huirong Fu}, editor = {Pascale Vicat{-}Blanc Primet and Tomohiro Kudoh and Joe Mambretti}, title = {Localization Anomaly Detection in Wireless Sensor Networks for Non-flat Terrains}, booktitle = {Networks for Grid Applications, Second International Conference, GridNets 2008, Beijing, China, October 8-10, 2008, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {2}, pages = {175--186}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-642-02080-3\_18}, doi = {10.1007/978-3-642-02080-3\_18}, timestamp = {Wed, 17 May 2017 14:24:57 +0200}, biburl = {https://dblp.org/rec/conf/gridnets/KrupadanamF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/ChilukotiJWF08, author = {Vikram Chilukoti and Doriel Josic and Hesiri Weerasinghe and Huirong Fu}, editor = {Hamid R. Arabnia and Victor A. Clincy}, title = {Modeling Attacks on Wireless Sensor Networks}, booktitle = {Proceedings of the 2008 International Conference on Wireless Networks, July 14-17, 2008, Las Vegas, Nevada, {USA}}, pages = {23--29}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 10:37:49 +0100}, biburl = {https://dblp.org/rec/conf/icwn/ChilukotiJWF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/JoshiPEWF08, author = {Manjiri Joshi and Ramya Pulimati and Srikanth Edula and Hesiri Weerasinghe and Huirong Fu}, editor = {Hamid R. Arabnia and Victor A. Clincy}, title = {Robustness of Grid-based Deployment in Wireless Sensors Network}, booktitle = {Proceedings of the 2008 International Conference on Wireless Networks, July 14-17, 2008, Las Vegas, Nevada, {USA}}, pages = {135--141}, publisher = {{CSREA} Press}, year = {2008}, timestamp = {Mon, 09 Feb 2009 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwn/JoshiPEWF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/ZhuFF08, author = {Ye Zhu and Yongjian Fu and Huirong Fu}, editor = {Takashi Washio and Einoshin Suzuki and Kai Ming Ting and Akihiro Inokuchi}, title = {On Privacy in Time Series Data Mining}, booktitle = {Advances in Knowledge Discovery and Data Mining, 12th Pacific-Asia Conference, {PAKDD} 2008, Osaka, Japan, May 20-23, 2008 Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5012}, pages = {479--493}, publisher = {Springer}, year = {2008}, url = {https://doi.org/10.1007/978-3-540-68125-0\_42}, doi = {10.1007/978-3-540-68125-0\_42}, timestamp = {Wed, 01 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/ZhuFF08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/LengZFY07, author = {Supeng Leng and Liren Zhang and Huirong Fu and Jianjun Yang}, title = {Mobility analysis of mobile hosts with random walking in ad hoc networks}, journal = {Comput. Networks}, volume = {51}, number = {10}, pages = {2514--2528}, year = {2007}, url = {https://doi.org/10.1016/j.comnet.2006.11.011}, doi = {10.1016/J.COMNET.2006.11.011}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/LengZFY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LengZFY07, author = {Supeng Leng and Liren Zhang and Huirong Fu and Jianjun Yang}, title = {A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile \emph{Ad Hoc} Networks}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {56}, number = {2}, pages = {810--817}, year = {2007}, url = {https://doi.org/10.1109/TVT.2007.891425}, doi = {10.1109/TVT.2007.891425}, timestamp = {Thu, 25 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LengZFY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/DokicKDF07, author = {Slobodan Dokic and Andrea Kulesh and Megha Dombal and Huirong Fu}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {An Overview of Multi-modal Biometrics for Authentication}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {39--44}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 16:45:17 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/DokicKDF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/YangSYWF07, author = {Shoua Yang and Shanti Sukumaran and Dipali Yermalkar and Hesiri Weerasinghe and Huirong Fu}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Security and Privacy: Open Issues with {RFID}}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {192--197}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Wed, 12 Dec 2007 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/YangSYWF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/WeerasingheF07, author = {Hesiri Weerasinghe and Huirong Fu}, title = {Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks: Simulation Implementation and Evaluation}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {362--367}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.184}, doi = {10.1109/FGCN.2007.184}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/WeerasingheF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fgcn/VelagapalliF07, author = {Sireesha Velagapalli and Huirong Fu}, title = {Beacon-less Location Detection in Wireless Sensor Networks for Non-flat Terrain}, booktitle = {Future Generation Communication and Networking, {FGCN} 2007, Ramada Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings}, pages = {528--534}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/FGCN.2007.78}, doi = {10.1109/FGCN.2007.78}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fgcn/VelagapalliF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcsw/WatsonPGF07, author = {Jason D. Watson and Mark Pellerito and Charlie Gladden and Huirong Fu}, title = {Simulation and Analysis of Extended Brake Lights for Inter-Vehicle Communication Networks}, booktitle = {27th International Conference on Distributed Computing Systems Workshops {(ICDCS} 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada}, pages = {87}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/ICDCSW.2007.112}, doi = {10.1109/ICDCSW.2007.112}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcsw/WatsonPGF07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FuZ06, author = {Huirong Fu and Ming Zhang}, title = {Online adaptive firewall allocation in internet data center}, journal = {Comput. Commun.}, volume = {29}, number = {10}, pages = {1858--1867}, year = {2006}, url = {https://doi.org/10.1016/j.comcom.2005.05.011}, doi = {10.1016/J.COMCOM.2005.05.011}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FuZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/Fu06, author = {Huirong Fu}, title = {On parameter estimation of a simple real-time flow aggregation model}, journal = {Int. J. Commun. Syst.}, volume = {19}, number = {7}, pages = {795--808}, year = {2006}, url = {https://doi.org/10.1002/dac.770}, doi = {10.1002/DAC.770}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/Fu06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijnsec/MangipudiKF06, author = {Kumar V. Mangipudi and Rajendra S. Katti and Huirong Fu}, title = {Authentication and Key Agreement Protocols Preserving Anonymity}, journal = {Int. J. Netw. Secur.}, volume = {3}, number = {3}, pages = {259--270}, year = {2006}, url = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p259-270.pdf}, timestamp = {Mon, 04 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijnsec/MangipudiKF06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/FuKL06, author = {Huirong Fu and Satoshi Kawamura and Chengzhi Li}, title = {Blom-based Q-composite: {A} Generalized Framework of Random Key Pre-distribution Schemes for Wireless Sensor Networks}, booktitle = {2006 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, {IROS} 2006, October 9-15, 2006, Beijing, China}, pages = {2022--2028}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IROS.2006.282413}, doi = {10.1109/IROS.2006.282413}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/FuKL06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/FuGMSZ05, author = {Huirong Fu and Vivek Goel and Elangovan Murugaiyan and Sudhan Shanmugasundaram and Liren Zhang}, editor = {Laurence Tianruo Yang and Hamid R. Arabnia and Li{-}Chun Wang}, title = {Unified Solution to Registration, Authentication and Billing for Wireless Hotspots: Architecture and Protocols}, booktitle = {Proceedings of the 2005 International Conference on Wireless Networks, {ICWN} 2005, Las Vegas, Nevada, USA, June 27-30, 2005}, pages = {590--594}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Tue, 29 Oct 2019 17:54:20 +0100}, biburl = {https://dblp.org/rec/conf/icwn/FuGMSZ05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/RamaswamyFN05, author = {Sanjay Ramaswamy and Huirong Fu and Kendall E. Nygard}, editor = {Laurence Tianruo Yang and Hamid R. Arabnia and Li{-}Chun Wang}, title = {Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks}, booktitle = {Proceedings of the 2005 International Conference on Wireless Networks, {ICWN} 2005, Las Vegas, Nevada, USA, June 27-30, 2005}, pages = {595--604}, publisher = {{CSREA} Press}, year = {2005}, timestamp = {Tue, 24 Jan 2006 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwn/RamaswamyFN05.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/MangipudiMKF04, author = {Kumar V. Mangipudi and Nagaraja Malneedi and Rajendra S. Katti and Huirong Fu}, title = {Attacks and solutions on Aydos-Savas-Koc's wireless authentication protocol}, booktitle = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM} '04, Dallas, Texas, USA, 29 November - 3 December 2004}, pages = {2229--2234}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/GLOCOM.2004.1378405}, doi = {10.1109/GLOCOM.2004.1378405}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/globecom/MangipudiMKF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/AhmedHF04, author = {Benzir Md Ahmed and Tanjina Helaly and Huirong Fu}, editor = {Hamid R. Arabnia and Laurence Tianruo Yang and Chi{-}Hsiang Yeh}, title = {Secure Routing in Wireless Mobile Ad Hoc Networks without the Support of Key Management Infrastructure}, booktitle = {Proceedings of the International Conference on Wireless Networks, {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1}, pages = {210--218}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Mon, 22 Nov 2004 14:01:57 +0100}, biburl = {https://dblp.org/rec/conf/icwn/AhmedHF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/KawamuraFCW04, author = {Satoshi Kawamura and Huirong Fu and Meegeum Choi and Shanhong Wu}, editor = {Hamid R. Arabnia and Laurence Tianruo Yang and Chi{-}Hsiang Yeh}, title = {End-to-End Mobility Management: {A} Two-Phase Deployment Scheme for Personal Use}, booktitle = {Proceedings of the International Conference on Wireless Networks, {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1}, pages = {286--301}, publisher = {{CSREA} Press}, year = {2004}, timestamp = {Mon, 22 Nov 2004 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icwn/KawamuraFCW04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/FuZ03, author = {Huirong Fu and Liren Zhang}, title = {Low cost pre-stored video transmission across networks}, journal = {Comput. Commun.}, volume = {26}, number = {18}, pages = {2061--2069}, year = {2003}, url = {https://doi.org/10.1016/S0140-3664(03)00190-7}, doi = {10.1016/S0140-3664(03)00190-7}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/FuZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/FuZ03, author = {Huirong Fu and Liren Zhang}, title = {Variable segmentation based on intrinsic video rate characteristics to transport pre-stored video across networks}, journal = {Int. J. Commun. Syst.}, volume = {16}, number = {10}, pages = {923--934}, year = {2003}, url = {https://doi.org/10.1002/dac.629}, doi = {10.1002/DAC.629}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/FuZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ton/FuK03, author = {Huirong Fu and Edward W. Knightly}, title = {A simple model of real-time flow aggregation}, journal = {{IEEE/ACM} Trans. Netw.}, volume = {11}, number = {3}, pages = {422--435}, year = {2003}, url = {https://doi.org/10.1109/TNET.2003.813045}, doi = {10.1109/TNET.2003.813045}, timestamp = {Sat, 27 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ton/FuK03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/SunF03, author = {Guangyuan Sun and Huirong Fu}, editor = {Kendall E. Nygard}, title = {Recent Advances on Intrusion Detection Techniques}, booktitle = {Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, November 11-13, 2003, Imperial Palace Hotel, Las Vegas, Nevada, {USA}}, pages = {83--86}, publisher = {{ISCA}}, year = {2003}, timestamp = {Fri, 08 Sep 2006 15:11:34 +0200}, biburl = {https://dblp.org/rec/conf/caine/SunF03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/caine/FuZ03, author = {Huirong Fu and Liren Zhang}, editor = {Kendall E. Nygard}, title = {Video Segmentation for Transporting Pre-Stored Video across Networks}, booktitle = {Proceedings of the 16th International Conference on Computer Applications in Industry and Engineering, November 11-13, 2003, Imperial Palace Hotel, Las Vegas, Nevada, {USA}}, pages = {221--224}, publisher = {{ISCA}}, year = {2003}, timestamp = {Fri, 08 Sep 2006 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/caine/FuZ03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icwn/RamaswamyFSDN03, author = {Sanjay Ramaswamy and Huirong Fu and Manohar Sreekantaradhya and John Dixon and Kendall E. Nygard}, editor = {Weihua Zhuang and Chi{-}Hsiang Yeh and Olaf Droegehorn and C.{-}T. Toh and Hamid R. Arabnia}, title = {Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks}, booktitle = {Proceedings of the International Conference on Wireless Networks, {ICWN} '03, June 23 - 26, 2003, Las Vegas, Nevada, {USA}}, pages = {570--575}, publisher = {{CSREA} Press}, year = {2003}, timestamp = {Wed, 15 Oct 2003 12:47:30 +0200}, biburl = {https://dblp.org/rec/conf/icwn/RamaswamyFSDN03.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangF01, author = {Liren Zhang and Huirong Fu}, title = {Optional dynamic bandwidth allocation based on playback tunnel to support video-on-demand service in virtual private networks}, journal = {Comput. Commun.}, volume = {24}, number = {11}, pages = {1019--1030}, year = {2001}, url = {https://doi.org/10.1016/S0140-3664(00)00340-6}, doi = {10.1016/S0140-3664(00)00340-6}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhangF01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangF01a, author = {Liren Zhang and Huirong Fu}, title = {Adaptive bandwidth allocation based on playback tunnel to support video on demand service over {ATM} networks}, journal = {Comput. Commun.}, volume = {24}, number = {15-16}, pages = {1485--1496}, year = {2001}, url = {https://doi.org/10.1016/S0140-3664(01)00301-2}, doi = {10.1016/S0140-3664(01)00301-2}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhangF01a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijcomsys/ZhangFN01, author = {Liren Zhang and Huirong Fu and Chee Hock Ng}, title = {Dynamic bandwidth allocation and buffer dimensioning under equal segment scheme to support video-on-demand services}, journal = {Int. J. Commun. Syst.}, volume = {14}, number = {10}, pages = {941--960}, year = {2001}, url = {https://doi.org/10.1002/dac.517}, doi = {10.1002/DAC.517}, timestamp = {Thu, 30 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijcomsys/ZhangFN01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iwqos/FuK01, author = {Huirong Fu and Edward W. Knightly}, editor = {Lars C. Wolf and David Hutchison and Ralf Steinmetz}, title = {Aggregation and Scalable QoS: {A} Performance Study}, booktitle = {Quality of Service - IWQoS 2001, 9th International Workshop Karlsruhe, Germany, June 6-8, 2001, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {2092}, pages = {307--324}, publisher = {Springer}, year = {2001}, url = {https://doi.org/10.1007/3-540-45512-4\_25}, doi = {10.1007/3-540-45512-4\_25}, timestamp = {Tue, 11 Oct 2022 16:40:51 +0200}, biburl = {https://dblp.org/rec/conf/iwqos/FuK01.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangF00, author = {Liren Zhang and Huirong Fu}, title = {A novel scheme of transporting pre-stored {MPEG} video to support video-on-demand (VoD) services}, journal = {Comput. Commun.}, volume = {23}, number = {2}, pages = {133--148}, year = {2000}, url = {https://doi.org/10.1016/S0140-3664(99)00161-9}, doi = {10.1016/S0140-3664(99)00161-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhangF00.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/ZhangF00a, author = {Liren Zhang and Huirong Fu}, title = {Dynamic bandwidth allocation and buffer dimensioning for supporting video-on-demand services in virtual private networks}, journal = {Comput. Commun.}, volume = {23}, number = {14-15}, pages = {1410--1424}, year = {2000}, url = {https://doi.org/10.1016/S0140-3664(00)00186-9}, doi = {10.1016/S0140-3664(00)00186-9}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/ZhangF00a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/NgYFZ99, author = {Chee Hock Ng and Lihua Yuan and Huirong Fu and Liren Zhang}, title = {Methodology for traffic modeling using two-state Markov-modulated Bernoulli process}, journal = {Comput. Commun.}, volume = {22}, number = {13}, pages = {1266--1273}, year = {1999}, url = {https://doi.org/10.1016/S0140-3664(99)00114-0}, doi = {10.1016/S0140-3664(99)00114-0}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/NgYFZ99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/FuZNS99, author = {Huirong Fu and Liren Zhang and Chee Hock Ng and K. R. Subramanian}, title = {A novel scheme of transporting pre-stored {MPEG} video in {ATM} networks}, booktitle = {Proceedings of the {IEEE} International Conference on Networks 1999, {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October 1, 1999}, pages = {398--405}, publisher = {{IEEE}}, year = {1999}, url = {https://doi.org/10.1109/ICON.1999.796203}, doi = {10.1109/ICON.1999.796203}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icon/FuZNS99.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.