ติดตาม
Chin-Tser Huang
Chin-Tser Huang
Professor of Computer Science and Engineering, University of South Carolina
ยืนยันอีเมลแล้วที่ cse.sc.edu - หน้าแรก
ชื่อ
อ้างโดย
อ้างโดย
ปี
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
SM Jang, T Geng, JYQ Li, R Xia, CT Huang, H Kim, J Tang
Computers in Human Behavior 84, 103-113, 2018
1872018
Security issues in privacy and key management protocols of IEEE 802.16
S Xu, M Matthews, CT Huang
Proceedings of the 44th annual ACM Southeast Conference, 113-118, 2006
1512006
A secure address resolution protocol
MG Gouda, CT Huang
Computer Networks 41 (1), 57-71, 2003
1192003
Chinese remainder theorem based group key management
X Zheng, CT Huang, M Matthews
Proceedings of the 45th annual ACM Southeast Conference, 266-271, 2007
1152007
Attacks on PKM protocols of IEEE 802.16 and its later versions
S Xu, CT Huang
2006 3rd International Symposium on Wireless Communication Systems, 185-189, 2006
1042006
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
992014
Smart urban surveillance using fog computing
N Chen, Y Chen, S Song, CT Huang, X Ye
2016 IEEE/ACM symposium on edge computing (SEC), 95-96, 2016
922016
Wavelet-based real time detection of network traffic anomalies
CT Huang, S Thareja, YJ Shin
2006 securecomm and workshops, 1-7, 2006
892006
Multi-dimensional credentialing using veiled certificates
JH Gerdes Jr, J Kalvenes, CT Huang
US Patent 8,468,355, 2013
692013
A secure cookie protocol
AX Liu, JM Kovacs, CT Huang, MG Gouda
Proceedings. 14th International Conference on Computer Communications and …, 2005
692005
Hop integrity in computer networks
MG Gouda, EN Elnozahy, CT Huang, TM McGuire
IEEE/ACM Transactions on Networking 10 (3), 308-319, 2002
632002
Responding to security issues in WiMAX networks
CT Huang, JM Chang
IT Professional 10 (5), 15-21, 2008
622008
A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
J Huang, M Sharaf, CT Huang
2012 41st international conference on parallel processing workshops, 279-287, 2012
542012
Smart city surveillance in fog computing
N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang
Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017
522017
Look-ahead routing and message scheduling in delay-tolerant networks
Y Xian, CT Huang, J Cobb
Computer Communications 34 (18), 2184-2194, 2011
472011
Impact of dust and sand on 5G communications for connected vehicles applications
E Abuhdima, J Liu, C Zhao, A Elqaouaq, G Comert, CT Huang, P Pisu, ...
IEEE Journal of Radio Frequency Identification 6, 229-239, 2022
402022
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic
MN Sakib, CT Huang
2016 ieee international conference on communications (icc), 1-6, 2016
402016
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR
S Xu, CT Huang, MM Matthews
2008 IEEE International Symposium on Wireless Communication Systems, 653-657, 2008
332008
Efficient and secure multicast in wirelessman: A cross-layer design
CT Huang, M Matthews, M Ginley, X Zheng, C Chen, JM Chang
Journal of Communications Software and Systems 3 (3), 199-206, 2007
332007
Key trees and the security of interval multicast
MG Gouda, CT Huang, EN Elnozahy
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
322002
ระบบไม่สามารถดำเนินการได้ในขณะนี้ โปรดลองใหม่อีกครั้งในภายหลัง
บทความ 1–20