<?xml version="1.0"?>
<dblpperson name="Chin-Tser Huang" pid="89/331" n="110">
<person key="homepages/89/331" mdate="2009-06-09">
<author pid="89/331">Chin-Tser Huang</author>
</person>
<r><inproceedings key="conf/icccn/LiuH25" mdate="2025-09-16">
<author pid="35/295">Jian Liu</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Weather-Aware Power Control for Decentralized V2V Communication.</title>
<pages>1-9</pages>
<year>2025</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN65249.2025.11133934</ee>
<crossref>conf/icccn/2025</crossref>
<url>db/conf/icccn/icccn2025.html#LiuH25</url>
<stream>streams/conf/icccn</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/sigir/AlkassabHL25" mdate="2025-08-09">
<author orcid="0009-0003-6584-4431" pid="207/3895">Nawras Alkassab</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0009-0002-8836-3983" pid="154/6704">Tania Lorido-Botran</author>
<title>Techie: Tackling Video Prefetching at Edge Networks as POMDP Via an Intrinsically Motivated RL Agent.</title>
<pages>948-957</pages>
<year>2025</year>
<booktitle>SIGIR</booktitle>
<ee>https://doi.org/10.1145/3726302.3730089</ee>
<crossref>conf/sigir/2025</crossref>
<url>db/conf/sigir/sigir2025.html#AlkassabHL25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisee/AbuhdimaMBBLNCH25" mdate="2026-03-29">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="398/1687">Abdulmajid Mrebit</author>
<author pid="398/1868">Ricsheia Barr</author>
<author pid="398/2227">Avery Basden</author>
<author pid="35/295-31">Jian Liu 0031</author>
<author pid="251/8676">Amirhossein Nazeri</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="73/3537">Pierluigi Pisu</author>
<author pid="430/9453">Rajab Ataai</author>
<title>Characterizing Millimeter Wave Attenuation and Phase Shifts Using a Novel Propagation Model in Harsh Environments.</title>
<pages>1-6</pages>
<year>2025</year>
<booktitle>WiSEE</booktitle>
<ee>https://doi.org/10.1109/WiSEE57913.2025.11229860</ee>
<crossref>conf/wisee/2024</crossref>
<url>db/conf/wisee/wisee2025.html#AbuhdimaMBBLNCH25</url>
</inproceedings>
</r>
<r><article key="journals/jnca/AliLLH24" mdate="2024-07-19">
<author orcid="0000-0001-9660-7533" pid="34/8817">Asad Ali</author>
<author orcid="0000-0002-5226-4396" pid="l/YingDarLin">Ying-Dar Lin</author>
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<title>The universal federator: A third-party authentication solution to federated cloud, edge, and fog.</title>
<pages>103922</pages>
<year>2024</year>
<volume>229</volume>
<journal>J. Netw. Comput. Appl.</journal>
<ee>https://doi.org/10.1016/j.jnca.2024.103922</ee>
<url>db/journals/jnca/jnca229.html#AliLLH24</url>
</article>
</r>
<r><article key="journals/mdpinetwork/SharpNHG24" mdate="2024-10-22">
<author orcid="0009-0007-2784-3306" pid="50/7822">Matthew Sharp</author>
<author pid="194/3916">Laurent Njilla</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<title>Blockchain-Based E-Voting Mechanisms: A Survey and a Proposal.</title>
<pages>426-442</pages>
<year>2024</year>
<volume>4</volume>
<journal>Network</journal>
<number>4</number>
<ee type="oa">https://doi.org/10.3390/network4040021</ee>
<url>db/journals/mdpinetwork/mdpinetwork4.html#SharpNHG24</url>
<stream>streams/journals/mdpinetwork</stream>
</article>
</r>
<r><inproceedings key="conf/dbsec/GengH24" mdate="2024-07-30">
<author pid="218/0502">Tieming Geng</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>SmartSSD-Accelerated Cryptographic Shuffling for Enhancing Database Security.</title>
<pages>55-70</pages>
<year>2024</year>
<booktitle>DBSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-65172-4_4</ee>
<crossref>conf/dbsec/2024</crossref>
<url>db/conf/dbsec/dbsec2024.html#GengH24</url>
<stream>streams/conf/dbsec</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/AlkassabHL24" mdate="2025-08-05">
<author orcid="0009-0003-6584-4431" pid="207/3895">Nawras Alkassab</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="154/6704">Tania Lorido-Botran</author>
<title>DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks.</title>
<pages>1-6</pages>
<year>2024</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN61486.2024.10637652</ee>
<crossref>conf/icccn/2024</crossref>
<url>db/conf/icccn/icccn2024.html#AlkassabHL24</url>
<stream>streams/conf/icccn</stream>
</inproceedings>
</r>
<r><inproceedings key="conf/iccnc/0031H24" mdate="2024-07-01">
<author pid="35/295-31">Jian Liu 0031</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Adaptive Channel Switching for Connected Vehicles under Extreme Weather Conditions: A Reinforcement Learning Based Approach.</title>
<pages>451-455</pages>
<year>2024</year>
<booktitle>ICNC</booktitle>
<ee>https://doi.org/10.1109/ICNC59896.2024.10556125</ee>
<crossref>conf/iccnc/2024</crossref>
<url>db/conf/iccnc/icnc2024.html#0031H24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/rfidta/AbuhdimaMRLT0NC24" mdate="2025-05-05">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="398/1687">Abdulmajid Mrebit</author>
<author pid="404/0455">Naomi Rolle</author>
<author pid="404/0313">Jason Laing</author>
<author pid="333/2248">Nabeyou Tadessa</author>
<author pid="35/295-31">Jian Liu 0031</author>
<author pid="251/8676">Amirhossein Nazeri</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="73/3537">Pierluigi Pisu</author>
<title>Switching Millimeter Wave Channels Using Fuzzy Controller System.</title>
<pages>133-136</pages>
<year>2024</year>
<booktitle>RFID-TA</booktitle>
<ee>https://doi.org/10.1109/RFID-TA64374.2024.10965171</ee>
<crossref>conf/rfidta/2024</crossref>
<url>db/conf/rfidta/rfidta2024.html#AbuhdimaMRLT0NC24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisee/AbuhdimaMBB0NCH24" mdate="2025-02-26">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="398/1687">Abdulmajid Mrebit</author>
<author pid="398/1868">Ricsheia Barr</author>
<author pid="398/2227">Avery Basden</author>
<author pid="35/295-31">Jian Liu 0031</author>
<author pid="251/8676">Amirhossein Nazeri</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="73/3537">Pierluigi Pisu</author>
<title>Development of Predictive Mathematical Model for Millimeter Wave Degradation in Sandstorm Regions.</title>
<pages>47-52</pages>
<year>2024</year>
<booktitle>WiSEE</booktitle>
<ee>https://doi.org/10.1109/WiSEE61249.2024.10850306</ee>
<crossref>conf/wisee/2024</crossref>
<url>db/conf/wisee/wisee2024.html#AbuhdimaMBB0NCH24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/comsnets/VenkateswaranHR23" mdate="2023-02-24">
<author pid="22/4242">Venkat Venkateswaran</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="31/5408">Kaliappa Ravindran</author>
<title>Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement.</title>
<pages>505-512</pages>
<year>2023</year>
<booktitle>COMSNETS</booktitle>
<ee>https://doi.org/10.1109/COMSNETS56262.2023.10041417</ee>
<crossref>conf/comsnets/2023</crossref>
<url>db/conf/comsnets/comsnets2023.html#VenkateswaranHR23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccnc/LiuH23" mdate="2024-08-04">
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Evaluation of Different Time Series Forecasting Models for 5G V2V Networks.</title>
<pages>278-282</pages>
<year>2023</year>
<booktitle>ICNC</booktitle>
<ee>https://doi.org/10.1109/ICNC57223.2023.10074369</ee>
<crossref>conf/iccnc/2023</crossref>
<url>db/conf/iccnc/icnc2023.html#LiuH23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/provsec/WangWHWMM23" mdate="2023-10-18">
<author pid="07/4342">Yibing Wang</author>
<author pid="01/447">Xiaoxiao Wang</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="84/1754">Dejun Wang</author>
<author pid="347/5479">Binhao Ma</author>
<author pid="57/4576">Bo Meng</author>
<title>SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC.</title>
<pages>115-130</pages>
<year>2023</year>
<booktitle>ProvSec</booktitle>
<ee>https://doi.org/10.1007/978-3-031-45513-1_7</ee>
<crossref>conf/provsec/2023</crossref>
<url>db/conf/provsec/provsec2023.html#WangWHWMM23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ubisec/GengHF23" mdate="2024-04-17">
<author pid="218/0502">Tieming Geng</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<title>SCORD: Shuffling Column-Oriented Relational Database to Enhance Security.</title>
<pages>163-176</pages>
<year>2023</year>
<booktitle>UbiSec</booktitle>
<ee>https://doi.org/10.1007/978-981-97-1274-8_11</ee>
<crossref>conf/ubisec/2023</crossref>
<url>db/conf/ubisec/ubisec2023.html#GengHF23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ubisec/HuangNSG23" mdate="2024-05-17">
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0001-8902-7418" pid="194/3916">Laurent Njilla</author>
<author orcid="0009-0007-2784-3306" pid="50/7822">Matthew Sharp</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<title>SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems.</title>
<pages>436-449</pages>
<year>2023</year>
<booktitle>UbiSec</booktitle>
<ee>https://doi.org/10.1007/978-981-97-1274-8_28</ee>
<crossref>conf/ubisec/2023</crossref>
<url>db/conf/ubisec/ubisec2023.html#HuangNSG23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2310-07881" mdate="2023-10-24">
<author pid="207/3895">Nawras Alkassab</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="154/6704">Tania Lorido-Botran</author>
<title>DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks.</title>
<year>2023</year>
<volume>abs/2310.07881</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2310.07881</ee>
<url>db/journals/corr/corr2310.html#abs-2310-07881</url>
</article>
</r>
<r><article key="journals/mdpinetwork/GengNH22" mdate="2024-08-02">
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="194/3916">Laurent Njilla</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<title>Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment.</title>
<pages>66-80</pages>
<year>2022</year>
<volume>2</volume>
<journal>Network</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.3390/network2010005</ee>
<url>db/journals/mdpinetwork/mdpinetwork2.html#GengNH22</url>
</article>
</r>
<r><inproceedings key="conf/sensys/GengNH22" mdate="2025-01-19">
<author pid="218/0502">Tieming Geng</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks.</title>
<pages>1222-1228</pages>
<year>2022</year>
<booktitle>SenSys</booktitle>
<ee>https://doi.org/10.1145/3560905.3568181</ee>
<ee>https://www.wikidata.org/entity/Q130839531</ee>
<crossref>conf/sensys/2022</crossref>
<url>db/conf/sensys/sensys2022.html#GengNH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/HuangNG22" mdate="2023-03-27">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="218/0502">Tieming Geng</author>
<title>Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers.</title>
<pages>835-842</pages>
<year>2022</year>
<booktitle>TrustCom</booktitle>
<ee>https://doi.org/10.1109/TrustCom56396.2022.00116</ee>
<crossref>conf/trustcom/2022</crossref>
<url>db/conf/trustcom/trustcom2022.html#HuangNG22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisee/AbuhdimaCTCNPNH22" mdate="2025-12-07">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="52/7059">Gurcan Comert</author>
<author orcid="0009-0006-3592-7414" pid="333/2248">Nabeyou Tadessa</author>
<author pid="333/1939">Fred Chambers</author>
<author pid="333/2554">Kibonke Niyomugabo</author>
<author pid="73/3537">Pierluigi Pisu</author>
<author orcid="0000-0002-7396-2572" pid="251/8676">Amirhossein Nazeri</author>
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<author pid="299/9009">Chunheng Zhao</author>
<title>The Effect of Dust and Sand on the Propagating EM Millimeter Plane Wave.</title>
<pages>1-5</pages>
<year>2022</year>
<booktitle>WiSEE</booktitle>
<ee>https://doi.org/10.1109/WiSEE49342.2022.9926914</ee>
<crossref>conf/wisee/2022</crossref>
<url>db/conf/wisee/wisee2022.html#AbuhdimaCTCNPNH22</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisee/LiuNZACHP22" mdate="2024-10-06">
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<author orcid="0000-0002-7396-2572" pid="251/8676">Amirhossein Nazeri</author>
<author pid="299/9009">Chunheng Zhao</author>
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="73/3537">Pierluigi Pisu</author>
<title>Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather.</title>
<pages>12-17</pages>
<year>2022</year>
<booktitle>WiSEE</booktitle>
<ee>https://doi.org/10.1109/WiSEE49342.2022.9926867</ee>
<crossref>conf/wisee/2022</crossref>
<url>db/conf/wisee/wisee2022.html#LiuNZACHP22</url>
</inproceedings>
</r>
<r><article key="journals/tdsc/ZengLQDLHF21" mdate="2021-12-15">
<author pid="81/583-1">Qiang Zeng 0001</author>
<author orcid="0000-0003-2476-7831" pid="153/5297">Lannan Luo</author>
<author orcid="0000-0003-1506-2522" pid="31/8302">Zhiyun Qian</author>
<author orcid="0000-0003-4235-9671" pid="22/5535">Xiaojiang Du</author>
<author orcid="0000-0002-9603-9713" pid="76/2866-1">Zhoujun Li 0001</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<title>Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs.</title>
<pages>2582-2600</pages>
<year>2021</year>
<volume>18</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TDSC.2019.2957787</ee>
<url>db/journals/tdsc/tdsc18.html#ZengLQDLHF21</url>
</article>
</r>
<r><inproceedings key="conf/desec/GengNH21" mdate="2021-10-14">
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification.</title>
<pages>1-8</pages>
<year>2021</year>
<booktitle>DSC</booktitle>
<ee>https://doi.org/10.1109/DSC49826.2021.9346270</ee>
<crossref>conf/desec/2021</crossref>
<url>db/conf/desec/desec2021.html#GengNH21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/LiuH21" mdate="2024-08-04">
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain.</title>
<pages>1-6</pages>
<year>2021</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN52240.2021.9522314</ee>
<crossref>conf/icccn/2021</crossref>
<url>db/conf/icccn/icccn2021.html#LiuH21</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wisee/AbuhdimaCPHEZAA21" mdate="2024-08-04">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="52/7059">Gurcan Comert</author>
<author orcid="0000-0003-4266-1336" pid="73/3537">Pierluigi Pisu</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="256/5138">Ahmed Elqaouaq</author>
<author pid="299/9009">Chunheng Zhao</author>
<author pid="299/9334">Shakendra Alston</author>
<author pid="299/9164">Kirk Ambrose</author>
<author orcid="0000-0001-8368-6228" pid="35/295-31">Jian Liu 0031</author>
<title>The effect of Dust and Sand on the 5G Millimeter-Wave links.</title>
<pages>60-65</pages>
<year>2021</year>
<booktitle>WiSEE</booktitle>
<ee>https://doi.org/10.1109/WiSEE50203.2021.9613843</ee>
<crossref>conf/wisee/2021</crossref>
<url>db/conf/wisee/wisee2021.html#AbuhdimaCPHEZAA21</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2108-09226" mdate="2021-12-07">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="73/3537">Pierluigi Pisu</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="256/5138">Ahmed El Qaouaq</author>
<author pid="299/9009">Chunheng Zhao</author>
<author pid="299/9334">Shakendra Alston</author>
<author pid="299/9164">Kirk Ambrose</author>
<author pid="35/295-31">Jian Liu 0031</author>
<title>The Effect of Dust and Sand on the 5G Terrestrial Links.</title>
<year>2021</year>
<volume>abs/2108.09226</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2108.09226</ee>
<url>db/journals/corr/corr2108.html#abs-2108-09226</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2111-09418" mdate="2021-12-07">
<author pid="256/4910">Esmail M. M. Abuhdima</author>
<author pid="256/5138">Ahmed El Qaouaq</author>
<author pid="299/9334">Shakendra Alston</author>
<author pid="299/9164">Kirk Ambrose</author>
<author pid="52/7059">Gurcan Comert</author>
<author pid="35/295-31">Jian Liu 0031</author>
<author pid="299/9009">Chunheng Zhao</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="73/3537">Pierluigi Pisu</author>
<title>Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework.</title>
<year>2021</year>
<volume>abs/2111.09418</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2111.09418</ee>
<url>db/journals/corr/corr2111.html#abs-2111-09418</url>
</article>
</r>
<r><article key="journals/access/HeLCHWM20" mdate="2026-02-17">
<author orcid="0000-0002-2007-2576" pid="h/XudongHe">Xudong He</author>
<author orcid="0000-0002-8888-0211" pid="06/2123-20">Qin Liu 0020</author>
<author pid="07/6433">Shuang Chen</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0003-1370-8190" pid="84/1754">Dejun Wang</author>
<author orcid="0000-0002-4377-0051" pid="57/4576-4">Bo Meng 0004</author>
<title>Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus.</title>
<pages>26623-26636</pages>
<year>2020</year>
<volume>8</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2020.2971615</ee>
<url>db/journals/access/access8.html#HeLCHWM20</url>
</article>
</r>
<r><article key="journals/cn/SakibHL20" mdate="2025-01-19">
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<title>Maximizing accuracy in multi-scanner malware detection systems.</title>
<pages>107027</pages>
<year>2020</year>
<volume>169</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2019.107027</ee>
<ee>https://www.wikidata.org/entity/Q126640178</ee>
<url>db/journals/cn/cn169.html#SakibHL20</url>
</article>
</r>
<r><article key="journals/tdsc/HuangSKKN20" mdate="2020-12-31">
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0002-6005-3206" pid="129/1059">Muhammad N. Sakib</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<author pid="86/3876">Kevin A. Kwiat</author>
<author pid="194/3916">Laurent Njilla</author>
<title>A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising.</title>
<pages>1257-1268</pages>
<year>2020</year>
<volume>17</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>6</number>
<ee>https://doi.org/10.1109/TDSC.2018.2866821</ee>
<url>db/journals/tdsc/tdsc17.html#HuangSKKN20</url>
</article>
</r>
<r><inproceedings key="conf/isc2/HuangNG20" mdate="2021-10-14">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="194/3916">Laurent Njilla</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<title>Detecting Counterfeit ICs with Blockchain-based Verification Framework.</title>
<pages>1-8</pages>
<year>2020</year>
<booktitle>ISC2</booktitle>
<ee>https://doi.org/10.1109/ISC251055.2020.9239061</ee>
<crossref>conf/isc2/2020</crossref>
<url>db/conf/isc2/isc2020.html#HuangNG20</url>
</inproceedings>
</r>
<r><article key="journals/access/HeLHWM19" mdate="2026-02-01">
<author pid="h/XudongHe">Xudong He</author>
<author pid="225/2846">Jiabing Liu</author>
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0003-1370-8190" pid="84/1754">Dejun Wang</author>
<author orcid="0000-0002-4377-0051" pid="57/4576-4">Bo Meng 0004</author>
<title>A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology.</title>
<pages>131050-131067</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2940512</ee>
<url>db/journals/access/access7.html#HeLHWM19</url>
</article>
</r>
<r><inproceedings key="conf/desec/GengAHF19" mdate="2021-10-14">
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="235/9316">Hatim Alsuwat</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<title>Securing Relational Database Storage with Attribute Association Aware Shuffling.</title>
<pages>1-8</pages>
<year>2019</year>
<booktitle>DSC</booktitle>
<ee>https://doi.org/10.1109/DSC47296.2019.8937694</ee>
<crossref>conf/desec/2019</crossref>
<url>db/conf/desec/desec2019.html#GengAHF19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccnc/HuangSNK19" mdate="2019-04-20">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="194/3916">Laurent Njilla</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<title>A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak.</title>
<pages>457-462</pages>
<year>2019</year>
<booktitle>ICNC</booktitle>
<ee>https://doi.org/10.1109/ICCNC.2019.8685493</ee>
<crossref>conf/iccnc/2019</crossref>
<url>db/conf/iccnc/iccnc2019.html#HuangSNK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdis/AlsuwatAGHF19" mdate="2021-10-14">
<author pid="235/9316">Hatim Alsuwat</author>
<author pid="235/9257">Emad Alsuwat</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<title>Data Dependencies Preserving Shuffle in Relational Database.</title>
<pages>180-187</pages>
<year>2019</year>
<booktitle>ICDIS</booktitle>
<ee>https://doi.org/10.1109/ICDIS.2019.00034</ee>
<crossref>conf/icdis/2019</crossref>
<url>db/conf/icdis/icdis2019.html#AlsuwatAGHF19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isc2/HuangNG19" mdate="2021-10-14">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="194/3916">Laurent Njilla</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<title>Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions.</title>
<pages>1-8</pages>
<year>2019</year>
<booktitle>ISC2</booktitle>
<ee>https://doi.org/10.1109/ISC246665.2019.9071682</ee>
<crossref>conf/isc2/2019</crossref>
<url>db/conf/isc2/isc2019.html#HuangNG19</url>
</inproceedings>
</r>
<r><article key="journals/chb/JangGLXHKT18" mdate="2021-10-14">
<author orcid="0000-0003-3935-7421" pid="41/11483">S. Mo Jang</author>
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="218/0655">Jo-Yun Queenie Li</author>
<author pid="149/1512">Ruofan Xia</author>
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0002-3905-9646" pid="218/0159">Hwalbin Kim</author>
<author pid="21/234">Jijun Tang</author>
<title>A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis.</title>
<pages>103-113</pages>
<year>2018</year>
<volume>84</volume>
<journal>Comput. Hum. Behav.</journal>
<ee>https://doi.org/10.1016/j.chb.2018.02.032</ee>
<ee>https://www.wikidata.org/entity/Q58214354</ee>
<url>db/journals/chb/chb84.html#JangGLXHKT18</url>
</article>
</r>
<r><article key="journals/osn/RajabHA18" mdate="2025-03-12">
<author pid="339/9806">Adel D. Rajab</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="188/8898">Mohammed Al-Shargabi</author>
<title>Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network.</title>
<pages>15-26</pages>
<year>2018</year>
<volume>29</volume>
<journal>Opt. Switch. Netw.</journal>
<ee>https://doi.org/10.1016/j.osn.2018.03.001</ee>
<ee>https://www.wikidata.org/entity/Q130129848</ee>
<url>db/journals/osn/osn29.html#RajabHA18</url>
</article>
</r>
<r><inproceedings key="conf/isc2/GengH18" mdate="2021-10-14">
<author orcid="0000-0002-6587-6746" pid="218/0502">Tieming Geng</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment.</title>
<pages>1-7</pages>
<year>2018</year>
<booktitle>ISC2</booktitle>
<ee>https://doi.org/10.1109/ISC2.2018.8656920</ee>
<crossref>conf/isc2/2018</crossref>
<url>db/conf/isc2/isc2018.html#GengH18</url>
</inproceedings>
</r>
<r><article key="journals/ecr/GerdesHS17" mdate="2024-08-19">
<author orcid="0000-0003-0756-3765" pid="46/7619">John H. Gerdes Jr.</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0002-0439-5981" pid="121/1899-2">Mohamed Sharaf 0002</author>
<title>Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates.</title>
<pages>289-316</pages>
<year>2017</year>
<volume>17</volume>
<journal>Electron. Commer. Res.</journal>
<number>2</number>
<ee>https://doi.org/10.1007/s10660-016-9222-y</ee>
<url>db/journals/ecr/ecr17.html#GerdesHS17</url>
</article>
</r>
<r><article key="journals/ijnsec/MengHYNW17" mdate="2021-01-04">
<author pid="57/4576">Bo Meng</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="199/7545">Yitong Yang</author>
<author pid="221/3088">Leyuan Niu</author>
<author pid="84/1754">Dejun Wang</author>
<title>Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model.</title>
<pages>138-153</pages>
<year>2017</year>
<volume>19</volume>
<journal>Int. J. Netw. Secur.</journal>
<number>1</number>
<ee type="oa">http://ijns.jalaxy.com.tw/contents/ijns-v19-n1/ijns-2017-v19-n1-p138-153.pdf</ee>
<url>db/journals/ijnsec/ijnsec19.html#MengHYNW17</url>
</article>
</r>
<r><inproceedings key="conf/cloudnet/AlkassabH0CS17" mdate="2025-08-05">
<author orcid="0009-0003-6584-4431" pid="207/3895">Nawras Alkassab</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="87/1254-2">Yu Chen 0002</author>
<author orcid="0000-0003-4449-2425" pid="06/4941">Baek-Young Choi</author>
<author pid="41/5453">Sejun Song</author>
<title>Benefits and schemes of prefetching from cloud to fog networks.</title>
<pages>54-58</pages>
<year>2017</year>
<booktitle>CloudNet</booktitle>
<ee>https://doi.org/10.1109/CloudNet.2017.8071531</ee>
<crossref>conf/cloudnet/2017</crossref>
<url>db/conf/cloudnet/cloudnet2017.html#AlkassabH0CS17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/desec/RavindranH17" mdate="2018-01-06">
<author pid="31/5408">Kaliappa Ravindran</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Probabilistic treatment of service assurance in distributed information systems.</title>
<pages>318-325</pages>
<year>2017</year>
<booktitle>DSC</booktitle>
<ee>https://doi.org/10.1109/DESEC.2017.8073818</ee>
<crossref>conf/desec/2017</crossref>
<url>db/conf/desec/desec2017.html#RavindranH17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/HuangSKKN17" mdate="2017-08-04">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="45/9386">Charles A. Kamhoua</author>
<author pid="86/3876">Kevin A. Kwiat</author>
<author pid="194/3916">Laurent Njilla</author>
<title>A game theoretic approach for inspecting web-based malvertising.</title>
<pages>1-6</pages>
<year>2017</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2017.7996807</ee>
<crossref>conf/icc/2017</crossref>
<url>db/conf/icc/icc2017.html#HuangSKKN17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccel/Gebre-AmlakLJ0C17" mdate="2023-11-12">
<author pid="165/2257">Haymanot Gebre-Amlak</author>
<author pid="167/2209">Seoungjin Lee</author>
<author pid="212/3760">Abdoh M. A. Jabbari</author>
<author pid="87/1254-2">Yu Chen 0002</author>
<author orcid="0000-0003-4449-2425" pid="06/4941">Baek-Young Choi</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="41/5453">Sejun Song</author>
<title>MIST: Mobility-inspired software-defined fog system.</title>
<pages>94-99</pages>
<year>2017</year>
<booktitle>ICCE</booktitle>
<ee>https://doi.org/10.1109/ICCE.2017.7889243</ee>
<crossref>conf/iccel/2017</crossref>
<url>db/conf/iccel/icce2017.html#Gebre-AmlakLJ0C17</url>
</inproceedings>
</r>
<r><article key="journals/cloudcomp/MuellerHYTL16" mdate="2022-12-30">
<author orcid="0000-0002-1922-5635" pid="20/4094">Peter Mueller</author>
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0003-4485-6743" pid="90/3575-1">Shui Yu 0001</author>
<author orcid="0000-0002-1235-9673" pid="t/ZahirTari">Zahir Tari</author>
<author pid="l/YingDarLin">Ying-Dar Lin</author>
<title>Cloud Security.</title>
<pages>22-24</pages>
<year>2016</year>
<volume>3</volume>
<journal>IEEE Cloud Comput.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MCC.2016.117</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MCC.2016.117</ee>
<url>db/journals/cloudcomp/cloudcomp3.html#MuellerHYTL16</url>
</article>
</r>
<r><article key="journals/jece/HuangH16" mdate="2020-05-20">
<author pid="29/6643">Jie Huang</author>
<author orcid="0000-0003-3983-972X" pid="89/331">Chin-Tser Huang</author>
<title>Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations.</title>
<pages>9859830:1-9859830:12</pages>
<year>2016</year>
<volume>2016</volume>
<journal>J. Electr. Comput. Eng.</journal>
<ee type="oa">https://doi.org/10.1155/2016/9859830</ee>
<ee>https://www.wikidata.org/entity/Q59126776</ee>
<url>db/journals/jece/jece2016.html#HuangH16</url>
</article>
</r>
<r><inproceedings key="conf/edge/ChenCSHY16" mdate="2023-09-30">
<author pid="56/1670">Ning Chen</author>
<author pid="87/1254-2">Yu Chen 0002</author>
<author pid="41/5453">Sejun Song</author>
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0001-8838-9476" pid="118/4187">Xinyue Ye</author>
<title>Poster Abstract: Smart Urban Surveillance Using Fog Computing.</title>
<pages>95-96</pages>
<year>2016</year>
<booktitle>SEC</booktitle>
<ee>https://doi.org/10.1109/SEC.2016.25</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SEC.2016.25</ee>
<crossref>conf/edge/2016</crossref>
<url>db/conf/edge/sec2016.html#ChenCSHY16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/SakibH16" mdate="2017-05-25">
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Using anomaly detection based techniques to detect HTTP-based botnet C&#38;C traffic.</title>
<pages>1-6</pages>
<year>2016</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2016.7510883</ee>
<crossref>conf/icc/2016</crossref>
<url>db/conf/icc/icc2016.html#SakibH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipccc/MalebaryXH16" mdate="2023-03-24">
<author orcid="0000-0003-4339-3791" pid="258/8212">Sharaf J. Malebary</author>
<author pid="10/3878">Wenyuan Xu</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Jamming mobility in 802.11p networks: Modeling, evaluation, and detection.</title>
<pages>1-7</pages>
<year>2016</year>
<booktitle>IPCCC</booktitle>
<ee>https://doi.org/10.1109/PCCC.2016.7820665</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PCCC.2016.7820665</ee>
<crossref>conf/ipccc/2016</crossref>
<url>db/conf/ipccc/ipccc2016.html#MalebaryXH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispec/RajabHAC16" mdate="2025-03-12">
<author pid="339/9806">Adel D. Rajab</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="188/8898">Mohammed Al-Shargabi</author>
<author pid="c/JACobb">Jorge Arturo Cobb</author>
<title>Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network.</title>
<pages>315-329</pages>
<year>2016</year>
<booktitle>ISPEC</booktitle>
<ee>https://doi.org/10.1007/978-3-319-49151-6_22</ee>
<crossref>conf/ispec/2016</crossref>
<url>db/conf/ispec/ispec2016.html#RajabHAC16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/itnac/SakibH16" mdate="2023-03-24">
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Privacy preserving proximity testing using elliptic curves.</title>
<pages>121-126</pages>
<year>2016</year>
<booktitle>ITNAC</booktitle>
<ee>https://doi.org/10.1109/ATNAC.2016.7878794</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ATNAC.2016.7878794</ee>
<crossref>conf/itnac/2016</crossref>
<url>db/conf/itnac/itnac2016.html#SakibH16</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/SakibH15" mdate="2017-05-23">
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Automated Collection and Analysis of Malware Disseminated via Online Advertising.</title>
<pages>1411-1416</pages>
<year>2015</year>
<booktitle>TrustCom/BigDataSE/ISPA (1)</booktitle>
<ee>https://doi.org/10.1109/Trustcom.2015.539</ee>
<crossref>conf/trustcom/2015-1</crossref>
<url>db/conf/trustcom/trustcom2015-1.html#SakibH15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/PengLHZ14" mdate="2020-11-20">
<author pid="16/5560-7">Wei Peng 0007</author>
<author pid="92/2954-1">Feng Li 0001</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="41/592">Xukai Zou</author>
<title>A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.</title>
<pages>804-809</pages>
<year>2014</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2014.6883418</ee>
<crossref>conf/icc/2014</crossref>
<url>db/conf/icc/icc2014.html#PengLHZ14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/LiHHP14" mdate="2020-11-20">
<author pid="92/2954-1">Feng Li 0001</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="29/6643">Jie Huang</author>
<author pid="16/5560-7">Wei Peng 0007</author>
<title>Feedback-based smartphone strategic sampling for BYOD security.</title>
<pages>1-8</pages>
<year>2014</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2014.6911814</ee>
<crossref>conf/icccn/2014</crossref>
<url>db/conf/icccn/icccn2014.html#LiHHP14</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/LiPHZ13" mdate="2020-11-20">
<author pid="92/2954-1">Feng Li 0001</author>
<author pid="16/5560-7">Wei Peng 0007</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="41/592">Xukai Zou</author>
<title>Smartphone strategic sampling in defending enterprise network security.</title>
<pages>2155-2159</pages>
<year>2013</year>
<crossref>conf/icc/2013</crossref>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2013.6654846</ee>
<url>db/conf/icc/icc2013.html#LiPHZ13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcsw/SharafHH13" mdate="2023-03-24">
<author pid="s/MohamedASharaf">Mohamed A. Sharaf</author>
<author pid="29/6643">Jie Huang</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications.</title>
<pages>362-367</pages>
<year>2013</year>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2013.15</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2013.15</ee>
<crossref>conf/icdcsw/2013</crossref>
<url>db/conf/icdcsw/icdcsw2013.html#SharafHH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/infocom/ParkSCH13" mdate="2023-11-12">
<author pid="73/9050">Hyungbae Park</author>
<author pid="41/5453">Sejun Song</author>
<author orcid="0000-0003-4449-2425" pid="06/4941">Baek-Young Choi</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers.</title>
<pages>210-214</pages>
<year>2013</year>
<booktitle>INFOCOM</booktitle>
<ee>https://doi.org/10.1109/INFCOM.2013.6566765</ee>
<crossref>conf/infocom/2013</crossref>
<url>db/conf/infocom/infocom2013.html#ParkSCH13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ACMse/GossH12" mdate="2018-11-06">
<author pid="19/11159">Will Goss</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>A practical implementation of veiled certificate for user-centric privacy protection.</title>
<pages>335-336</pages>
<year>2012</year>
<booktitle>ACM Southeast Regional Conference</booktitle>
<ee>https://doi.org/10.1145/2184512.2184592</ee>
<crossref>conf/ACMse/2012</crossref>
<url>db/conf/ACMse/ACMse2012.html#GossH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/SakibH12" mdate="2017-05-23">
<author pid="129/1059">Muhammad N. Sakib</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Textact: A text-action based web authentication scheme.</title>
<pages>955-960</pages>
<year>2012</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2012.6503236</ee>
<crossref>conf/globecom/2012</crossref>
<url>db/conf/globecom/globecom2012.html#SakibH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/HuangH12" mdate="2017-05-17">
<author pid="29/6643">Jie Huang</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks.</title>
<pages>1-7</pages>
<year>2012</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2012.6289229</ee>
<crossref>conf/icccn/2012</crossref>
<url>db/conf/icccn/icccn2012.html#HuangH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcsw/HuangG12" mdate="2023-03-24">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="77/1831">Vipul Gupta</author>
<title>Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance.</title>
<pages>409-416</pages>
<year>2012</year>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2012.60</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2012.60</ee>
<crossref>conf/icdcsw/2012</crossref>
<url>db/conf/icdcsw/icdcsw2012.html#HuangG12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icppw/HuangSH12" mdate="2023-03-24">
<author pid="29/6643">Jie Huang</author>
<author pid="s/MohamedASharaf">Mohamed A. Sharaf</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud.</title>
<pages>279-287</pages>
<year>2012</year>
<booktitle>ICPP Workshops</booktitle>
<ee>https://doi.org/10.1109/ICPPW.2012.42</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPPW.2012.42</ee>
<crossref>conf/icppw/2012</crossref>
<url>db/conf/icppw/icppw2012.html#HuangSH12</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mobicom/XianH12" mdate="2018-11-06">
<author pid="20/6189">Yi Xian</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Traffic-aware geographic forwarding in vehicular ad hoc networks.</title>
<pages>107-110</pages>
<year>2012</year>
<booktitle>VANET@MOBICOM</booktitle>
<ee>https://doi.org/10.1145/2307888.2307908</ee>
<crossref>conf/mobicom/2012vanet</crossref>
<url>db/conf/mobicom/vanet2012.html#XianH12</url>
</inproceedings>
</r>
<r><article key="journals/comcom/XianHC11" mdate="2020-02-20">
<author pid="20/6189">Yi Xian</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="c/JACobb">Jorge Arturo Cobb</author>
<title>Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks.</title>
<pages>2184-2194</pages>
<year>2011</year>
<volume>34</volume>
<journal>Comput. Commun.</journal>
<number>18</number>
<ee>https://doi.org/10.1016/j.comcom.2011.01.007</ee>
<url>db/journals/comcom/comcom34.html#XianHC11</url>
</article>
</r>
<r><inproceedings key="conf/globecom/HuangHP11" mdate="2017-05-23">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="07/2814">Keesook J. Han</author>
<author pid="60/2683">James Perretta</author>
<title>Automatic Selection of Routers for Placing Early Filters of Malicious Traffic.</title>
<pages>1-5</pages>
<year>2011</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2011.6133640</ee>
<crossref>conf/globecom/2011</crossref>
<url>db/conf/globecom/globecom2011.html#HuangHP11</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/HuangH11" mdate="2017-05-25">
<author pid="29/6643">Jie Huang</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations.</title>
<pages>1-5</pages>
<year>2011</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/icc.2011.5963292</ee>
<crossref>conf/icc/2011</crossref>
<url>db/conf/icc/icc2011.html#HuangH11</url>
</inproceedings>
</r>
<r><article key="journals/tpds/ChoiHG10" mdate="2020-10-02">
<author pid="04/6643">Young-ri Choi</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<title>Stabilization of Flood Sequencing Protocols in Sensor Networks.</title>
<pages>1042-1055</pages>
<year>2010</year>
<volume>21</volume>
<journal>IEEE Trans. Parallel Distributed Syst.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TPDS.2009.126</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/TPDS.2009.126</ee>
<url>db/journals/tpds/tpds21.html#ChoiHG10</url>
</article>
</r>
<r><inproceedings key="conf/icc/HuangHC10" mdate="2017-05-25">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="67/10060">Chang-Ling Huang</author>
<author pid="30/3984">J. Morris Chang</author>
<title>Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks.</title>
<pages>1-5</pages>
<year>2010</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2010.5502180</ee>
<crossref>conf/icc/2010</crossref>
<url>db/conf/icc/icc2010.html#HuangHC10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/lcn/XianHC10" mdate="2023-03-24">
<author pid="20/6189">Yi Xian</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="c/JACobb">Jorge Arturo Cobb</author>
<title>Look-ahead routing and Message Scheduling in delay-tolerant networks.</title>
<pages>40-47</pages>
<year>2010</year>
<booktitle>LCN</booktitle>
<ee>https://doi.org/10.1109/LCN.2010.5735753</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/LCN.2010.5735753</ee>
<crossref>conf/lcn/2010</crossref>
<url>db/conf/lcn/lcn2010.html#XianHC10</url>
</inproceedings>
</r>
<r><article key="journals/compsec/GerdesKH09" mdate="2023-08-28">
<author pid="46/7619">John Gerdes Jr.</author>
<author pid="36/6972">Joakim Kalvenes</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements.</title>
<pages>248-259</pages>
<year>2009</year>
<volume>28</volume>
<journal>Comput. Secur.</journal>
<number>5</number>
<ee>https://doi.org/10.1016/j.cose.2008.12.005</ee>
<ee>https://www.wikidata.org/entity/Q115061807</ee>
<url>db/journals/compsec/compsec28.html#GerdesKH09</url>
</article>
</r>
<r><article key="journals/ejasp/HuangCH09" mdate="2020-03-12">
<author pid="89/331">Chin-Tser Huang</author>
<author orcid="0000-0002-2648-5814" pid="87/4986">Rocky K. C. Chang</author>
<author pid="36/1561">Polly Huang</author>
<title>Signal Processing Applications in Network Intrusion Detection Systems.</title>
<year>2009</year>
<volume>2009</volume>
<journal>EURASIP J. Adv. Signal Process.</journal>
<ee type="oa">https://doi.org/10.1155/2009/527689</ee>
<ee>https://www.wikidata.org/entity/Q59249454</ee>
<url>db/journals/ejasp/ejasp2009.html#HuangCH09</url>
</article>
</r>
<r><article key="journals/ejasp/HuangJ09" mdate="2020-03-12">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="53/6711">Jeff Janies</author>
<title>An Adaptive Approach to Granular Real-Time Anomaly Detection.</title>
<year>2009</year>
<volume>2009</volume>
<journal>EURASIP J. Adv. Signal Process.</journal>
<ee type="oa">https://doi.org/10.1155/2009/589413</ee>
<ee>https://www.wikidata.org/entity/Q59249415</ee>
<url>db/journals/ejasp/ejasp2009.html#HuangJ09</url>
</article>
</r>
<r><inproceedings key="conf/IEEEares/Jafari-laftiHF09" mdate="2023-03-24">
<author pid="05/7555">Maryam Jafari-lafti</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="f/CsillaFarkas">Csilla Farkas</author>
<title>P2F: A User-Centric Privacy Protection Framework.</title>
<pages>386-391</pages>
<year>2009</year>
<booktitle>ARES</booktitle>
<ee>https://doi.org/10.1109/ARES.2009.167</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ARES.2009.167</ee>
<crossref>conf/IEEEares/2009</crossref>
<url>db/conf/IEEEares/ares2009.html#Jafari-laftiHF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/csiirw/HuangG09" mdate="2018-11-06">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="46/7619">John Gerdes Jr.</author>
<title>Privacy-preserving multi-dimensional credentialing using veiled certificates.</title>
<pages>32</pages>
<year>2009</year>
<booktitle>CSIIRW</booktitle>
<ee>https://doi.org/10.1145/1558607.1558644</ee>
<crossref>conf/csiirw/2009</crossref>
<url>db/conf/csiirw/csiirw2009.html#HuangG09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/KalakotaH09" mdate="2023-03-24">
<author pid="69/1081">Prasanth Kalakota</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>On the Benefits of Early Filtering of Botnet Unwanted Traffic.</title>
<pages>1-6</pages>
<year>2009</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2009.5235325</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICCCN.2009.5235325</ee>
<crossref>conf/icccn/2009</crossref>
<url>db/conf/icccn/icccn2009.html#KalakotaH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/pdcat/CobbH09" mdate="2023-03-24">
<author pid="c/JACobb">Jorge Arturo Cobb</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Stabilization of Maximal-Metric Routing without Knowledge of Network Size.</title>
<pages>306-311</pages>
<year>2009</year>
<booktitle>PDCAT</booktitle>
<ee>https://doi.org/10.1109/PDCAT.2009.75</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/PDCAT.2009.75</ee>
<crossref>conf/pdcat/2009</crossref>
<url>db/conf/pdcat/pdcat2009.html#CobbH09</url>
</inproceedings>
</r>
<r><article key="journals/ijnsec/HuangTS08" mdate="2021-01-04">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="42/7513">Sachin Thareja</author>
<author pid="64/7513">Yong-June Shin</author>
<title>Wavelet-based Real Time Detection of Network Traffic Anomalies.</title>
<pages>309-320</pages>
<year>2008</year>
<volume>6</volume>
<journal>Int. J. Netw. Secur.</journal>
<number>3</number>
<ee type="oa">http://ijns.jalaxy.com.tw/contents/ijns-v6-n3/ijns-2008-v6-n3-p309-320.pdf</ee>
<url>db/journals/ijnsec/ijnsec6.html#HuangTS08</url>
</article>
</r>
<r><article key="journals/itpro/HuangC08" mdate="2020-03-12">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="30/3984">J. Morris Chang</author>
<title>Responding to Security Issues in WiMAX Networks.</title>
<pages>15-21</pages>
<year>2008</year>
<volume>10</volume>
<journal>IT Prof.</journal>
<number>5</number>
<ee>https://doi.org/10.1109/MITP.2008.110</ee>
<ee>http://doi.ieeecomputersociety.org/10.1109/MITP.2008.110</ee>
<url>db/journals/itpro/itpro10.html#HuangC08</url>
</article>
</r>
<r><article key="journals/jcn/KopylovaBHJ08" mdate="2020-04-03">
<author pid="63/9838">Yuliya Kopylova</author>
<author pid="b/DuncanABuell">Duncan A. Buell</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="53/6711">Jeff Janies</author>
<title>Mutual information applied to anomaly detection.</title>
<pages>89-97</pages>
<year>2008</year>
<volume>10</volume>
<journal>J. Commun. Networks</journal>
<number>1</number>
<ee>https://doi.org/10.1109/JCN.2008.6388332</ee>
<url>db/journals/jcn/jcn10.html#KopylovaBHJ08</url>
</article>
</r>
<r><article key="journals/jnw/XuHM08" mdate="2020-09-16">
<author pid="73/1259">Sen Xu</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="83/4594">Manton M. Matthews</author>
<title>Secure Multicast in WiMAX.</title>
<pages>48-57</pages>
<year>2008</year>
<volume>3</volume>
<journal>J. Networks</journal>
<number>2</number>
<ee type="archive">http://www.academypublisher.com/jnw/vol03/no02/jnw03024857.html</ee>
<url>db/journals/jnw/jnw3.html#XuHM08</url>
</article>
</r>
<r><inproceedings key="conf/iswcs/XuHM08" mdate="2021-05-07">
<author pid="73/1259">Sen Xu</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="83/4594">Manton M. Matthews</author>
<title>Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR.</title>
<pages>653-657</pages>
<year>2008</year>
<booktitle>ISWCS</booktitle>
<ee>https://doi.org/10.1109/ISWCS.2008.4726137</ee>
<crossref>conf/iswcs/2008</crossref>
<url>db/conf/iswcs/iswcs2008.html#XuHM08</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sutc/Huang08" mdate="2023-03-24">
<author pid="89/331">Chin-Tser Huang</author>
<title>LOFT: Low-Overhead Freshness Transmission in Sensor Networks.</title>
<pages>241-248</pages>
<year>2008</year>
<booktitle>SUTC</booktitle>
<ee>https://doi.org/10.1109/SUTC.2008.38</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SUTC.2008.38</ee>
<crossref>conf/sutc/2008</crossref>
<url>db/conf/sutc/sutc2008.html#Huang08</url>
</inproceedings>
</r>
<r><article key="journals/ijsnet/JaniesHJR07" mdate="2020-08-06">
<author pid="53/6711">Jeff Janies</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="19/248">Nathan L. Johnson</author>
<author pid="69/3026">Theodor Richardson</author>
<title>SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks.</title>
<pages>358-367</pages>
<year>2007</year>
<volume>2</volume>
<journal>Int. J. Sens. Networks</journal>
<number>5/6</number>
<ee>https://doi.org/10.1504/IJSNET.2007.014359</ee>
<url>db/journals/ijsnet/ijsnet2.html#JaniesHJR07</url>
</article>
</r>
<r><inproceedings key="conf/ACMse/ZhengHM07" mdate="2018-11-06">
<author pid="74/5810">Xinliang Zheng</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="83/4594">Manton M. Matthews</author>
<title>Chinese remainder theorem based group key management.</title>
<pages>266-271</pages>
<year>2007</year>
<crossref>conf/ACMse/2007</crossref>
<booktitle>ACM Southeast Regional Conference</booktitle>
<ee>https://doi.org/10.1145/1233341.1233389</ee>
<url>db/conf/ACMse/ACMse2007.html#ZhengHM07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/globecom/HuangKA07" mdate="2017-05-23">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="69/1081">Prasanth Kalakota</author>
<author pid="23/1270">Alexander B. Alexandrov</author>
<title>Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks.</title>
<pages>2769-2773</pages>
<year>2007</year>
<booktitle>GLOBECOM</booktitle>
<ee>https://doi.org/10.1109/GLOCOM.2007.524</ee>
<crossref>conf/globecom/2007</crossref>
<url>db/conf/globecom/globecom2007.html#HuangKA07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/JaniesH07" mdate="2017-05-17">
<author pid="53/6711">Jeff Janies</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Fates: A Granular Approach to Real-Time Anomaly Detection.</title>
<pages>605-610</pages>
<year>2007</year>
<crossref>conf/icccn/2007</crossref>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2007.4317884</ee>
<url>db/conf/icccn/icccn2007.html#JaniesH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/RichardsonH07" mdate="2017-05-17">
<author pid="69/3026">Theodor Richardson</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Containing Hitlist-Based Worms with Polymorphic Signatures.</title>
<pages>652-657</pages>
<year>2007</year>
<crossref>conf/icccn/2007</crossref>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2007.4317891</ee>
<url>db/conf/icccn/icccn2007.html#RichardsonH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icppw/ChangH07" mdate="2023-03-24">
<author pid="80/1372">Chung-Kuo Chang</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks.</title>
<pages>46</pages>
<year>2007</year>
<crossref>conf/icppw/2007</crossref>
<booktitle>ICPP Workshops</booktitle>
<ee>https://doi.org/10.1109/ICPPW.2007.44</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICPPW.2007.44</ee>
<url>db/conf/icppw/icppw2007.html#ChangH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ism/KatpellyLH07" mdate="2023-03-24">
<author pid="96/1219">Ravi Katpelly</author>
<author pid="11/5433">Tiecheng Liu</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Summarization of Wearable Videos Based on User Activity Analysis.</title>
<pages>92-99</pages>
<year>2007</year>
<booktitle>ISM</booktitle>
<ee>https://doi.org/10.1109/ISM.2007.4412361</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISM.2007.16</ee>
<crossref>conf/ism/2007</crossref>
<url>db/conf/ism/ism2007.html#KatpellyLH07</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iswcs/XianH07" mdate="2021-05-08">
<author pid="20/6189">Yi Xian</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Securing VoIP Services in Multi-Hop Wireless Mesh Networks.</title>
<pages>513-517</pages>
<year>2007</year>
<booktitle>ISWCS</booktitle>
<ee>https://doi.org/10.1109/ISWCS.2007.4392393</ee>
<crossref>conf/iswcs/2007</crossref>
<url>db/conf/iswcs/iswcs2007.html#XianH07</url>
</inproceedings>
</r>
<r><book key="books/sp/HuangG06" mdate="2017-05-16">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<title>Hop Integrity in the Internet</title>
<volume>21</volume>
<year>2006</year>
<pages>1-112</pages>
<publisher>Springer</publisher>
<series href="db/series/ais/index.html">Advances in Information Security</series>
<ee>https://doi.org/10.1007/0-387-29444-9</ee>
<isbn>978-0-387-24426-6</isbn>
</book>
</r>
<r><article key="journals/jhsn/HuangGE06" mdate="2015-05-18">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="e/ENElnozahy">E. N. Elnozahy</author>
<title>Convergence of IPsec in presence of resets.</title>
<pages>173-183</pages>
<year>2006</year>
<volume>15</volume>
<journal>J. High Speed Networks</journal>
<number>2</number>
<ee>http://content.iospress.com/articles/journal-of-high-speed-networks/jhs285</ee>
<url>db/journals/jhsn/jhsn15.html#HuangGE06</url>
</article>
</r>
<r><inproceedings key="conf/ACMse/XuMH06" mdate="2018-11-06">
<author pid="73/1259">Sen Xu</author>
<author pid="83/4594">Manton M. Matthews</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Security issues in privacy and key management protocols of IEEE 802.16.</title>
<pages>113-118</pages>
<year>2006</year>
<crossref>conf/ACMse/2006</crossref>
<booktitle>ACM Southeast Regional Conference</booktitle>
<ee>https://doi.org/10.1145/1185448.1185474</ee>
<url>db/conf/ACMse/ACMse2006.html#XuMH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icc/JaniesHJ06" mdate="2017-05-25">
<author pid="53/6711">Jeff Janies</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="19/248">Nathan L. Johnson</author>
<title>SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks.</title>
<pages>3663-3669</pages>
<year>2006</year>
<booktitle>ICC</booktitle>
<ee>https://doi.org/10.1109/ICC.2006.255641</ee>
<crossref>conf/icc/2006</crossref>
<url>db/conf/icc/icc2006.html#JaniesHJ06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ipccc/HuangJJL06" mdate="2023-03-24">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="19/248">Nathan L. Johnson</author>
<author pid="53/6711">Jeff Janies</author>
<author pid="l/AlexXLiu">Alex X. Liu</author>
<title>On capturing and containing E-mail worms.</title>
<year>2006</year>
<crossref>conf/ipccc/2006</crossref>
<booktitle>IPCCC</booktitle>
<ee>https://doi.org/10.1109/.2006.1629415</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/.2006.1629415</ee>
<url>db/conf/ipccc/ipccc2006.html#HuangJJL06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iswcs/XuH06" mdate="2021-05-10">
<author pid="73/1259">Sen Xu</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Attacks on PKM Protocols of IEEE 802.16 and Its Later Versions.</title>
<pages>185-189</pages>
<year>2006</year>
<booktitle>ISWCS</booktitle>
<ee>https://doi.org/10.1109/ISWCS.2006.4362284</ee>
<crossref>conf/iswcs/2006</crossref>
<url>db/conf/iswcs/iswcs2006.html#XuH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/securecomm/HuangTS06" mdate="2020-06-15">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="42/7513">Sachin Thareja</author>
<author orcid="0000-0001-8567-2567" pid="64/7513">Yong-June Shin</author>
<title>Wavelet-based Real Time Detection of Network Traffic Anomalies.</title>
<pages>1-7</pages>
<year>2006</year>
<booktitle>SecureComm</booktitle>
<ee>https://doi.org/10.1109/SECCOMW.2006.359584</ee>
<ee>http://eudl.eu/doi/10.1109/SECCOMW.2006.359584</ee>
<crossref>conf/securecomm/2006</crossref>
<url>db/conf/securecomm/securecomm2006.html#HuangTS06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/sss/GoudaCH06" mdate="2017-05-25">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="c/JACobb">Jorge Arturo Cobb</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>Fault Masking in Tri-redundant Systems.</title>
<pages>304-313</pages>
<year>2006</year>
<crossref>conf/sss/2006</crossref>
<booktitle>SSS</booktitle>
<ee>https://doi.org/10.1007/978-3-540-49823-0_21</ee>
<url>db/conf/sss/sss2006.html#GoudaCH06</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/LiuKHG05" mdate="2017-05-17">
<author pid="l/AlexXLiu">Alex X. Liu</author>
<author pid="23/11086">Jason M. Kovacs</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<title>A secure cookie protocol.</title>
<pages>333-338</pages>
<year>2005</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2005.1523880</ee>
<crossref>conf/icccn/2005</crossref>
<url>db/conf/icccn/icccn2005.html#LiuKHG05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icdcsw/HuangG05" mdate="2023-03-24">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<title>State Checksum and Its Role in System Stabilization.</title>
<pages>29-34</pages>
<year>2005</year>
<crossref>conf/icdcsw/2005</crossref>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2005.128</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2005.128</ee>
<url>db/conf/icdcsw/icdcsw2005.html#HuangG05</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iswcs/ZhengCHMS05" mdate="2021-05-12">
<author pid="74/5810">Xinliang Zheng</author>
<author pid="48/5345">Chuming Chen</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="83/4594">Manton M. Matthews</author>
<author pid="292/2452">N. Santhapuri</author>
<title>A Dual Authentication Protocol for IEEE 802.11 Wireless LANs.</title>
<pages>565-569</pages>
<year>2005</year>
<booktitle>ISWCS</booktitle>
<ee>https://doi.org/10.1109/ISWCS.2005.1547766</ee>
<crossref>conf/iswcs/2005</crossref>
<url>db/conf/iswcs/iswcs2005.html#ZhengCHMS05</url>
</inproceedings>
</r>
<r><article key="journals/cn/GoudaH03" mdate="2020-02-19">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="89/331">Chin-Tser Huang</author>
<title>A secure address resolution protocol.</title>
<pages>57-71</pages>
<year>2003</year>
<volume>41</volume>
<journal>Comput. Networks</journal>
<number>1</number>
<url>db/journals/cn/cn41.html#GoudaH03</url>
<ee>https://doi.org/10.1016/S1389-1286(02)00326-2</ee>
</article>
</r>
<r><inproceedings key="conf/icdcsw/HuangGE03" mdate="2023-03-24">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="e/ENElnozahy">E. N. Elnozahy</author>
<title>Convergence of IPsec in Presence of Resets.</title>
<pages>22-27</pages>
<year>2003</year>
<crossref>conf/icdcsw/2003</crossref>
<booktitle>ICDCS Workshops</booktitle>
<ee>https://doi.org/10.1109/ICDCSW.2003.1203526</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCSW.2003.1203526</ee>
<url>db/conf/icdcsw/icdcsw2003.html#HuangGE03</url>
</inproceedings>
</r>
<r><article key="journals/ton/GoudaEHM02" mdate="2017-05-27">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="e/ENElnozahy">E. N. Elnozahy</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="45/5937">Tommy M. McGuire</author>
<title>Hop integrity in computer networks.</title>
<pages>308-319</pages>
<year>2002</year>
<volume>10</volume>
<journal>IEEE/ACM Trans. Netw.</journal>
<number>3</number>
<ee>https://doi.org/10.1109/TNET.2002.1012363</ee>
<url>db/journals/ton/ton10.html#GoudaEHM02</url>
</article>
</r>
<r><inproceedings key="conf/icdcs/GoudaHE02" mdate="2023-03-24">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="e/ENElnozahy">E. N. Elnozahy</author>
<title>Key Trees and the Security of Interval Multicast.</title>
<pages>467-468</pages>
<year>2002</year>
<crossref>conf/icdcs/2002</crossref>
<booktitle>ICDCS</booktitle>
<ee>https://doi.org/10.1109/ICDCS.2002.1022293</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICDCS.2002.1022293</ee>
<url>db/conf/icdcs/icdcs2002.html#GoudaHE02</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/HuangG01" mdate="2017-05-17">
<author pid="89/331">Chin-Tser Huang</author>
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<title>An anti-replay window protocol with controlled shift.</title>
<pages>242-247</pages>
<year>2001</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2001.956254</ee>
<crossref>conf/icccn/2001</crossref>
<url>db/conf/icccn/icccn2001.html#HuangG01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/wss/GoudaHA01" mdate="2017-05-21">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="a/AArora">Anish Arora</author>
<title>On the Security and Vulnerability of PING.</title>
<pages>124-135</pages>
<year>2001</year>
<crossref>conf/wss/2001</crossref>
<booktitle>WSS</booktitle>
<ee>https://doi.org/10.1007/3-540-45438-1_9</ee>
<url>db/conf/wss/wss2001.html#GoudaHA01</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icccn/GoudaHL00" mdate="2017-05-17">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="82/3391">Eric Li</author>
<title>Anti-replay window protocols for secure IP.</title>
<pages>310-315</pages>
<year>2000</year>
<booktitle>ICCCN</booktitle>
<ee>https://doi.org/10.1109/ICCCN.2000.885507</ee>
<crossref>conf/icccn/2000</crossref>
<url>db/conf/icccn/icccn2000.html#GoudaHL00</url>
</inproceedings>
</r>
<r><inproceedings key="conf/icnp/GoudaEHM00" mdate="2023-03-24">
<author pid="g/MohamedGGouda">Mohamed G. Gouda</author>
<author pid="e/ENElnozahy">E. N. Elnozahy</author>
<author pid="89/331">Chin-Tser Huang</author>
<author pid="45/5937">Tommy M. McGuire</author>
<title>Hop Integrity in Computer Networks.</title>
<pages>3-11</pages>
<year>2000</year>
<crossref>conf/icnp/2000</crossref>
<booktitle>ICNP</booktitle>
<ee>https://doi.org/10.1109/ICNP.2000.896287</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ICNP.2000.896287</ee>
<url>db/conf/icnp/icnp2000.html#GoudaEHM00</url>
</inproceedings>
</r>
<coauthors n="116" nc="10">
<co c="0"><na f="a/Abuhdima:Esmail_M=_M=" pid="256/4910">Esmail M. M. Abuhdima</na></co>
<co c="0"><na f="a/Al=Shargabi:Mohammed" pid="188/8898">Mohammed Al-Shargabi</na></co>
<co c="6"><na f="a/Alexandrov:Alexander_B=" pid="23/1270">Alexander B. Alexandrov</na></co>
<co c="0"><na f="a/Ali:Asad" pid="34/8817">Asad Ali</na></co>
<co c="1"><na f="a/Alkassab:Nawras" pid="207/3895">Nawras Alkassab</na></co>
<co c="0"><na f="a/Alston:Shakendra" pid="299/9334">Shakendra Alston</na></co>
<co c="0"><na f="a/Alsuwat:Emad" pid="235/9257">Emad Alsuwat</na></co>
<co c="0"><na f="a/Alsuwat:Hatim" pid="235/9316">Hatim Alsuwat</na></co>
<co c="0"><na f="a/Ambrose:Kirk" pid="299/9164">Kirk Ambrose</na></co>
<co c="0"><na f="a/Arora:Anish" pid="a/AArora">Anish Arora</na></co>
<co c="0"><na f="a/Ataai:Rajab" pid="430/9453">Rajab Ataai</na></co>
<co c="0"><na f="b/Barr:Ricsheia" pid="398/1868">Ricsheia Barr</na></co>
<co c="0"><na f="b/Basden:Avery" pid="398/2227">Avery Basden</na></co>
<co c="0"><na f="b/Buell:Duncan_A=" pid="b/DuncanABuell">Duncan A. Buell</na></co>
<co c="0"><na f="c/Chambers:Fred" pid="333/1939">Fred Chambers</na></co>
<co c="0"><na f="c/Chang:Chung=Kuo" pid="80/1372">Chung-Kuo Chang</na></co>
<co c="8"><na f="c/Chang:J=_Morris" pid="30/3984">J. Morris Chang</na></co>
<co c="9"><na f="c/Chang:Rocky_K=_C=" pid="87/4986">Rocky K. C. Chang</na></co>
<co c="3"><na f="c/Chen:Chuming" pid="48/5345">Chuming Chen</na></co>
<co c="1"><na f="c/Chen:Ning" pid="56/1670">Ning Chen</na></co>
<co c="2"><na f="c/Chen:Shuang" pid="07/6433">Shuang Chen</na></co>
<co c="1"><na f="c/Chen_0002:Yu" pid="87/1254-2">Yu Chen 0002</na></co>
<co c="1"><na f="c/Choi:Baek=Young" pid="06/4941">Baek-Young Choi</na></co>
<co c="0"><na f="c/Choi:Young=ri" pid="04/6643">Young-ri Choi</na></co>
<co c="0"><na f="c/Cobb:Jorge_Arturo" pid="c/JACobb">Jorge Arturo Cobb</na></co>
<co c="0"><na f="c/Comert:Gurcan" pid="52/7059">Gurcan Comert</na></co>
<co c="0"><na f="d/Du:Xiaojiang" pid="22/5535">Xiaojiang Du</na></co>
<co c="0"><na f="e/Elnozahy:E=_N=" pid="e/ENElnozahy">E. N. Elnozahy</na></co>
<co c="0" n="2"><na f="e/Elqaouaq:Ahmed" pid="256/5138">Ahmed Elqaouaq</na><na>Ahmed El Qaouaq</na></co>
<co c="0"><na f="f/Farkas:Csilla" pid="f/CsillaFarkas">Csilla Farkas</na></co>
<co c="1"><na f="g/Gebre=Amlak:Haymanot" pid="165/2257">Haymanot Gebre-Amlak</na></co>
<co c="0"><na f="g/Geng:Tieming" pid="218/0502">Tieming Geng</na></co>
<co c="4" n="2"><na f="g/Gerdes_Jr=:John_H=" pid="46/7619">John H. Gerdes Jr.</na><na>John Gerdes Jr.</na></co>
<co c="-1"><na f="g/Goss:Will" pid="19/11159">Will Goss</na></co>
<co c="0"><na f="g/Gouda:Mohamed_G=" pid="g/MohamedGGouda">Mohamed G. Gouda</na></co>
<co c="-1"><na f="g/Gupta:Vipul" pid="77/1831">Vipul Gupta</na></co>
<co c="1"><na f="h/Han:Keesook_J=" pid="07/2814">Keesook J. Han</na></co>
<co c="2"><na f="h/He:Xudong" pid="h/XudongHe">Xudong He</na></co>
<co c="8"><na f="h/Huang:Chang=Ling" pid="67/10060">Chang-Ling Huang</na></co>
<co c="1"><na f="h/Huang:Jie" pid="29/6643">Jie Huang</na></co>
<co c="9"><na f="h/Huang:Polly" pid="36/1561">Polly Huang</na></co>
<co c="1"><na f="j/Jabbari:Abdoh_M=_A=" pid="212/3760">Abdoh M. A. Jabbari</na></co>
<co c="0"><na f="j/Jafari=lafti:Maryam" pid="05/7555">Maryam Jafari-lafti</na></co>
<co c="0"><na f="j/Jang:S=_Mo" pid="41/11483">S. Mo Jang</na></co>
<co c="0"><na f="j/Janies:Jeff" pid="53/6711">Jeff Janies</na></co>
<co c="0"><na f="j/Johnson:Nathan_L=" pid="19/248">Nathan L. Johnson</na></co>
<co c="6"><na f="k/Kalakota:Prasanth" pid="69/1081">Prasanth Kalakota</na></co>
<co c="4"><na f="k/Kalvenes:Joakim" pid="36/6972">Joakim Kalvenes</na></co>
<co c="0"><na f="k/Kamhoua:Charles_A=" pid="45/9386">Charles A. Kamhoua</na></co>
<co c="5"><na f="k/Katpelly:Ravi" pid="96/1219">Ravi Katpelly</na></co>
<co c="0"><na f="k/Kim:Hwalbin" pid="218/0159">Hwalbin Kim</na></co>
<co c="0"><na f="k/Kopylova:Yuliya" pid="63/9838">Yuliya Kopylova</na></co>
<co c="0"><na f="k/Kovacs:Jason_M=" pid="23/11086">Jason M. Kovacs</na></co>
<co c="0"><na f="k/Kwiat:Kevin_A=" pid="86/3876">Kevin A. Kwiat</na></co>
<co c="0"><na f="l/Laing:Jason" pid="404/0313">Jason Laing</na></co>
<co c="1"><na f="l/Lee:Seoungjin" pid="167/2209">Seoungjin Lee</na></co>
<co c="0"><na f="l/Li:Eric" pid="82/3391">Eric Li</na></co>
<co c="1"><na f="l/Li_0001:Feng" pid="92/2954-1">Feng Li 0001</na></co>
<co c="0"><na f="l/Li:Jo=Yun_Queenie" pid="218/0655">Jo-Yun Queenie Li</na></co>
<co c="0"><na f="l/Li_0001:Zhoujun" pid="76/2866-1">Zhoujun Li 0001</na></co>
<co c="0"><na f="l/Lin:Ying=Dar" pid="l/YingDarLin">Ying-Dar Lin</na></co>
<co c="0"><na f="l/Liu:Alex_X=" pid="l/AlexXLiu">Alex X. Liu</na></co>
<co c="2"><na f="l/Liu:Jiabing" pid="225/2846">Jiabing Liu</na></co>
<co c="1"><na f="l/Liu:Jian" pid="35/295">Jian Liu</na></co>
<co c="0"><na f="l/Liu_0031:Jian" pid="35/295-31">Jian Liu 0031</na></co>
<co c="2"><na f="l/Liu_0020:Qin" pid="06/2123-20">Qin Liu 0020</na></co>
<co c="5"><na f="l/Liu:Tiecheng" pid="11/5433">Tiecheng Liu</na></co>
<co c="1"><na f="l/Lorido=Botran:Tania" pid="154/6704">Tania Lorido-Botran</na></co>
<co c="0"><na f="l/Luo:Lannan" pid="153/5297">Lannan Luo</na></co>
<co c="2"><na f="m/Ma:Binhao" pid="347/5479">Binhao Ma</na></co>
<co c="0" n="2"><na f="m/Malebary:Sharaf_Jameel" pid="258/8212">Sharaf Jameel Malebary</na><na>Sharaf J. Malebary</na></co>
<co c="3"><na f="m/Matthews:Manton_M=" pid="83/4594">Manton M. Matthews</na></co>
<co c="0"><na f="m/McGuire:Tommy_M=" pid="45/5937">Tommy M. McGuire</na></co>
<co c="2"><na f="m/Meng:Bo" pid="57/4576">Bo Meng</na></co>
<co c="2"><na f="m/Meng_0004:Bo" pid="57/4576-4">Bo Meng 0004</na></co>
<co c="0"><na f="m/Mrebit:Abdulmajid" pid="398/1687">Abdulmajid Mrebit</na></co>
<co c="0"><na f="m/Mueller:Peter" pid="20/4094">Peter Mueller</na></co>
<co c="0"><na f="n/Nazeri:Amirhossein" pid="251/8676">Amirhossein Nazeri</na></co>
<co c="2"><na f="n/Niu:Leyuan" pid="221/3088">Leyuan Niu</na></co>
<co c="0"><na f="n/Niyomugabo:Kibonke" pid="333/2554">Kibonke Niyomugabo</na></co>
<co c="0"><na f="n/Njilla:Laurent" pid="194/3916">Laurent Njilla</na></co>
<co c="1"><na f="p/Park:Hyungbae" pid="73/9050">Hyungbae Park</na></co>
<co c="1"><na f="p/Peng_0007:Wei" pid="16/5560-7">Wei Peng 0007</na></co>
<co c="1"><na f="p/Perretta:James" pid="60/2683">James Perretta</na></co>
<co c="0"><na f="p/Pisu:Pierluigi" pid="73/3537">Pierluigi Pisu</na></co>
<co c="0"><na f="q/Qian:Zhiyun" pid="31/8302">Zhiyun Qian</na></co>
<co c="0"><na f="r/Rajab:Adel_D=" pid="339/9806">Adel D. Rajab</na></co>
<co c="0" n="2"><na f="r/Ravindran:Kaliappa_Nadar" pid="31/5408">Kaliappa Nadar Ravindran</na><na>Kaliappa Ravindran</na></co>
<co c="0"><na f="r/Richardson:Theodor" pid="69/3026">Theodor Richardson</na></co>
<co c="0"><na f="r/Rolle:Naomi" pid="404/0455">Naomi Rolle</na></co>
<co c="0"><na f="s/Sakib:Muhammad_N=" pid="129/1059">Muhammad N. Sakib</na></co>
<co c="3"><na f="s/Santhapuri:N=" pid="292/2452">N. Santhapuri</na></co>
<co c="4"><na f="s/Sharaf_0002:Mohamed" pid="121/1899-2">Mohamed Sharaf 0002</na></co>
<co c="1"><na f="s/Sharaf:Mohamed_A=" pid="s/MohamedASharaf">Mohamed A. Sharaf</na></co>
<co c="0"><na f="s/Sharp:Matthew" pid="50/7822">Matthew Sharp</na></co>
<co c="7"><na f="s/Shin:Yong=June" pid="64/7513">Yong-June Shin</na></co>
<co c="1"><na f="s/Song:Sejun" pid="41/5453">Sejun Song</na></co>
<co c="0"><na f="t/Tadessa:Nabeyou" pid="333/2248">Nabeyou Tadessa</na></co>
<co c="0"><na f="t/Tang:Jijun" pid="21/234">Jijun Tang</na></co>
<co c="0"><na f="t/Tari:Zahir" pid="t/ZahirTari">Zahir Tari</na></co>
<co c="7"><na f="t/Thareja:Sachin" pid="42/7513">Sachin Thareja</na></co>
<co c="0"><na f="v/Venkateswaran:Venkat" pid="22/4242">Venkat Venkateswaran</na></co>
<co c="2"><na f="w/Wang:Dejun" pid="84/1754">Dejun Wang</na></co>
<co c="2"><na f="w/Wang:Xiaoxiao" pid="01/447">Xiaoxiao Wang</na></co>
<co c="2"><na f="w/Wang:Yibing" pid="07/4342">Yibing Wang</na></co>
<co c="0"><na f="x/Xia:Ruofan" pid="149/1512">Ruofan Xia</na></co>
<co c="0"><na f="x/Xian:Yi" pid="20/6189">Yi Xian</na></co>
<co c="3"><na f="x/Xu:Sen" pid="73/1259">Sen Xu</na></co>
<co c="0"><na f="x/Xu:Wenyuan" pid="10/3878">Wenyuan Xu</na></co>
<co c="2"><na f="y/Yang:Yitong" pid="199/7545">Yitong Yang</na></co>
<co c="1"><na f="y/Ye:Xinyue" pid="118/4187">Xinyue Ye</na></co>
<co c="0"><na f="y/Yu_0001:Shui" pid="90/3575-1">Shui Yu 0001</na></co>
<co c="0"><na f="z/Zeng_0001:Qiang" pid="81/583-1">Qiang Zeng 0001</na></co>
<co c="0"><na f="z/Zhao:Chunheng" pid="299/9009">Chunheng Zhao</na></co>
<co c="3"><na f="z/Zheng:Xinliang" pid="74/5810">Xinliang Zheng</na></co>
<co c="1"><na f="z/Zou:Xukai" pid="41/592">Xukai Zou</na></co>
</coauthors>
</dblpperson>

