Research Output 1993 2019

2019

Adaptive MTD Security using Markov Game Modeling

Chowdhary, A., Sengupta, S., Alshamrani, A., Huang, D. & Sabur, A., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 577-581 5 p. 8685647. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intrusion detection
Monitoring
Costs

Attribute Based Encryption for Information Sharing on Tactical Mobile Networks

Luo, J., Dong, Q., Huang, D. & Kang, M., Jan 2 2019, 2018 IEEE Military Communications Conference, MILCOM 2018. Institute of Electrical and Electronics Engineers Inc., p. 960-965 6 p. 8599802. (Proceedings - IEEE Military Communications Conference MILCOM; vol. 2019-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cryptography
Wireless networks
Access control

Combining Dynamic and Static Attack Information for Attack Tracing and Event Correlation

Alshamrani, A., Chowdhary, A., Mjihil, O., Myneni, S. & Huang, D., Feb 20 2019, 2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 8647326. (2018 IEEE Global Communications Conference, GLOBECOM 2018 - Proceedings).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

tracing
Tracing
attack
Attack
Intrusion detection

Foreword

Kantarcioglu, M., Krishnan, R., Thuraisingham, B. & Ahn, G-J., Mar 13 2019, In : CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. p. III

Research output: Contribution to journalEditorial

Improving student learning performance in a virtual hands-on lab system in cybersecurity education

Zeng, Z., Deng, Y., Hsiao, I., Huang, D. & Chung, C. J., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8658855. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

learning performance
Education
Students
learning
education

Personalized Learning in a Virtual Hands-on Lab Platform for Computer Science Education

Deng, Y., Lu, D., Chung, C. J., Huang, D. & Zeng, Z., Mar 4 2019, Frontiers in Education: Fostering Innovation Through Diversity, FIE 2018 - Conference Proceedings. Institute of Electrical and Electronics Engineers Inc., 8659291. (Proceedings - Frontiers in Education Conference, FIE; vol. 2018-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

computer science
Computer science
Education
Students
learning

SDN based Network Function Parallelism in Cloud

Chowdhary, A. & Huang, D., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 486-490 5 p. 8685508. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Software defined networking
Switches
Network function virtualization

SUPC: SDN enabled Universal Policy Checking in Cloud Network

Chowdhary, A., Alshamrani, A. & Huang, D., Apr 8 2019, 2019 International Conference on Computing, Networking and Communications, ICNC 2019. Institute of Electrical and Electronics Engineers Inc., p. 572-576 5 p. 8685550. (2019 International Conference on Computing, Networking and Communications, ICNC 2019).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Chemical analysis
Software defined networking
Availability
Monitoring
Compliance

The danger of missing instructions: A systematic analysis of security requirements for MCPS

Lamp, J., Rubio-Medrano, C. E., Zhao, Z. & Ahn, G-J., Feb 21 2019, Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018. Institute of Electrical and Electronics Engineers Inc., p. 94-99 6 p. (Proceedings - 2018 IEEE/ACM International Conference on Connected Health: Applications, Systems and Engineering Technologies, CHASE 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Computer Security
instruction
Delivery of Health Care
Quality of Health Care
Documentation

Understanding and detecting private interactions in underground forums

Sun, Z., Rubio-Medrano, C. E., Zhao, Z., Bao, T., Doupe, A. & Ahn, G-J., Mar 13 2019, CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy. Association for Computing Machinery, Inc, p. 303-314 12 p. (CODASPY 2019 - Proceedings of the 9th ACM Conference on Data and Application Security and Privacy).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Open Access
Learning systems
Detectors

Using social media to understand cyber attack behavior

Sliva, A., Shu, K. & Liu, H., Jan 1 2019, Advances in Human Factors, Business Management and Society - Proceedings of the AHFE 2018 International Conference on Human Factors, Business Management and Society, 2018. Springer Verlag, p. 636-645 10 p. (Advances in Intelligent Systems and Computing; vol. 783).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Sensors
Experiments
2018
2 Citations (Scopus)

#metoo through the lens of social media

Manikonda, L., Beigi, G., Kambhampati, S. & Liu, H., Jan 1 2018, Social, Cultural, and Behavioral Modeling - 11th International Conference, SBP-BRiMS 2018, Proceedings. Bisgin, H., Thomson, R., Hyder, A. & Dancy, C. (eds.). Springer Verlag, p. 104-110 7 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 10899 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Social Media
Lens
Lenses
Comparative Analysis
Sharing

Achieving fine-grained access control with discretionary user revocation over cloud data

Dong, Q., Huang, D., Luo, J. & Kang, M., Aug 10 2018, 2018 IEEE Conference on Communications and Network Security, CNS 2018. Institute of Electrical and Electronics Engineers Inc., 8433128

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Cryptography
Servers
Control systems
Momentum
3 Citations (Scopus)

A data driven in-air-handwriting biometric authentication system

Lu, D., Xu, K. & Huang, D., Jan 29 2018, IEEE International Joint Conference on Biometrics, IJCB 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 531-537 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

handwriting
biometrics
Biometrics
Authentication
human-computer interface

AIM-SDN: Aacking information mismanagement in SDN-datastores

Dixit, V. H., Doupe, A., Shoshitaishvili, Y., Zhao, Z. & Ahn, G-J., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 664-676 13 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network management
Critical infrastructures
Controllers
Cloud computing
Information management
9 Citations (Scopus)

Attribute-based Access Control for ICN Naming Scheme

Li, B., Huang, D., Wang, Z. & Zhu, Y., Mar 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 194-206 13 p.

Research output: Contribution to journalArticle

Access control
Cryptography
Network architecture

CacheLight: Defeating the cachekit attack

Gutierrez, M., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Oct 15 2018, ASHES 2018 - Proceedings of the 2018 Workshop on Attacks and Solutions in Hardware Security, co-located with CCS 2018. Association for Computing Machinery, p. 65-74 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Data storage equipment
Inspection
Hardware
Malware
Hardware security

Challenges, opportunities and a framework for web environment forensics

Mabey, M., Doupe, A., Zhao, Z. & Ahn, G-J., Jan 1 2018, Advances in Digital Forensics XIV - 14th IFIP WG 11.9 International Conference, 2018. Peterson, G. & Shenoi, S. (eds.). Springer New York LLC, p. 11-33 23 p. (IFIP Advances in Information and Communication Technology; vol. 532).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

World Wide Web
Digital forensics
1 Citation (Scopus)

Challenges and preparedness of SDN-based firewalls

Dixit, V. H., Kyung, S., Zhao, Z., Doupe, A., Shoshitaishvili, Y. & Ahn, G-J., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 33-38 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Cost effectiveness
Scalability
Controllers
Industry
2 Citations (Scopus)

Cloud Information Retrieval: Model Description and Scheme Design

Yang, Z., Tang, J. & Liu, H., Jan 29 2018, In : IEEE Access. 6, p. 15420-15430 11 p.

Research output: Contribution to journalArticle

Information retrieval
Data privacy
Information services
Vector spaces
Cryptography
8 Citations (Scopus)

CrossFire: Cross media joint friend and item recommendations

Shu, K., Wang, S., Tang, J., Wang, Y. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 522-530 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Defining and detecting environment discrimination in android apps

Hong, Y., Hu, Y., Lai, C. M., Felix Wu, S., Neamtiu, I., McDaniel, P., Yu, P., Cam, H. & Ahn, G-J., Jan 1 2018, Security and Privacy in Communication Networks - 13th International Conference, SecureComm 2017, Proceedings. Springer Verlag, p. 510-529 20 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 238).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Application programs
Android (operating system)
Malware
Application programming interfaces (API)
Dynamic analysis

DexMonitor: Dynamically Analyzing and Monitoring Obfuscated Android Applications

Cho, H., Yi, J. H. & Ahn, G-J., Jan 1 2018, (Accepted/In press) In : IEEE Access.

Research output: Contribution to journalArticle

Monitoring
Hooks
Application programming interfaces (API)
Flow control
Virtual machine

Dual-mode broadcast encryption

Zhu, Y., Yu, R., Chen, E. & Huang, D., Nov 1 2018, In : Science China Information Sciences. 61, 11, 118101.

Research output: Contribution to journalComment/debate

Cryptography

Editorial Preface: Special Issue on Mobile & Cloud Computing Services

Zhang, J., Yau, S-S., Pu, C. & Altintas, O., Sep 1 2018, In : IEEE Transactions on Services Computing. 11, 5, p. 833-834 2 p., 8482269.

Research output: Contribution to journalEditorial

Cloud computing

EDSGuard: Enforcing Network Security Requirements for Energy Delivery Systems

Coughlin, V., Rubio-Medrano, C., Zhao, Z. & Ahn, G-J., Dec 24 2018, 2018 IEEE International Conference on Communications, Control, and Computing Technologies for Smart Grids, SmartGridComm 2018. Institute of Electrical and Electronics Engineers Inc., 8587430

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Geographical regions
Network security
Inspection
Network protocols
Monitoring
2 Citations (Scopus)

Efficient Anonymous Message Submission

Zhao, X., Li, L., Xue, G. & Ahn, G-J., Mar 1 2018, In : IEEE Transactions on Dependable and Secure Computing. 15, 2, p. 217-230 14 p.

Research output: Contribution to journalArticle

Cryptography

Exploiting multilabel information for noise-resilient feature selection

Jian, L., Li, J. & Liu, H., Apr 1 2018, In : ACM Transactions on Intelligent Systems and Technology. 9, 5, 52.

Research output: Contribution to journalArticle

Feature Selection
Feature extraction
Labels
Imperfect
Annotation
5 Citations (Scopus)

Exploring Hierarchical Structures for Recommender Systems

Wang, S., Tang, J., Wang, Y. & Liu, H., Jan 3 2018, (Accepted/In press) In : IEEE Transactions on Knowledge and Data Engineering.

Research output: Contribution to journalArticle

Recommender systems
Availability

Fault Tolerant Controller Placement in Distributed SDN Environments

Alshamrani, A., Guha, S., Pisharody, S., Chowdhary, A. & Huang, D., Jul 27 2018, 2018 IEEE International Conference on Communications, ICC 2018 - Proceedings. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-May. 8422593

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Controllers
Fault tolerance
Topology
Scalability
Internet
1 Citation (Scopus)

How can fact encourage collaboration and selfcorrection?

VanLehn, K., Burkhardt, H., Cheema, S., Pead, D., Schoenfeld, A. & Wetzel, J., Jan 1 2018, Deep Comprehension: Multi-Disciplinary Approaches to Understanding, Enhancing, and Measuring Comprehension. Taylor and Francis, p. 114-127 14 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Posters
Students
poster
instruction
Handwriting
2 Citations (Scopus)

Initiator: Noise-contrastive estimation for marked temporal point process

Guo, R., Li, J. & Liu, H., Jan 1 2018, Proceedings of the 27th International Joint Conference on Artificial Intelligence, IJCAI 2018. Lang, J. (ed.). International Joint Conferences on Artificial Intelligence, Vol. 2018-July. p. 2191-2197 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Maximum likelihood estimation
Recurrent neural networks
Mathematical models

In search of coherence and consensus: Measuring the interpretability of statistical topics

Morstatter, F. & Liu, H., Apr 1 2018, In : Journal of Machine Learning Research. 18, p. 1-32 32 p.

Research output: Contribution to journalArticle

Interpretability
Model
Evaluate
Output
Predictive Model
2 Citations (Scopus)

Inside a phisher's mind: Understanding the anti-phishing ecosystem through phishing kit analysis

Oest, A., Safei, Y., Doupe, A., Ahn, G-J., Wardman, B. & Warner, G., Jun 8 2018, Proceedings of the 2018 APWG Symposium on Electronic Crime Research, eCrime 2018. IEEE Computer Society, Vol. 2018-May. p. 1-12 12 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Ecosystems
Websites
Paint
Servers
Phishing
3 Citations (Scopus)

Learning partial-value variable relations for system modeling

Ye, N., Fok, T. Y., Wang, X., Collofello, J. & Dickson, N., Jun 13 2018, Proceedings - 2018 4th International Conference on Control, Automation and Robotics, ICCAR 2018. Institute of Electrical and Electronics Engineers Inc., p. 368-372 5 p. 8384702

Research output: Chapter in Book/Report/Conference proceedingConference contribution

System Modeling
Data mining
Learning systems
Energy utilization
Partial
1 Citation (Scopus)

Learning representations of ultrahigh-dimensional data for random distance-based outlier detection

Pang, G., Chen, L., Cao, L. & Liu, H., Jul 19 2018, KDD 2018 - Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 2041-2050 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors

Leveraging implicit contribution amounts to facilitate microfinancing requests

Ranganath, S., Beigi, G. & Liu, H., Feb 2 2018, WSDM 2018 - Proceedings of the 11th ACM International Conference on Web Search and Data Mining. Association for Computing Machinery, Inc, Vol. 2018-Febuary. p. 477-485 9 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Economics
Data storage equipment
Costs

Maximum Distance Minimum Error (MDME): A non-parametric approach to feature selection for image-based high content screening data

Trevino, R. P., Lamkin, T. J., Smith, R., Kawamoto, S. A. & Liu, H., Mar 23 2018, 2017 Intelligent Systems Conference, IntelliSys 2017. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-January. p. 670-677 8 p. 8324366

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Normal distribution
Minimum Distance
Feature Selection
Screening
Feature extraction
1 Citation (Scopus)

Measuring E-mail header injections on the world wide web

Chandramouli, S. P., Bajan, P. M., Kruegel, C., Vigna, G., Zhao, Z., Doupe, A. & Ahn, G-J., Apr 9 2018, Proceedings of the 33rd Annual ACM Symposium on Applied Computing, SAC 2018. Association for Computing Machinery, Vol. Part F137816. p. 1647-1656 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Electronic mail
World Wide Web
Websites
Ruby
2 Citations (Scopus)

Modeling an energy consumption system with partial-value data associations

Ye, N., Fok, T. Y. & Chong, O., Jan 1 2018, In : Advances in Science, Technology and Engineering Systems. 3, 6, p. 372-379 8 p.

Research output: Contribution to journalArticle

energy consumption
Energy utilization
learning
Decision trees
Energy consumption
1 Citation (Scopus)

Moving target defense for the placement of intrusion detection systems in the cloud

Sengupta, S., Chowdhary, A., Huang, D. & Kambhampati, S., Jan 1 2018, Decision and Game Theory for Security - 9th International Conference, GameSec 2018, Proceedings. Bushnell, L., Poovendran, R. & Basar, T. (eds.). Springer Verlag, p. 326-345 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11199 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Moving Target
Intrusion detection
Intrusion Detection
Placement
Vulnerability

MTD 2018: 5th ACM workshop on moving target defense (MTD)

Albanese, M. & Huang, D., Oct 15 2018, CCS 2018 - Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 2175-2176 2 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Security of data
Computer networks
Computer systems
Industry
Secure communication
2 Citations (Scopus)

MTD analysis and evaluation framework in software defined network (MASON)

Chowdhary, A., Huang, D., Alshamrani, A. & Liang, H., Mar 14 2018, SDN-NFVSec 2018 - Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization, Co-located with CODASPY 2018. Association for Computing Machinery, Inc, Vol. 2018-January. p. 43-48 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Controllers
Virtual machine

MTD chairs' welcome

Albanese, M. & Huang, D., Oct 15 2018, In : Proceedings of the ACM Conference on Computer and Communications Security. p. iii

Research output: Contribution to journalEditorial

1 Citation (Scopus)

Multifactor user authentication with in-air-handwriting and hand geometry

Lu, D., Huang, D., Deng, Y. & Alshamrani, A., Jul 13 2018, Proceedings - 2018 International Conference on Biometrics, ICB 2018. Institute of Electrical and Electronics Engineers Inc., p. 255-262 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

handwriting
Handwriting
Authentication
Gestures
platforms
2 Citations (Scopus)

Multi-layered network embedding

Li, J., Chen, C., Tong, H. & Liu, H., Jan 1 2018, p. 684-692. 9 p.

Research output: Contribution to conferencePaper

Network layers
Critical infrastructures
Recommender systems
Experiments

Multimodal fusion of brain networks with longitudinal couplings

Zhang, W., Shu, K., Wang, S., Liu, H. & Wang, Y., Jan 1 2018, Medical Image Computing and Computer Assisted Intervention – MICCAI 2018 - 21st International Conference, 2018, Proceedings. Frangi, A. F., Davatzikos, C., Fichtinger, G., Alberola-López, C. & Schnabel, J. A. (eds.). Springer Verlag, p. 3-11 9 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11072 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Neuroimaging
Brain
Fusion
Fusion reactions
Factorise
1 Citation (Scopus)

Optimized security as a service platforms via stochastic modeling and dynamic programming

Mjihil, O., Taramit, H., Haqiq, A. & Huang, D., Jan 1 2018, Innovations in Bio-Inspired Computing and Applications - Proceedings of the 8th International Conference on Innovations in Bio-Inspired Computing and Applications IBICA 2017. Springer Verlag, p. 277-287 11 p. (Advances in Intelligent Systems and Computing; vol. 735).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Dynamic programming
Scalability
Heuristic algorithms
Cloud computing
1 Citation (Scopus)

Phe: An efficient traitor tracing and revocation for encrypted file syncing-and-sharing in cloud

Zhu, Y., Gan, G., Guo, R. & Huang, D., Oct 1 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1110-1124 15 p., 7479486.

Research output: Contribution to journalArticle

Cryptography
Mobile devices
Industry
2 Citations (Scopus)

Privacy-preserving mobile crowd sensing in ad hoc networks

Wang, Z. & Huang, D., May 1 2018, In : Ad Hoc Networks. 73, p. 14-26 13 p.

Research output: Contribution to journalArticle

Ad hoc networks
Mobile devices
Network protocols
Sensors
Processing