BibTeX records: Huirong Fu

download as .bib file

@article{DBLP:journals/corr/abs-2311-12074,
  author       = {Xuemei Li and
                  Huirong Fu},
  title        = {SecureBERT and {LLAMA} 2 Empowered Control Area Network Intrusion
                  Detection and Classification},
  journal      = {CoRR},
  volume       = {abs/2311.12074},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2311.12074},
  doi          = {10.48550/ARXIV.2311.12074},
  eprinttype    = {arXiv},
  eprint       = {2311.12074},
  timestamp    = {Wed, 29 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2311-12074.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/winet/ZhuSF21,
  author       = {Rui Zhu and
                  Tao Shu and
                  Huirong Fu},
  title        = {Statistical inference attack against PHY-layer key extraction and
                  countermeasures},
  journal      = {Wirel. Networks},
  volume       = {27},
  number       = {7},
  pages        = {4853--4873},
  year         = {2021},
  url          = {https://doi.org/10.1007/s11276-021-02769-x},
  doi          = {10.1007/S11276-021-02769-X},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/winet/ZhuSF21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2005-05571,
  author       = {Abdulrahman Alzahrani and
                  Ali Alshehri and
                  Hani Alshahrani and
                  Huirong Fu},
  title        = {Ransomware in Windows and Android Platforms},
  journal      = {CoRR},
  volume       = {abs/2005.05571},
  year         = {2020},
  url          = {https://arxiv.org/abs/2005.05571},
  eprinttype    = {arXiv},
  eprint       = {2005.05571},
  timestamp    = {Thu, 14 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2005-05571.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/LiuFHLL19,
  author       = {Anyi Liu and
                  Huirong Fu and
                  Yuan Hong and
                  Jigang Liu and
                  Yingjiu Li},
  title        = {\emph{LiveForen}: Ensuring Live Forensic Integrity in the Cloud},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {14},
  number       = {10},
  pages        = {2749--2764},
  year         = {2019},
  url          = {https://doi.org/10.1109/TIFS.2019.2898841},
  doi          = {10.1109/TIFS.2019.2898841},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/LiuFHLL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/GumudavallyZFG19,
  author       = {Saikrishna Gumudavally and
                  Ye Zhu and
                  Huirong Fu and
                  Yong Guan},
  title        = {HECTor: Homomorphic Encryption Enabled Onion Routing},
  booktitle    = {2019 {IEEE} International Conference on Communications, {ICC} 2019,
                  Shanghai, China, May 20-24, 2019},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/ICC.2019.8762038},
  doi          = {10.1109/ICC.2019.8762038},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/GumudavallyZFG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icisdm/AlshehriMAAF19,
  author       = {Ali Alshehri and
                  Pawel Marcinek and
                  Abdulrahman Alzahrani and
                  Hani Alshahrani and
                  Huirong Fu},
  title        = {PUREDroid: Permission Usage and Risk Estimation for Android Applications},
  booktitle    = {Proceedings of the 3rd International Conference on Information System
                  and Data Mining, {ICISDM} 2019, Houston, TX, USA, April 6-8, 2019},
  pages        = {179--184},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3325917.3325941},
  doi          = {10.1145/3325917.3325941},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icisdm/AlshehriMAAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tpsisa/AlzahraniAAF19,
  author       = {Abdulrahman Alzahrani and
                  Hani Alshahrani and
                  Ali Alshehri and
                  Huirong Fu},
  title        = {An Intelligent Behavior-Based Ransomware Detection System For Android
                  Platform},
  booktitle    = {First {IEEE} International Conference on Trust, Privacy and Security
                  in Intelligent Systems and Applications, {TPS-ISA} 2019, Los Angeles,
                  CA, USA, December 12-14, 2019},
  pages        = {28--35},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/TPS-ISA48467.2019.00013},
  doi          = {10.1109/TPS-ISA48467.2019.00013},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tpsisa/AlzahraniAAF19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhuGCOAFT18,
  author       = {Ye Zhu and
                  Jonathan Gurary and
                  George P. Corser and
                  Jared Oluoch and
                  Nahed Alnahash and
                  Huirong Fu and
                  Junhua Tang},
  title        = {{CMAPS:} {A} Chess-Based Multi-Facet Password Scheme for Mobile Devices},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {54795--54810},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2872772},
  doi          = {10.1109/ACCESS.2018.2872772},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhuGCOAFT18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/AlshehriAAAFLZ18,
  author       = {Ali Alshehri and
                  Hani Alshahrani and
                  Abdulrahman Alzahrani and
                  Raed Alharthi and
                  Huirong Fu and
                  Anyi Liu and
                  Ye Zhu},
  title        = {{DOPA:} Detecting Open Ports in Android {OS}},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433207},
  doi          = {10.1109/CNS.2018.8433207},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/AlshehriAAAFLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/BanihaniAAFC18,
  author       = {Abdelnasser Banihani and
                  Abdulrahman Alzahrani and
                  Raed Alharthi and
                  Huirong Fu and
                  George P. Corser},
  title        = {{T-PAAD:} Trajectory Privacy Attack on Autonomous Driving},
  booktitle    = {2018 {IEEE} Conference on Communications and Network Security, {CNS}
                  2018, Beijing, China, May 30 - June 1, 2018},
  pages        = {1--2},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/CNS.2018.8433168},
  doi          = {10.1109/CNS.2018.8433168},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cns/BanihaniAAFC18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/AlharthiBAAAFLZ18,
  author       = {Raed Alharthi and
                  Abdelnasser Banihani and
                  Abdulrahman Alzahrani and
                  Ali Alshehri and
                  Hani Alshahrani and
                  Huirong Fu and
                  Anyi Liu and
                  Ye Zhu},
  title        = {Location Privacy Challenges in Spatial Crowdsourcing},
  booktitle    = {2018 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2018, Rochester, MI, USA, May 3-5, 2018},
  pages        = {564--569},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EIT.2018.8500311},
  doi          = {10.1109/EIT.2018.8500311},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/AlharthiBAAAFLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/LiuF18,
  author       = {Anyi Liu and
                  Huirong Fu},
  title        = {Fast Tamper Detection for Hierarchical Data in Live Cloud Forensics},
  booktitle    = {2018 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2018, Rochester, MI, USA, May 3-5, 2018},
  pages        = {589--594},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EIT.2018.8500169},
  doi          = {10.1109/EIT.2018.8500169},
  timestamp    = {Fri, 31 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/eit/LiuF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/ZhuFS18,
  author       = {Rui Zhu and
                  Huirong Fu and
                  Tao Shu},
  title        = {Information-Theoretic Security and Energy Efficiency for Information
                  and Power Transfer in Two-Hop Wireless Relay Networks},
  booktitle    = {2018 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2018, Rochester, MI, USA, May 3-5, 2018},
  pages        = {877--881},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EIT.2018.8500123},
  doi          = {10.1109/EIT.2018.8500123},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/ZhuFS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/AlzahraniAAAFLZ18,
  author       = {Abdulrahman Alzahrani and
                  Ali Alshehri and
                  Hani Alshahrani and
                  Raed Alharthi and
                  Huirong Fu and
                  Anyi Liu and
                  Ye Zhu},
  title        = {RanDroid: Structural Similarity Approach for Detecting Ransomware
                  Applications in Android Platform},
  booktitle    = {2018 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2018, Rochester, MI, USA, May 3-5, 2018},
  pages        = {892--897},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/EIT.2018.8500161},
  doi          = {10.1109/EIT.2018.8500161},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/AlzahraniAAAFLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccel/AlshahraniMTAAF18,
  author       = {Hani Alshahrani and
                  Harrison Mansourt and
                  Seaver Thorn and
                  Ali Alshehri and
                  Abdulrahman Alzahrani and
                  Huirong Fu},
  title        = {DDefender: Android application threat detection using static and dynamic
                  analysis},
  booktitle    = {{IEEE} International Conference on Consumer Electronics, {ICCE} 2018,
                  Las Vegas, NV, USA, January 12-14, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICCE.2018.8326293},
  doi          = {10.1109/ICCE.2018.8326293},
  timestamp    = {Sun, 06 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iccel/AlshahraniMTAAF18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1810-00200,
  author       = {Rui Zhu and
                  Tao Shu and
                  Huirong Fu},
  title        = {Statistical Inference Attack Against PHY-layer Key Extraction and
                  Countermeasures},
  journal      = {CoRR},
  volume       = {abs/1810.00200},
  year         = {2018},
  url          = {http://arxiv.org/abs/1810.00200},
  eprinttype    = {arXiv},
  eprint       = {1810.00200},
  timestamp    = {Tue, 30 Oct 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1810-00200.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csiirw/MansourDWBFZ17,
  author       = {Ahmad Mansour and
                  Andrew Davis and
                  Matthew Wagner and
                  Richard Bassous and
                  Huirong Fu and
                  Ye Zhu},
  editor       = {Joseph P. Trien and
                  Stacy J. Prowell and
                  John R. Goodall and
                  Justin M. Beaver and
                  Robert A. Bridges},
  title        = {Multi-asymmetric cryptographic {RSA} scheme},
  booktitle    = {Proceedings of the 12th Annual Conference on Cyber and Information
                  Security Research, {CISRC} 2017, Oak Ridge, TN, USA, April 4 - 6,
                  2017},
  pages        = {9:1--9:8},
  publisher    = {{ACM}},
  year         = {2017},
  url          = {https://doi.org/10.1145/3064814.3064820},
  doi          = {10.1145/3064814.3064820},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/csiirw/MansourDWBFZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/milcom/ZhuSF17,
  author       = {Rui Zhu and
                  Tao Shu and
                  Huirong Fu},
  title        = {Empirical statistical inference attack against PHY-layer key extraction
                  in real environments},
  booktitle    = {2017 {IEEE} Military Communications Conference, {MILCOM} 2017, Baltimore,
                  MD, USA, October 23-25, 2017},
  pages        = {46--51},
  publisher    = {{IEEE}},
  year         = {2017},
  url          = {https://doi.org/10.1109/MILCOM.2017.8170755},
  doi          = {10.1109/MILCOM.2017.8170755},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/milcom/ZhuSF17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/CorserFB16,
  author       = {George P. Corser and
                  Huirong Fu and
                  Abdelnasser Banihani},
  title        = {Evaluating Location Privacy in Vehicular Communications and Applications},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {17},
  number       = {9},
  pages        = {2658--2667},
  year         = {2016},
  url          = {https://doi.org/10.1109/TITS.2015.2506579},
  doi          = {10.1109/TITS.2015.2506579},
  timestamp    = {Tue, 24 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/CorserFB16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hci/GuraryZAF16,
  author       = {Jonathan Gurary and
                  Ye Zhu and
                  Nahed Alnahash and
                  Huirong Fu},
  editor       = {Theo Tryfonas},
  title        = {Implicit Authentication for Mobile Devices Using Typing Behavior},
  booktitle    = {Human Aspects of Information Security, Privacy, and Trust - 4th International
                  Conference, {HAS} 2016, Held as Part of {HCI} International 2016,
                  Toronto, ON, Canada, July 17-22, 2016, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9750},
  pages        = {25--36},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-39381-0\_3},
  doi          = {10.1007/978-3-319-39381-0\_3},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/hci/GuraryZAF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccnc/CorserAF16,
  author       = {George P. Corser and
                  Alejandro Arenas and
                  Huirong Fu},
  title        = {Effect on vehicle safety of nonexistent or silenced basic safety messages},
  booktitle    = {2016 International Conference on Computing, Networking and Communications,
                  {ICNC} 2016, Kauai, HI, USA, February 15-18, 2016},
  pages        = {1--5},
  publisher    = {{IEEE} Computer Society},
  year         = {2016},
  url          = {https://doi.org/10.1109/ICCNC.2016.7440550},
  doi          = {10.1109/ICCNC.2016.7440550},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccnc/CorserAF16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/YinMLWF15,
  author       = {Jiechen Yin and
                  Yuming Mao and
                  Supeng Leng and
                  Xiang Wang and
                  Huirong Fu},
  title        = {QoE Provisioning by Random Access in Next-Generation Wireless Networks},
  booktitle    = {2015 {IEEE} Global Communications Conference, {GLOBECOM} 2015, San
                  Diego, CA, USA, December 6-10, 2015},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/GLOCOM.2014.7417656},
  doi          = {10.1109/GLOCOM.2014.7417656},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/YinMLWF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/BassousBFZ15,
  author       = {Richard Bassous and
                  Roger Bassous and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Ambiguous Multi-Symmetric Cryptography},
  booktitle    = {2015 {IEEE} International Conference on Communications, {ICC} 2015,
                  London, United Kingdom, June 8-12, 2015},
  pages        = {7394--7399},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/ICC.2015.7249508},
  doi          = {10.1109/ICC.2015.7249508},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/BassousBFZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/tabletop/GuraryZCOAF15,
  author       = {Jonathan Gurary and
                  Ye Zhu and
                  George P. Corser and
                  Jared Oluoch and
                  Nahed Alnahash and
                  Huirong Fu},
  editor       = {Nuno Jardim Nunes and
                  Enrico Costanza and
                  Patrick Olivier and
                  Johannes Sch{\"{o}}ning},
  title        = {{MAPS:} {A} Multi-Dimensional Password Scheme for Mobile Authentication},
  booktitle    = {Proceedings of the 2015 International Conference on Interactive Tabletops
                  {\&} Surfaces, {ITS} 2015, Funchal, Portugal, November 15-18,
                  2015},
  pages        = {409--412},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2817721.2823479},
  doi          = {10.1145/2817721.2823479},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/tabletop/GuraryZCOAF15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ShaoLZF14,
  author       = {Caixing Shao and
                  Supeng Leng and
                  Yan Zhang and
                  Huirong Fu},
  title        = {A multi-priority supported medium access control in Vehicular Ad Hoc
                  Networks},
  journal      = {Comput. Commun.},
  volume       = {39},
  pages        = {11--21},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.comcom.2013.11.002},
  doi          = {10.1016/J.COMCOM.2013.11.002},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ShaoLZF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhuVF14,
  author       = {Ye Zhu and
                  Anil Vikram and
                  Huirong Fu},
  title        = {On Topology of Sensor Networks Deployed for Multitarget Tracking},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {15},
  number       = {4},
  pages        = {1489--1498},
  year         = {2014},
  url          = {https://doi.org/10.1109/TITS.2014.2301033},
  doi          = {10.1109/TITS.2014.2301033},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/ZhuVF14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/twc/ZhuVFG14,
  author       = {Ye Zhu and
                  Anil Vikram and
                  Huirong Fu and
                  Yong Guan},
  title        = {On Non-Cooperative Multiple-Target Tracking With Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Wirel. Commun.},
  volume       = {13},
  number       = {11},
  pages        = {6496--6510},
  year         = {2014},
  url          = {https://doi.org/10.1109/TWC.2014.2329306},
  doi          = {10.1109/TWC.2014.2329306},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/twc/ZhuVFG14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ijcnn/PennaYFZ14,
  author       = {Kiran Penna and
                  Venkatesh Yalavarthi and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Evaluation of active position detection in Vehicular Ad Hoc Networks},
  booktitle    = {2014 International Joint Conference on Neural Networks, {IJCNN} 2014,
                  Beijing, China, July 6-11, 2014},
  pages        = {2234--2239},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IJCNN.2014.6889978},
  doi          = {10.1109/IJCNN.2014.6889978},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ijcnn/PennaYFZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ivs/CorserFSDMLZ14,
  author       = {George P. Corser and
                  Huirong Fu and
                  Tao Shu and
                  Patrick D'Errico and
                  Warren Ma and
                  Supeng Leng and
                  Ye Zhu},
  title        = {Privacy-by-Decoy: Protecting location privacy against collusion and
                  deanonymization in vehicular location based services},
  booktitle    = {2014 {IEEE} Intelligent Vehicles Symposium Proceedings, Dearborn,
                  MI, USA, June 8-11, 2014},
  pages        = {1030--1036},
  publisher    = {{IEEE}},
  year         = {2014},
  url          = {https://doi.org/10.1109/IVS.2014.6856595},
  doi          = {10.1109/IVS.2014.6856595},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ivs/CorserFSDMLZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitn/CaushajFSBWZL13,
  author       = {Eralda Caushaj and
                  Huirong Fu and
                  Ishwar K. Sethi and
                  Haissam Badih and
                  Dion Watson and
                  Ye Zhu and
                  Supeng Leng},
  title        = {Theoretical Analysis and Experimental Study: Monitoring Data Privacy
                  in Smartphone Communications},
  journal      = {Int. J. Interdiscip. Telecommun. Netw.},
  volume       = {5},
  number       = {2},
  pages        = {66--82},
  year         = {2013},
  url          = {https://doi.org/10.4018/jitn.2013040106},
  doi          = {10.4018/JITN.2013040106},
  timestamp    = {Mon, 30 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitn/CaushajFSBWZL13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijitn/CorserAOFC13,
  author       = {George P. Corser and
                  Suzan Arslanturk and
                  Jared Oluoch and
                  Huirong Fu and
                  George E. Corser},
  title        = {Knowing the Enemy at the Gates: Measuring Attacker Motivation},
  journal      = {Int. J. Interdiscip. Telecommun. Netw.},
  volume       = {5},
  number       = {2},
  pages        = {83--95},
  year         = {2013},
  url          = {https://doi.org/10.4018/jitn.2013040107},
  doi          = {10.4018/JITN.2013040107},
  timestamp    = {Wed, 01 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijitn/CorserAOFC13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccve/CorserFSDM13,
  author       = {George P. Corser and
                  Huirong Fu and
                  Tao Shu and
                  Patrick D'Errico and
                  Warren Ma},
  title        = {Endpoint protection zone {(EPZ):} Protecting {LBS} user location privacy
                  against deanonymization and collusion in vehicular networks},
  booktitle    = {International Conference on Connected Vehicles and Expo, {ICCVE} 2012,
                  Las Vegas, NV, USA, December 2-6, 2013},
  pages        = {369--374},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICCVE.2013.6799822},
  doi          = {10.1109/ICCVE.2013.6799822},
  timestamp    = {Mon, 09 Aug 2021 14:54:01 +0200},
  biburl       = {https://dblp.org/rec/conf/iccve/CorserFSDM13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/WangLFZ12,
  author       = {Qing Wang and
                  Supeng Leng and
                  Huirong Fu and
                  Yan Zhang},
  title        = {An {IEEE} 802.11p-Based Multichannel {MAC} Scheme With Channel Coordination
                  for Vehicular Ad Hoc Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {13},
  number       = {2},
  pages        = {449--458},
  year         = {2012},
  url          = {https://doi.org/10.1109/TITS.2011.2171951},
  doi          = {10.1109/TITS.2011.2171951},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/WangLFZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/OluochFYZT12,
  author       = {Jared Oluoch and
                  Huirong Fu and
                  Astrid Younang and
                  Ye Zhu and
                  Bao Tri{-}Tran},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {A simulation study of impacts of collaborative worm hole attacks in
                  mobile ad hoc networks (MANETs)},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {40--45},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390324},
  doi          = {10.1145/2390317.2390324},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/OluochFYZT12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/infoseccd/CaushajFBSZL12,
  author       = {Eralda Caushaj and
                  Huirong Fu and
                  Haissam Badih and
                  Ishwar K. Sethi and
                  Ye Zhu and
                  Supeng Leng},
  editor       = {Michael E. Whitman and
                  Humayun Zafar},
  title        = {Attacks and countermeasures in wireless cellular networks},
  booktitle    = {Proceedings of the 2012 Information Security Curriculum Development
                  Conference, InfoSecCD 2012, Kennesaw, GA, USA, October 12-13, 2012},
  pages        = {46--52},
  publisher    = {{ACM}},
  year         = {2012},
  url          = {https://doi.org/10.1145/2390317.2390325},
  doi          = {10.1145/2390317.2390325},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/infoseccd/CaushajFBSZL12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/ZhuVF12,
  author       = {Ye Zhu and
                  Anil Vikram and
                  Huirong Fu},
  title        = {On tracking multiple indistinguishable targets},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012},
  pages        = {1--9},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6502496},
  doi          = {10.1109/MASS.2012.6502496},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/ZhuVF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wcnc/ShaoLZF12,
  author       = {Caixing Shao and
                  Supeng Leng and
                  Yan Zhang and
                  Huirong Fu},
  title        = {A multi-priority supported p-persistent {MAC} protocol for Vehicular
                  Ad Hoc Networks},
  booktitle    = {2012 {IEEE} Wireless Communications and Networking Conference, {WCNC}
                  2012, Paris, France, April 1-4, 2012},
  pages        = {2532--2537},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/WCNC.2012.6214225},
  doi          = {10.1109/WCNC.2012.6214225},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/wcnc/ShaoLZF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhuF11,
  author       = {Ye Zhu and
                  Huirong Fu},
  title        = {Traffic analysis attacks on Skype VoIP calls},
  journal      = {Comput. Commun.},
  volume       = {34},
  number       = {10},
  pages        = {1202--1212},
  year         = {2011},
  url          = {https://doi.org/10.1016/j.comcom.2010.12.007},
  doi          = {10.1016/J.COMCOM.2010.12.007},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhuF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdwm/ZhuFF11,
  author       = {Ye Zhu and
                  Yongjian Fu and
                  Huirong Fu},
  title        = {Preserving Privacy in Time Series Data Mining},
  journal      = {Int. J. Data Warehous. Min.},
  volume       = {7},
  number       = {4},
  pages        = {64--85},
  year         = {2011},
  url          = {https://doi.org/10.4018/jdwm.2011100104},
  doi          = {10.4018/JDWM.2011100104},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdwm/ZhuFF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WeerasingheTF11,
  author       = {Hesiri Weerasinghe and
                  Raymond Tackett and
                  Huirong Fu},
  title        = {Verifying position and velocity for vehicular ad-hoc networks},
  journal      = {Secur. Commun. Networks},
  volume       = {4},
  number       = {7},
  pages        = {785--791},
  year         = {2011},
  url          = {https://doi.org/10.1002/sec.231},
  doi          = {10.1002/SEC.231},
  timestamp    = {Thu, 10 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WeerasingheTF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/wicomm/LengFWZ11,
  author       = {Supeng Leng and
                  Huirong Fu and
                  Qing Wang and
                  Yan Zhang},
  title        = {Medium access control in vehicular \emph{ad hoc} networks},
  journal      = {Wirel. Commun. Mob. Comput.},
  volume       = {11},
  number       = {7},
  pages        = {796--812},
  year         = {2011},
  url          = {https://doi.org/10.1002/wcm.869},
  doi          = {10.1002/WCM.869},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/wicomm/LengFWZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isi/WeerasingheFLZ11,
  author       = {Hesiri Weerasinghe and
                  Huirong Fu and
                  Supeng Leng and
                  Ye Zhu},
  title        = {Enhancing unlinkability in Vehicular Ad Hoc Networks},
  booktitle    = {2011 {IEEE} International Conference on Intelligence and Security
                  Informatics, {ISI} 2011, Beijing, China, 10-12 July, 2011},
  pages        = {161--166},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ISI.2011.5983992},
  doi          = {10.1109/ISI.2011.5983992},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/isi/WeerasingheFLZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/vtc/WangLZF11,
  author       = {Qing Wang and
                  Supeng Leng and
                  Yan Zhang and
                  Huirong Fu},
  title        = {A QoS Supported Multi-Channel {MAC} for Vehicular Ad Hoc Networks},
  booktitle    = {Proceedings of the 73rd {IEEE} Vehicular Technology Conference, {VTC}
                  Spring 2011, 15-18 May 2011, Budapest, Hungary},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/VETECS.2011.5956230},
  doi          = {10.1109/VETECS.2011.5956230},
  timestamp    = {Tue, 16 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/vtc/WangLZF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wasa/ZhuVF11,
  author       = {Ye Zhu and
                  Anil Vikram and
                  Huirong Fu},
  editor       = {Yu Cheng and
                  Do Young Eun and
                  Zhiguang Qin and
                  Min Song and
                  Kai Xing},
  title        = {On Topology of Sensor Networks Deployed for Tracking},
  booktitle    = {Wireless Algorithms, Systems, and Applications - 6th International
                  Conference, {WASA} 2011, Chengdu, China, August 11-13, 2011. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6843},
  pages        = {60--71},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23490-3\_6},
  doi          = {10.1007/978-3-642-23490-3\_6},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wasa/ZhuVF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ida/ZhuFF10,
  author       = {Ye Zhu and
                  Yongjian Fu and
                  Huirong Fu},
  title        = {A new class of attacks on time series data mining{\textbackslash}m\{1\}},
  journal      = {Intell. Data Anal.},
  volume       = {14},
  number       = {3},
  pages        = {405--418},
  year         = {2010},
  url          = {https://doi.org/10.3233/IDA-2010-0428},
  doi          = {10.3233/IDA-2010-0428},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ida/ZhuFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdmmm/ZhuFF10,
  author       = {Ye Zhu and
                  Yongjian Fu and
                  Huirong Fu},
  title        = {On privacy-preserving time series data classification},
  journal      = {Int. J. Data Min. Model. Manag.},
  volume       = {2},
  number       = {2},
  pages        = {117--136},
  year         = {2010},
  url          = {https://doi.org/10.1504/IJDMMM.2010.032145},
  doi          = {10.1504/IJDMMM.2010.032145},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijdmmm/ZhuFF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsw/HeHFQ10,
  author       = {Yong{-}Zhong He and
                  Zhen Han and
                  Huirong Fu and
                  Guangzhi Qu},
  title        = {The Formal Model of {DBMS} Enforcing Multiple Security Polices},
  journal      = {J. Softw.},
  volume       = {5},
  number       = {5},
  pages        = {514--521},
  year         = {2010},
  url          = {https://doi.org/10.4304/jsw.5.5.514-521},
  doi          = {10.4304/JSW.5.5.514-521},
  timestamp    = {Tue, 16 Aug 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsw/HeHFQ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WeerasingheFL10,
  author       = {Hesiri Weerasinghe and
                  Huirong Fu and
                  Supeng Leng},
  title        = {Anonymous service access for Vehicular Ad hoc Networks},
  booktitle    = {Sixth International Conference on Information Assurance and Security,
                  {IAS} 2010, Atlanta, GA, USA, August 23-25, 2010},
  pages        = {173--178},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/ISIAS.2010.5604052},
  doi          = {10.1109/ISIAS.2010.5604052},
  timestamp    = {Wed, 16 Oct 2019 14:14:55 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WeerasingheFL10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/springsim/JinWF10,
  author       = {Kyohong Jin and
                  Hesiri Weerasinghe and
                  Huirong Fu},
  editor       = {Robert M. McGraw and
                  Eric S. Imsand and
                  Michael J. Chinni},
  title        = {Enhancement of {IEEE} 802.11 modules in ns-2 and performance evaluation
                  with error rate},
  booktitle    = {Proceedings of the 2010 Spring Simulation Multiconference, SpringSim
                  2010, Orlando, Florida, USA, April 11-15, 2010},
  pages        = {149},
  publisher    = {{SCS/ACM}},
  year         = {2010},
  url          = {https://doi.org/10.1145/1878537.1878693},
  doi          = {10.1145/1878537.1878693},
  timestamp    = {Tue, 09 Mar 2021 09:46:48 +0100},
  biburl       = {https://dblp.org/rec/conf/springsim/JinWF10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/WamplerFZ09,
  author       = {David Wampler and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Security Threats and Countermeasures for Intra-vehicle Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {153--157},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.350},
  doi          = {10.1109/IAS.2009.350},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/WamplerFZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEias/RajanYNFZ09,
  author       = {Deepa Susan Rajan and
                  Chetan Yeole and
                  Harsha Nakade and
                  Huirong Fu and
                  Ye Zhu},
  title        = {Position Verification in Multi-hop Vehicular Networks},
  booktitle    = {Proceedings of the Fifth International Conference on Information Assurance
                  and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009},
  pages        = {580--584},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/IAS.2009.345},
  doi          = {10.1109/IAS.2009.345},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEias/RajanYNFZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/HeHF09,
  author       = {Yong{-}Zhong He and
                  Zhen Han and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Kevin Daimi},
  title        = {Usage Control in Conditional Access System with malicious Set-top
                  Box},
  booktitle    = {Proceedings of the 2009 International Conference on Security {\&}
                  Management, {SAM} 2009, July 13-16, 2009, Las Vegas Nevada, USA, 2
                  Volumes},
  pages        = {201--205},
  publisher    = {{CSREA} Press},
  year         = {2009},
  timestamp    = {Wed, 04 Nov 2009 14:56:55 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/HeHF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/dasc/LiuLFL09,
  author       = {Ke Liu and
                  Supeng Leng and
                  Huirong Fu and
                  Longjiang Li},
  title        = {A Novel Dual Busy Tone Aided {MAC} Protocol for Multi-hop Wireless
                  Networks},
  booktitle    = {Eighth {IEEE} International Conference on Dependable, Autonomic and
                  Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009},
  pages        = {373--378},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/DASC.2009.20},
  doi          = {10.1109/DASC.2009.20},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/dasc/LiuLFL09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgit/DokEF09,
  author       = {Hang Dok and
                  Ruben Echevarria and
                  Huirong Fu},
  editor       = {Dominik Slezak and
                  Tai{-}Hoon Kim and
                  Alan Chin{-}Chen Chang and
                  Thanos Vasilakos and
                  Mingchu Li and
                  Kouichi Sakurai},
  title        = {Privacy Issues for Vehicular Ad-Hoc Network},
  booktitle    = {Communication and Networking - International Conference, {FGCN/ACN}
                  2009, Held as Part of the Future Generation Information Technology
                  Conference, {FGIT} 2009, Jeju Island, Korea, December 10-12, 2009.
                  Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {56},
  pages        = {370--383},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-10844-0\_44},
  doi          = {10.1007/978-3-642-10844-0\_44},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/fgit/DokEF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/ZhuLVF09,
  author       = {Ye Zhu and
                  Yuanchao Lu and
                  Anil Vikram and
                  Huirong Fu},
  title        = {On Privacy of Skype VoIP Calls},
  booktitle    = {Proceedings of the Global Communications Conference, 2009. {GLOBECOM}
                  2009, Honolulu, Hawaii, USA, 30 November - 4 December 2009},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2009},
  url          = {https://doi.org/10.1109/GLOCOM.2009.5425852},
  doi          = {10.1109/GLOCOM.2009.5425852},
  timestamp    = {Tue, 24 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/ZhuLVF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mldm/ZhuFF09,
  author       = {Ye Zhu and
                  Yongjian Fu and
                  Huirong Fu},
  editor       = {Petra Perner},
  title        = {Preserving Privacy in Time Series Data Classification by Discretization},
  booktitle    = {Machine Learning and Data Mining in Pattern Recognition, 6th International
                  Conference, {MLDM} 2009, Leipzig, Germany, July 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5632},
  pages        = {53--67},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-03070-3\_5},
  doi          = {10.1007/978-3-642-03070-3\_5},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/mldm/ZhuFF09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FuKZZ08,
  author       = {Huirong Fu and
                  Satoshi Kawamura and
                  Ming Zhang and
                  Liren Zhang},
  title        = {Replication attack on random key pre-distribution schemes for wireless
                  sensor networks},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {4},
  pages        = {842--857},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.026},
  doi          = {10.1016/J.COMCOM.2007.10.026},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FuKZZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WangGF08,
  author       = {Xidong Wang and
                  Charlie Gladden and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Secure Inter-Vehicle Vital Signal Communication via Short Dynamic
                  Group Management},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {415--421},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 12:46:27 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WangGF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/QureshiCWF08,
  author       = {Rahat Qureshi and
                  Min Chang and
                  Hesiri Weerasinghe and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Selim Aissi},
  title        = {Intrusion Detection System for Wireless Sensor Networks},
  booktitle    = {Proceedings of the 2008 International Conference on Security {\&}
                  Management, {SAM} 2008, Las Vegas, Nevada, USA, July 14-17, 2008},
  pages        = {582--585},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/QureshiCWF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/LangleyLF08,
  author       = {Christopher Langley and
                  Raul Lucas and
                  Huirong Fu},
  title        = {Key management in vehicular ad-hoc networks},
  booktitle    = {2008 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20,
                  2008},
  pages        = {223--226},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/EIT.2008.4554301},
  doi          = {10.1109/EIT.2008.4554301},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/LangleyLF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/eit/MurrayCF08,
  author       = {Todd Murray and
                  Michael Cojocari and
                  Huirong Fu},
  title        = {Measuring the performance of {IEEE} 802.11p using ns-2 simulator for
                  vehicular networks},
  booktitle    = {2008 {IEEE} International Conference on Electro/Information Technology,
                  {EIT} 2008, held at Iowa State University, Ames, Iowa, USA, May 18-20,
                  2008},
  pages        = {498--503},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/EIT.2008.4554354},
  doi          = {10.1109/EIT.2008.4554354},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/eit/MurrayCF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/gridnets/KrupadanamF08,
  author       = {Sireesha Krupadanam and
                  Huirong Fu},
  editor       = {Pascale Vicat{-}Blanc Primet and
                  Tomohiro Kudoh and
                  Joe Mambretti},
  title        = {Localization Anomaly Detection in Wireless Sensor Networks for Non-flat
                  Terrains},
  booktitle    = {Networks for Grid Applications, Second International Conference, GridNets
                  2008, Beijing, China, October 8-10, 2008, Revised Selected Papers},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {2},
  pages        = {175--186},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-642-02080-3\_18},
  doi          = {10.1007/978-3-642-02080-3\_18},
  timestamp    = {Wed, 17 May 2017 14:24:57 +0200},
  biburl       = {https://dblp.org/rec/conf/gridnets/KrupadanamF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/ChilukotiJWF08,
  author       = {Vikram Chilukoti and
                  Doriel Josic and
                  Hesiri Weerasinghe and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy},
  title        = {Modeling Attacks on Wireless Sensor Networks},
  booktitle    = {Proceedings of the 2008 International Conference on Wireless Networks,
                  July 14-17, 2008, Las Vegas, Nevada, {USA}},
  pages        = {23--29},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 10:37:49 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/ChilukotiJWF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/JoshiPEWF08,
  author       = {Manjiri Joshi and
                  Ramya Pulimati and
                  Srikanth Edula and
                  Hesiri Weerasinghe and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Victor A. Clincy},
  title        = {Robustness of Grid-based Deployment in Wireless Sensors Network},
  booktitle    = {Proceedings of the 2008 International Conference on Wireless Networks,
                  July 14-17, 2008, Las Vegas, Nevada, {USA}},
  pages        = {135--141},
  publisher    = {{CSREA} Press},
  year         = {2008},
  timestamp    = {Mon, 09 Feb 2009 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/JoshiPEWF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/ZhuFF08,
  author       = {Ye Zhu and
                  Yongjian Fu and
                  Huirong Fu},
  editor       = {Takashi Washio and
                  Einoshin Suzuki and
                  Kai Ming Ting and
                  Akihiro Inokuchi},
  title        = {On Privacy in Time Series Data Mining},
  booktitle    = {Advances in Knowledge Discovery and Data Mining, 12th Pacific-Asia
                  Conference, {PAKDD} 2008, Osaka, Japan, May 20-23, 2008 Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5012},
  pages        = {479--493},
  publisher    = {Springer},
  year         = {2008},
  url          = {https://doi.org/10.1007/978-3-540-68125-0\_42},
  doi          = {10.1007/978-3-540-68125-0\_42},
  timestamp    = {Wed, 01 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/ZhuFF08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/LengZFY07,
  author       = {Supeng Leng and
                  Liren Zhang and
                  Huirong Fu and
                  Jianjun Yang},
  title        = {Mobility analysis of mobile hosts with random walking in ad hoc networks},
  journal      = {Comput. Networks},
  volume       = {51},
  number       = {10},
  pages        = {2514--2528},
  year         = {2007},
  url          = {https://doi.org/10.1016/j.comnet.2006.11.011},
  doi          = {10.1016/J.COMNET.2006.11.011},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/LengZFY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tvt/LengZFY07,
  author       = {Supeng Leng and
                  Liren Zhang and
                  Huirong Fu and
                  Jianjun Yang},
  title        = {A Novel Location-Service Protocol Based on k-Hop Clustering for Mobile
                  \emph{Ad Hoc} Networks},
  journal      = {{IEEE} Trans. Veh. Technol.},
  volume       = {56},
  number       = {2},
  pages        = {810--817},
  year         = {2007},
  url          = {https://doi.org/10.1109/TVT.2007.891425},
  doi          = {10.1109/TVT.2007.891425},
  timestamp    = {Thu, 25 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tvt/LengZFY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/DokicKDF07,
  author       = {Slobodan Dokic and
                  Andrea Kulesh and
                  Megha Dombal and
                  Huirong Fu},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {An Overview of Multi-modal Biometrics for Authentication},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {39--44},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 16:45:17 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/DokicKDF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/YangSYWF07,
  author       = {Shoua Yang and
                  Shanti Sukumaran and
                  Dipali Yermalkar and
                  Hesiri Weerasinghe and
                  Huirong Fu},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Security and Privacy: Open Issues with {RFID}},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {192--197},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Wed, 12 Dec 2007 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/YangSYWF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/WeerasingheF07,
  author       = {Hesiri Weerasinghe and
                  Huirong Fu},
  title        = {Preventing Cooperative Black Hole Attacks in Mobile Ad Hoc Networks:
                  Simulation Implementation and Evaluation},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {362--367},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.184},
  doi          = {10.1109/FGCN.2007.184},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/WeerasingheF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fgcn/VelagapalliF07,
  author       = {Sireesha Velagapalli and
                  Huirong Fu},
  title        = {Beacon-less Location Detection in Wireless Sensor Networks for Non-flat
                  Terrain},
  booktitle    = {Future Generation Communication and Networking, {FGCN} 2007, Ramada
                  Plaza Jeju, Jeju-Island, Korea, December 6-8, 2007, Proceedings},
  pages        = {528--534},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/FGCN.2007.78},
  doi          = {10.1109/FGCN.2007.78},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fgcn/VelagapalliF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcsw/WatsonPGF07,
  author       = {Jason D. Watson and
                  Mark Pellerito and
                  Charlie Gladden and
                  Huirong Fu},
  title        = {Simulation and Analysis of Extended Brake Lights for Inter-Vehicle
                  Communication Networks},
  booktitle    = {27th International Conference on Distributed Computing Systems Workshops
                  {(ICDCS} 2007 Workshops), June 25-29, 2007, Toronto, Ontario, Canada},
  pages        = {87},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/ICDCSW.2007.112},
  doi          = {10.1109/ICDCSW.2007.112},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcsw/WatsonPGF07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FuZ06,
  author       = {Huirong Fu and
                  Ming Zhang},
  title        = {Online adaptive firewall allocation in internet data center},
  journal      = {Comput. Commun.},
  volume       = {29},
  number       = {10},
  pages        = {1858--1867},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.comcom.2005.05.011},
  doi          = {10.1016/J.COMCOM.2005.05.011},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FuZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/Fu06,
  author       = {Huirong Fu},
  title        = {On parameter estimation of a simple real-time flow aggregation model},
  journal      = {Int. J. Commun. Syst.},
  volume       = {19},
  number       = {7},
  pages        = {795--808},
  year         = {2006},
  url          = {https://doi.org/10.1002/dac.770},
  doi          = {10.1002/DAC.770},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/Fu06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijnsec/MangipudiKF06,
  author       = {Kumar V. Mangipudi and
                  Rajendra S. Katti and
                  Huirong Fu},
  title        = {Authentication and Key Agreement Protocols Preserving Anonymity},
  journal      = {Int. J. Netw. Secur.},
  volume       = {3},
  number       = {3},
  pages        = {259--270},
  year         = {2006},
  url          = {http://ijns.jalaxy.com.tw/contents/ijns-v3-n3/ijns-2006-v3-n3-p259-270.pdf},
  timestamp    = {Mon, 04 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijnsec/MangipudiKF06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iros/FuKL06,
  author       = {Huirong Fu and
                  Satoshi Kawamura and
                  Chengzhi Li},
  title        = {Blom-based Q-composite: {A} Generalized Framework of Random Key Pre-distribution
                  Schemes for Wireless Sensor Networks},
  booktitle    = {2006 {IEEE/RSJ} International Conference on Intelligent Robots and
                  Systems, {IROS} 2006, October 9-15, 2006, Beijing, China},
  pages        = {2022--2028},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/IROS.2006.282413},
  doi          = {10.1109/IROS.2006.282413},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iros/FuKL06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/FuGMSZ05,
  author       = {Huirong Fu and
                  Vivek Goel and
                  Elangovan Murugaiyan and
                  Sudhan Shanmugasundaram and
                  Liren Zhang},
  editor       = {Laurence Tianruo Yang and
                  Hamid R. Arabnia and
                  Li{-}Chun Wang},
  title        = {Unified Solution to Registration, Authentication and Billing for Wireless
                  Hotspots: Architecture and Protocols},
  booktitle    = {Proceedings of the 2005 International Conference on Wireless Networks,
                  {ICWN} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
  pages        = {590--594},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Tue, 29 Oct 2019 17:54:20 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/FuGMSZ05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/RamaswamyFN05,
  author       = {Sanjay Ramaswamy and
                  Huirong Fu and
                  Kendall E. Nygard},
  editor       = {Laurence Tianruo Yang and
                  Hamid R. Arabnia and
                  Li{-}Chun Wang},
  title        = {Simulation Study of Multiple Black Holes Attack on Mobile Ad Hoc Networks},
  booktitle    = {Proceedings of the 2005 International Conference on Wireless Networks,
                  {ICWN} 2005, Las Vegas, Nevada, USA, June 27-30, 2005},
  pages        = {595--604},
  publisher    = {{CSREA} Press},
  year         = {2005},
  timestamp    = {Tue, 24 Jan 2006 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/RamaswamyFN05.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/MangipudiMKF04,
  author       = {Kumar V. Mangipudi and
                  Nagaraja Malneedi and
                  Rajendra S. Katti and
                  Huirong Fu},
  title        = {Attacks and solutions on Aydos-Savas-Koc's wireless authentication
                  protocol},
  booktitle    = {Proceedings of the Global Telecommunications Conference, 2004. {GLOBECOM}
                  '04, Dallas, Texas, USA, 29 November - 3 December 2004},
  pages        = {2229--2234},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/GLOCOM.2004.1378405},
  doi          = {10.1109/GLOCOM.2004.1378405},
  timestamp    = {Wed, 16 Oct 2019 14:14:51 +0200},
  biburl       = {https://dblp.org/rec/conf/globecom/MangipudiMKF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/AhmedHF04,
  author       = {Benzir Md Ahmed and
                  Tanjina Helaly and
                  Huirong Fu},
  editor       = {Hamid R. Arabnia and
                  Laurence Tianruo Yang and
                  Chi{-}Hsiang Yeh},
  title        = {Secure Routing in Wireless Mobile Ad Hoc Networks without the Support
                  of Key Management Infrastructure},
  booktitle    = {Proceedings of the International Conference on Wireless Networks,
                  {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1},
  pages        = {210--218},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Mon, 22 Nov 2004 14:01:57 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/AhmedHF04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/KawamuraFCW04,
  author       = {Satoshi Kawamura and
                  Huirong Fu and
                  Meegeum Choi and
                  Shanhong Wu},
  editor       = {Hamid R. Arabnia and
                  Laurence Tianruo Yang and
                  Chi{-}Hsiang Yeh},
  title        = {End-to-End Mobility Management: {A} Two-Phase Deployment Scheme for
                  Personal Use},
  booktitle    = {Proceedings of the International Conference on Wireless Networks,
                  {ICWN} '04, June 21-24, 2004, Las Vegas, Nevada, USA, Volume 1},
  pages        = {286--301},
  publisher    = {{CSREA} Press},
  year         = {2004},
  timestamp    = {Mon, 22 Nov 2004 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icwn/KawamuraFCW04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/FuZ03,
  author       = {Huirong Fu and
                  Liren Zhang},
  title        = {Low cost pre-stored video transmission across networks},
  journal      = {Comput. Commun.},
  volume       = {26},
  number       = {18},
  pages        = {2061--2069},
  year         = {2003},
  url          = {https://doi.org/10.1016/S0140-3664(03)00190-7},
  doi          = {10.1016/S0140-3664(03)00190-7},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/FuZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/FuZ03,
  author       = {Huirong Fu and
                  Liren Zhang},
  title        = {Variable segmentation based on intrinsic video rate characteristics
                  to transport pre-stored video across networks},
  journal      = {Int. J. Commun. Syst.},
  volume       = {16},
  number       = {10},
  pages        = {923--934},
  year         = {2003},
  url          = {https://doi.org/10.1002/dac.629},
  doi          = {10.1002/DAC.629},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/FuZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ton/FuK03,
  author       = {Huirong Fu and
                  Edward W. Knightly},
  title        = {A simple model of real-time flow aggregation},
  journal      = {{IEEE/ACM} Trans. Netw.},
  volume       = {11},
  number       = {3},
  pages        = {422--435},
  year         = {2003},
  url          = {https://doi.org/10.1109/TNET.2003.813045},
  doi          = {10.1109/TNET.2003.813045},
  timestamp    = {Sat, 27 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ton/FuK03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/SunF03,
  author       = {Guangyuan Sun and
                  Huirong Fu},
  editor       = {Kendall E. Nygard},
  title        = {Recent Advances on Intrusion Detection Techniques},
  booktitle    = {Proceedings of the 16th International Conference on Computer Applications
                  in Industry and Engineering, November 11-13, 2003, Imperial Palace
                  Hotel, Las Vegas, Nevada, {USA}},
  pages        = {83--86},
  publisher    = {{ISCA}},
  year         = {2003},
  timestamp    = {Fri, 08 Sep 2006 15:11:34 +0200},
  biburl       = {https://dblp.org/rec/conf/caine/SunF03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/caine/FuZ03,
  author       = {Huirong Fu and
                  Liren Zhang},
  editor       = {Kendall E. Nygard},
  title        = {Video Segmentation for Transporting Pre-Stored Video across Networks},
  booktitle    = {Proceedings of the 16th International Conference on Computer Applications
                  in Industry and Engineering, November 11-13, 2003, Imperial Palace
                  Hotel, Las Vegas, Nevada, {USA}},
  pages        = {221--224},
  publisher    = {{ISCA}},
  year         = {2003},
  timestamp    = {Fri, 08 Sep 2006 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/caine/FuZ03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icwn/RamaswamyFSDN03,
  author       = {Sanjay Ramaswamy and
                  Huirong Fu and
                  Manohar Sreekantaradhya and
                  John Dixon and
                  Kendall E. Nygard},
  editor       = {Weihua Zhuang and
                  Chi{-}Hsiang Yeh and
                  Olaf Droegehorn and
                  C.{-}T. Toh and
                  Hamid R. Arabnia},
  title        = {Prevention of Cooperative Black Hole Attack in Wireless Ad Hoc Networks},
  booktitle    = {Proceedings of the International Conference on Wireless Networks,
                  {ICWN} '03, June 23 - 26, 2003, Las Vegas, Nevada, {USA}},
  pages        = {570--575},
  publisher    = {{CSREA} Press},
  year         = {2003},
  timestamp    = {Wed, 15 Oct 2003 12:47:30 +0200},
  biburl       = {https://dblp.org/rec/conf/icwn/RamaswamyFSDN03.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangF01,
  author       = {Liren Zhang and
                  Huirong Fu},
  title        = {Optional dynamic bandwidth allocation based on playback tunnel to
                  support video-on-demand service in virtual private networks},
  journal      = {Comput. Commun.},
  volume       = {24},
  number       = {11},
  pages        = {1019--1030},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0140-3664(00)00340-6},
  doi          = {10.1016/S0140-3664(00)00340-6},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangF01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangF01a,
  author       = {Liren Zhang and
                  Huirong Fu},
  title        = {Adaptive bandwidth allocation based on playback tunnel to support
                  video on demand service over {ATM} networks},
  journal      = {Comput. Commun.},
  volume       = {24},
  number       = {15-16},
  pages        = {1485--1496},
  year         = {2001},
  url          = {https://doi.org/10.1016/S0140-3664(01)00301-2},
  doi          = {10.1016/S0140-3664(01)00301-2},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangF01a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijcomsys/ZhangFN01,
  author       = {Liren Zhang and
                  Huirong Fu and
                  Chee Hock Ng},
  title        = {Dynamic bandwidth allocation and buffer dimensioning under equal segment
                  scheme to support video-on-demand services},
  journal      = {Int. J. Commun. Syst.},
  volume       = {14},
  number       = {10},
  pages        = {941--960},
  year         = {2001},
  url          = {https://doi.org/10.1002/dac.517},
  doi          = {10.1002/DAC.517},
  timestamp    = {Thu, 30 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ijcomsys/ZhangFN01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iwqos/FuK01,
  author       = {Huirong Fu and
                  Edward W. Knightly},
  editor       = {Lars C. Wolf and
                  David Hutchison and
                  Ralf Steinmetz},
  title        = {Aggregation and Scalable QoS: {A} Performance Study},
  booktitle    = {Quality of Service - IWQoS 2001, 9th International Workshop Karlsruhe,
                  Germany, June 6-8, 2001, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {2092},
  pages        = {307--324},
  publisher    = {Springer},
  year         = {2001},
  url          = {https://doi.org/10.1007/3-540-45512-4\_25},
  doi          = {10.1007/3-540-45512-4\_25},
  timestamp    = {Tue, 11 Oct 2022 16:40:51 +0200},
  biburl       = {https://dblp.org/rec/conf/iwqos/FuK01.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangF00,
  author       = {Liren Zhang and
                  Huirong Fu},
  title        = {A novel scheme of transporting pre-stored {MPEG} video to support
                  video-on-demand (VoD) services},
  journal      = {Comput. Commun.},
  volume       = {23},
  number       = {2},
  pages        = {133--148},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0140-3664(99)00161-9},
  doi          = {10.1016/S0140-3664(99)00161-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangF00.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/ZhangF00a,
  author       = {Liren Zhang and
                  Huirong Fu},
  title        = {Dynamic bandwidth allocation and buffer dimensioning for supporting
                  video-on-demand services in virtual private networks},
  journal      = {Comput. Commun.},
  volume       = {23},
  number       = {14-15},
  pages        = {1410--1424},
  year         = {2000},
  url          = {https://doi.org/10.1016/S0140-3664(00)00186-9},
  doi          = {10.1016/S0140-3664(00)00186-9},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/ZhangF00a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/NgYFZ99,
  author       = {Chee Hock Ng and
                  Lihua Yuan and
                  Huirong Fu and
                  Liren Zhang},
  title        = {Methodology for traffic modeling using two-state Markov-modulated
                  Bernoulli process},
  journal      = {Comput. Commun.},
  volume       = {22},
  number       = {13},
  pages        = {1266--1273},
  year         = {1999},
  url          = {https://doi.org/10.1016/S0140-3664(99)00114-0},
  doi          = {10.1016/S0140-3664(99)00114-0},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/NgYFZ99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/FuZNS99,
  author       = {Huirong Fu and
                  Liren Zhang and
                  Chee Hock Ng and
                  K. R. Subramanian},
  title        = {A novel scheme of transporting pre-stored {MPEG} video in {ATM} networks},
  booktitle    = {Proceedings of the {IEEE} International Conference on Networks 1999,
                  {ICON} 1999, Brisbane, Queensland, Australia, September 28 - October
                  1, 1999},
  pages        = {398--405},
  publisher    = {{IEEE}},
  year         = {1999},
  url          = {https://doi.org/10.1109/ICON.1999.796203},
  doi          = {10.1109/ICON.1999.796203},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icon/FuZNS99.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics