Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
66 | Cheng Hsu, M'hamed Bouziane, Laurie Rattner, Lester Yee |
Information Resources Management in Heterogeneous, Distributed Environments: A Metadatabase Approach. |
IEEE Trans. Software Eng. |
1991 |
DBLP DOI BibTeX RDF |
core structure, metadatabase system, global information resources dictionary, unified metadata representation, two-stage entity relationship, TSER, metadatabase model, GIRD elements, manufacturing information management examples, information resources dictionary system, IRDS, software engineering, distributed processing, database management systems, database theory, information integration, distributed environments, CAD/CAM, manufacturing data processing, information resource management |
42 | Jinyingming Zhang, Jin Liu 0009, Xiongwei Xu, Peizhu Gong, Mingyang Duan |
TSER: A Two-Stage Character Segmentation Network With Two-Stream Attention and Edge Refinement. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
42 | Cheng Hsu, Alvaro Perry, M'hamed Bouziane, Waiman Cheung |
TSER: A Data Modeling System Using the Two-Stage Entity-Relationship Approach. |
ER |
1987 |
DBLP BibTeX RDF |
|
30 | Cheng Hsu, Gilbert Babin, Lester Yee, M'hamed Bouziane, Waiman Cheung, Laurie Rattner |
Metadatabase modeling for enterprise information integration. |
J. Syst. Integr. |
1992 |
DBLP DOI BibTeX RDF |
Metadatabase, data and knowledge management, information modeling, heterogeneous databases |
28 | Nawras Alkassab, Chin-Tser Huang, Tania Lorido-Botran |
DeePref: Deep Reinforcement Learning For Video Prefetching In Content Delivery Networks. |
CoRR |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Jian Liu 0031, Chin-Tser Huang |
Evaluation of Different Time Series Forecasting Models for 5G V2V Networks. |
ICNC |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Venkat Venkateswaran, Chin-Tser Huang, Kaliappa Ravindran |
Security Management in Content Distribution Networks: a delay-variance reduction approach for content mirror site placement. |
COMSNETS |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yiming Qiu, Patrick Tser Jern Kon, Jiarong Xing, Yibo Huang 0005, Hongyi Liu, Xinyu Wang 0006, Peng Huang 0005, Mosharaf Chowdhury, Ang Chen 0001 |
Simplifying Cloud Management with Cloudless Computing. |
HotNets |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Yibing Wang, Xiaoxiao Wang, Chin-Tser Huang, Dejun Wang, Binhao Ma, Bo Meng |
SMHSDVS: A Secure and Mutual Heterogeneous Strong Designated Signature Between PKI and IBC. |
ProvSec |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Laurent Njilla, Matthew Sharp, Tieming Geng |
SMARPchain: A Smart Marker Based Reputational Probabilistic Blockchain for Multi-agent Systems. |
UbiSec |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Chin-Tser Huang, Csilla Farkas |
SCORD: Shuffling Column-Oriented Relational Database to Enhance Security. |
UbiSec |
2023 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Laurent Njilla, Chin-Tser Huang |
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment. |
Network |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Patrick Tser Jern Kon, Diogo Barradas, Ang Chen 0001 |
Stargaze: A LEO Constellation Emulator for Security Experimentation. |
CPSIOTSEC@CCS |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Yuh-Tser Wu, He-Hsuan Liu, Kuang-Hsun Lin, Hung-Yu Wei |
A Latency-Aware Scheduling Strategy for NR DCP DRX Mechanism. |
APWCS |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Laurent Njilla, Chin-Tser Huang |
A Survey of Blockchain-Based Electronic Voting Mechanisms in Sensor Networks. |
SenSys |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Jian Liu 0031, Amirhossein Nazeri, Chunheng Zhao, Esmail M. M. Abuhdima, Gurcan Comert, Chin-Tser Huang, Pierluigi Pisu |
Investigation of 5G and 4G V2V Communication Channel Performance Under Severe Weather. |
WiSEE |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Esmail M. M. Abuhdima, Gurcan Comert, Nabeyou Tadessa, Fred Chambers, Kibonke Niyomugabo, Pierluigi Pisu, Amirhossein Nazeri, Chin-Tser Huang, Jian Liu 0031, Chunheng Zhao |
The Effect of Dust and Sand on the Propagating EM Millimeter Plane Wave. |
WiSEE |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Laurent Njilla, Tieming Geng |
Smarkchain: An Amendable and Correctable Blockchain Based on Smart Markers. |
TrustCom |
2022 |
DBLP DOI BibTeX RDF |
|
28 | Esmail M. M. Abuhdima, Ahmed El Qaouaq, Shakendra Alston, Kirk Ambrose, Gurcan Comert, Jian Liu 0031, Chunheng Zhao, Chin-Tser Huang, Pierluigi Pisu |
Impact of Weather Conditions on 5G Communication Channel under Connected Vehicles Framework. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed El Qaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu 0031 |
The Effect of Dust and Sand on the 5G Terrestrial Links. |
CoRR |
2021 |
DBLP BibTeX RDF |
|
28 | Qiang Zeng 0001, Lannan Luo, Zhiyun Qian, Xiaojiang Du, Zhoujun Li 0001, Chin-Tser Huang, Csilla Farkas |
Resilient User-Side Android Application Repackaging and Tampering Detection Using Cryptographically Obfuscated Logic Bombs. |
IEEE Trans. Dependable Secur. Comput. |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Esmail M. M. Abuhdima, Gurcan Comert, Pierluigi Pisu, Chin-Tser Huang, Ahmed Elqaouaq, Chunheng Zhao, Shakendra Alston, Kirk Ambrose, Jian Liu 0031 |
The effect of Dust and Sand on the 5G Millimeter-Wave links. |
WiSEE |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Jian Liu 0031, Chin-Tser Huang |
Efficient and Trustworthy Authentication in 5G Networks Based on Blockchain. |
ICCCN |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Laurent Njilla, Chin-Tser Huang |
Smart Markers in Smart Contracts: Enabling Multiway Branching and Merging in Blockchain for Decentralized Runtime Verification. |
DSC |
2021 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad N. Sakib, Chin-Tser Huang, Ying-Dar Lin |
Maximizing accuracy in multi-scanner malware detection systems. |
Comput. Networks |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Xudong He, Qin Liu, Shuang Chen, Chin-Tser Huang, Dejun Wang, Bo Meng |
Analyzing Security Protocol Web Implementations Based on Model Extraction With Applied PI Calculus. |
IEEE Access |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla |
A Bayesian Game Theoretic Approach for Inspecting Web-Based Malvertising. |
IEEE Trans. Dependable Secur. Comput. |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Laurent Njilla, Tieming Geng |
Detecting Counterfeit ICs with Blockchain-based Verification Framework. |
ISC2 |
2020 |
DBLP DOI BibTeX RDF |
|
28 | Xudong He, Jiabing Liu, Chin-Tser Huang, Dejun Wang, Bo Meng |
A Security Analysis Method of Security Protocol Implementation Based on Unpurified Security Protocol Trace and Security Protocol Implementation Ontology. |
IEEE Access |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Muhammad N. Sakib, Laurent Njilla, Charles A. Kamhoua |
A Game Theoretic Approach for Making IoT Device Connectivity Decisions During Malware Outbreak. |
ICNC |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Laurent Njilla, Tieming Geng |
Consensus of Whom? A Spectrum of Blockchain Consensus Protocols and New Directions. |
ISC2 |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Hatim Alsuwat, Emad Alsuwat, Tieming Geng, Chin-Tser Huang, Csilla Farkas |
Data Dependencies Preserving Shuffle in Relational Database. |
ICDIS |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Hatim Alsuwat, Chin-Tser Huang, Csilla Farkas |
Securing Relational Database Storage with Attribute Association Aware Shuffling. |
DSC |
2019 |
DBLP DOI BibTeX RDF |
|
28 | Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi |
Decision tree rule learning approach to counter burst header packet flooding attack in Optical Burst Switching network. |
Opt. Switch. Netw. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | S. Mo Jang, Tieming Geng, Jo-Yun Queenie Li, Ruofan Xia, Chin-Tser Huang, Hwalbin Kim, Jijun Tang |
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis. |
Comput. Hum. Behav. |
2018 |
DBLP DOI BibTeX RDF |
|
28 | Tieming Geng, Chin-Tser Huang |
Blockchain-inspired Framework for Runtime Verification of IoT Ecosystem Task Fulfillment. |
ISC2 |
2018 |
DBLP DOI BibTeX RDF |
|
28 | John H. Gerdes Jr., Chin-Tser Huang, Mohamed A. Sharaf |
Incorporating biometrics into veiled certificates: preventing unauthorized use of anonymous certificates. |
Electron. Commer. Res. |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Bo Meng, Chin-Tser Huang, Yitong Yang, Leyuan Niu, Dejun Wang |
Automatic Generation of Security Protocol Implementations Written in Java from Abstract Specifications Proved in the Computational Model. |
Int. J. Netw. Secur. |
2017 |
DBLP BibTeX RDF |
|
28 | Chin-Tser Huang, Muhammad N. Sakib, Charles A. Kamhoua, Kevin A. Kwiat, Laurent Njilla |
A game theoretic approach for inspecting web-based malvertising. |
ICC |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Nawras Alkassab, Chin-Tser Huang, Yu Chen 0002, Baek-Young Choi, Sejun Song |
Benefits and schemes of prefetching from cloud to fog networks. |
CloudNet |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Kaliappa Ravindran, Chin-Tser Huang |
Probabilistic treatment of service assurance in distributed information systems. |
DSC |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Haymanot Gebre-Amlak, Seoungjin Lee, Abdoh M. A. Jabbari, Yu Chen 0002, Baek-Young Choi, Chin-Tser Huang, Sejun Song |
MIST: Mobility-inspired software-defined fog system. |
ICCE |
2017 |
DBLP DOI BibTeX RDF |
|
28 | Peter Mueller, Chin-Tser Huang, Shui Yu 0001, Zahir Tari, Ying-Dar Lin |
Cloud Security. |
IEEE Cloud Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Jie Huang, Chin-Tser Huang |
Design and Verification of Secure Mutual Authentication Protocols for Mobile Multihop Relay WiMAX Networks against Rogue Base/Relay Stations. |
J. Electr. Comput. Eng. |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad N. Sakib, Chin-Tser Huang |
Privacy preserving proximity testing using elliptic curves. |
ITNAC |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad N. Sakib, Chin-Tser Huang |
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic. |
ICC |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Sharaf J. Malebary, Wenyuan Xu, Chin-Tser Huang |
Jamming mobility in 802.11p networks: Modeling, evaluation, and detection. |
IPCCC |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Ning Chen, Yu Chen 0002, Sejun Song, Chin-Tser Huang, Xinyue Ye |
Poster Abstract: Smart Urban Surveillance Using Fog Computing. |
SEC |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Adel Rajab, Chin-Tser Huang, Mohammed Al-Shargabi, Jorge Arturo Cobb |
Countering Burst Header Packet Flooding Attack in Optical Burst Switching Network. |
ISPEC |
2016 |
DBLP DOI BibTeX RDF |
|
28 | Fang-Ming Hsu, Tser-Yieth Chen, Chiu-Tsu Fan, Chun-Min Lin, Chu-Mei Chiu |
Factors affecting the satisfaction of an online community for archive management in Taiwan. |
Program |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Jinn-Tser Lin, Wen-Ling Chen, Yu-Chieh Wu, Jie-Chi Yang |
A Boosting Algorithm for Auto-Generating Quiz for Traffic Education. |
ICALT |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad N. Sakib, Chin-Tser Huang |
Automated Collection and Analysis of Malware Disseminated via Online Advertising. |
TrustCom/BigDataSE/ISPA (1) |
2015 |
DBLP DOI BibTeX RDF |
|
28 | Wei Peng 0007, Feng Li 0001, Chin-Tser Huang, Xukai Zou |
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces. |
ICC |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Feng Li 0001, Chin-Tser Huang, Jie Huang, Wei Peng 0007 |
Feedback-based smartphone strategic sampling for BYOD security. |
ICCCN |
2014 |
DBLP DOI BibTeX RDF |
|
28 | Feng Li 0001, Wei Peng 0007, Chin-Tser Huang, Xukai Zou |
Smartphone strategic sampling in defending enterprise network security. |
ICC |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Hyungbae Park, Sejun Song, Baek-Young Choi, Chin-Tser Huang |
PASSAGES: Preserving Anonymity of Sources and Sinks against Global Eavesdroppers. |
INFOCOM |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Mohamed A. Sharaf, Jie Huang, Chin-Tser Huang |
Using Bytecode Instrumentation to Secure Information Flow in Multithreaded Java Applications. |
ICDCS Workshops |
2013 |
DBLP DOI BibTeX RDF |
|
28 | Will Goss, Chin-Tser Huang |
A practical implementation of veiled certificate for user-centric privacy protection. |
ACM Southeast Regional Conference |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Yi Xian, Chin-Tser Huang |
Traffic-aware geographic forwarding in vehicular ad hoc networks. |
VANET@MOBICOM |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Muhammad N. Sakib, Chin-Tser Huang |
Textact: A text-action based web authentication scheme. |
GLOBECOM |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Jie Huang, Mohamed A. Sharaf, Chin-Tser Huang |
A Hierarchical Framework for Secure and Scalable EHR Sharing and Access Control in Multi-cloud. |
ICPP Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Jie Huang, Chin-Tser Huang |
A Secure and Efficient Multi-Device and Multi-Service Authentication Protocol (SEMMAP) for 3GPP-LTE Networks. |
ICCCN |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Vipul Gupta |
Modeling and Automating Analysis of Server Duty and Client Obligation for High Assurance. |
ICDCS Workshops |
2012 |
DBLP DOI BibTeX RDF |
|
28 | Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb |
Look-Ahead Routing and Message Scheduling in Delay-Tolerant Networks. |
Comput. Commun. |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Jie Huang, Chin-Tser Huang |
Secure Mutual Authentication Protocols for Mobile Multi-Hop Relay WiMAX Networks against Rogue Base/Relay Stations. |
ICC |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Keesook J. Han, James Perretta |
Automatic Selection of Routers for Placing Early Filters of Malicious Traffic. |
GLOBECOM |
2011 |
DBLP DOI BibTeX RDF |
|
28 | Young-ri Choi, Chin-Tser Huang, Mohamed G. Gouda |
Stabilization of Flood Sequencing Protocols in Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2010 |
DBLP DOI BibTeX RDF |
flood sequencing protocol, sensor networks, Self-stabilization, sequence numbers |
28 | Chin-Tser Huang, Chang-Ling Huang, J. Morris Chang |
Analysis and Enhancement of Bandwidth Request Strategies in IEEE 802.16 Networks. |
ICC |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Yi Xian, Chin-Tser Huang, Jorge Arturo Cobb |
Look-ahead routing and Message Scheduling in delay-tolerant networks. |
LCN |
2010 |
DBLP DOI BibTeX RDF |
|
28 | Tser L. Y. Moh |
Semi-Supervised Online Learning for Acoustic Data Mining. |
|
2010 |
RDF |
|
28 | Pei-Wei Chen, Tser-Yu Lin, Ling-Wei Ke, Rickey Yu, Ming-Da Tsai, Stanley Yeh, Yi-Bin Lee, Bosen Tzeng, Yen-Horng Chen, Sheng-Jui Huang, Yu-Hsin Lin, Guang-Kaai Dehng |
A 0.13 µm CMOS Quad-Band GSM/GPRS/EDGE RF Transceiver Using a Low-Noise Fractional-N Frequency Synthesizer and Direct-Conversion Architecture. |
IEEE J. Solid State Circuits |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Haw-Long Lee, Yu-Ching Yang, Win-Jin Chang, Tser-Son Wu |
Estimation of heat flux and thermal stresses in multilayer gun barrel with thermal contact resistance. |
Appl. Math. Comput. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Tser-Yieth Chen |
Scenario analysis using embedded technology roadmap for a digital video system platform for family use development. |
Int. J. Serv. Technol. Manag. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Fang-Ming Hsu, Tser-Yieth Chen, Shuwen Wang |
Efficiency and satisfaction of electronic records management systems in e-government in Taiwan. |
Electron. Libr. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | John Gerdes Jr., Joakim Kalvenes, Chin-Tser Huang |
Multi-dimensional credentialing using veiled certificates: Protecting privacy in the face of regulatory reporting requirements. |
Comput. Secur. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Jeff Janies |
An Adaptive Approach to Granular Real-Time Anomaly Detection. |
EURASIP J. Adv. Signal Process. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Rocky K. C. Chang, Polly Huang |
Signal Processing Applications in Network Intrusion Detection Systems. |
EURASIP J. Adv. Signal Process. |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Maryam Jafari-lafti, Chin-Tser Huang, Csilla Farkas |
P2F: A User-Centric Privacy Protection Framework. |
ARES |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Prasanth Kalakota, Chin-Tser Huang |
On the Benefits of Early Filtering of Botnet Unwanted Traffic. |
ICCCN |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, John Gerdes Jr. |
Privacy-preserving multi-dimensional credentialing using veiled certificates. |
CSIIRW |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Jorge Arturo Cobb, Chin-Tser Huang |
Stabilization of Maximal-Metric Routing without Knowledge of Network Size. |
PDCAT |
2009 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Sachin Thareja, Yong-June Shin |
Wavelet-based Real Time Detection of Network Traffic Anomalies. |
Int. J. Netw. Secur. |
2008 |
DBLP BibTeX RDF |
|
28 | Chin-Tser Huang, J. Morris Chang |
Responding to Security Issues in WiMAX Networks. |
IT Prof. |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Yuliya Kopylova, Duncan A. Buell, Chin-Tser Huang, Jeff Janies |
Mutual information applied to anomaly detection. |
J. Commun. Networks |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Sen Xu, Chin-Tser Huang, Manton M. Matthews |
Secure Multicast in WiMAX. |
J. Networks |
2008 |
DBLP BibTeX RDF |
|
28 | Chin-Tser Huang |
LOFT: Low-Overhead Freshness Transmission in Sensor Networks. |
SUTC |
2008 |
DBLP DOI BibTeX RDF |
message loss, sensor network, replay attack, freshness, sequence number |
28 | Sen Xu, Chin-Tser Huang, Manton M. Matthews |
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR. |
ISWCS |
2008 |
DBLP DOI BibTeX RDF |
|
28 | Jeff Janies, Chin-Tser Huang, Nathan L. Johnson, Theodor Richardson |
SUMP: a secure unicast messaging protocol for wireless ad hoc sensor networks. |
Int. J. Sens. Networks |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Fang-Ming Hsu, Tser-Yieth Chen |
Understanding Information Systems Usage Behavior in E-Government: The Role of Context and Perceived Value. |
PACIS |
2007 |
DBLP BibTeX RDF |
|
28 | Xinliang Zheng, Chin-Tser Huang, Manton M. Matthews |
Chinese remainder theorem based group key management. |
ACM Southeast Regional Conference |
2007 |
DBLP DOI BibTeX RDF |
Chinese remaindering group key (CRGK), congruence system, fast Chinese remaindering group key (FCRGK), protocol, Chinese remainder theorem (CRT), group key management |
28 | Chin-Tser Huang, Prasanth Kalakota, Alexander B. Alexandrov |
Improving Availability with Adaptive Roaming Replicas in Presence of Determined DoS Attacks. |
GLOBECOM |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Chung-Kuo Chang, Chin-Tser Huang |
Fast and Secure Mobility for IEEE 802.16e Broadband Wireless Networks. |
ICPP Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Jeff Janies, Chin-Tser Huang |
Fates: A Granular Approach to Real-Time Anomaly Detection. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Theodor Richardson, Chin-Tser Huang |
Containing Hitlist-Based Worms with Polymorphic Signatures. |
ICCCN |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Ravi Katpelly, Tiecheng Liu, Chin-Tser Huang |
Summarization of Wearable Videos Based on User Activity Analysis. |
ISM |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Yi Xian, Chin-Tser Huang |
Securing VoIP Services in Multi-Hop Wireless Mesh Networks. |
ISWCS |
2007 |
DBLP DOI BibTeX RDF |
|
28 | Chin-Tser Huang, Mohamed G. Gouda, E. N. Elnozahy |
Convergence of IPsec in presence of resets. |
J. High Speed Networks |
2006 |
DBLP BibTeX RDF |
|
28 | Chin-Tser Huang, Mohamed G. Gouda |
Hop Integrity in the Internet |
|
2006 |
DOI RDF |
|
28 | Mohamed G. Gouda, Jorge Arturo Cobb, Chin-Tser Huang |
Fault Masking in Tri-redundant Systems. |
SSS |
2006 |
DBLP DOI BibTeX RDF |
|
28 | Jeff Janies, Chin-Tser Huang, Nathan L. Johnson |
SUMP: A Secure Unicast Messaging Protocol for Wireless Ad Hoc Sensor Networks. |
ICC |
2006 |
DBLP DOI BibTeX RDF |
|