Refereed Conference/Workshop
Publications:
2024
- Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks
Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, and Xingyu Zhao
In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), Salt Lake City, USA, October 14-18, 2024.
- A First Look at Security and Privacy Risks in the RapidAPI Ecosystem
Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, and Hongxin Hu
In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), Salt Lake City, USA, October 14-18, 2024.
- End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis
Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, and Hongxin Hu
In Proceedings of ACM Interactive, Mobile, Wearable, and Ubiquitous Technologies (UbiComp 2024), Melbourne, Australia, October 5-9, 2024.
- Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision Language Models [PDF]
Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra and Hongxin Hu
In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024), Philadelphia, PA, USA, August 14-16, 2024
- A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang and Yaxin Liu
In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2024), Seattle, WA, USA, June 17-21, 2024
Acceptance rate: 23.6%
- Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces
Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai and Hongxin Hu
In Proceedings of the 2024 ACM Web Conference (WWW 2024), Singapore, May 13-17, 2024
- Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models [PDF]
Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao and Hongxin Hu
In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, USA, May 20-23, 2024
- Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming
Zili Meng, Xiao Kong, Jing Chen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu and Xue Wei
In Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 2024), Santa Clara, CA, USA, April 16-18, 2024
- Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao and Hongxin Hu
In Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2024), Singapore, July 1 - 5, 2024.
- SoK: Where’s the “up”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, and Ziming Zhao
In Proceedings of 18th USENIX WOOT Conference on Offensive Technologies (WOOT 2024), Philadelphia, PA, USA, August 12-13, 2024.
- Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems
Xi Tan, Sagar Mohan, Md Armanuzzaman, Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Hongxin Hu, and Ziming Zhao
In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC 2024), Avila, Spain April 8-12, 2024.
2023
- GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference
Ziang Li, Mengda Yang, Yaxin Liu, Juan Wang, Hongxin Hu, Wenzhe Yi and Xiaoyang Xu
In Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS 2023), New Orleans, LA, USA, Dec 10-16, 2023
Acceptance rate: 26.1%
- SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
Song Liao, Long Cheng, Haipeng Cai, Linke Guo and Hongxin Hu
In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2023), Copenhagen, Denmark, November 26-30, 2023
- xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses [PDF]
Feng Wei, Hongda Li, Ziming Zhao and Hongxin Hu
In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, August 9-11, 2023
- Analysis of COVID-19 Offensive Tweets and Their Targets
Song Liao, Ebuka Okpala, Long Cheng, Mingqi Li, Nishant Vishwamitra, Hongxin Hu, Feng Luo and Matthew John Costello
In Proceedings of the 29th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2023), Long Beach, CA, USA, August 6-10, 2023
- Enabling High Quality Real-Time Communications with Adaptive Frame-Rate
Zili Meng, Tingfeng Wang, Yixin Shen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu and Xue Wei
In Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2023), Boston, MA, USA, April 17-19, 2023
Acceptance rate: 50/272 = 18.3%
- Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense
Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu and Ziming Zhao
In Proceedings of the 60th ACM/IEEE Design Automation Conference (DAC 2023), San Francisco, CA, USA, July 9-13, 2023
- Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter
Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, and Hongxin Hu
In Proceedings of the EEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2023), 2023.
- Understanding and Measuring Robustness of Vision and Language Multimodal Models
Nishant Vishwamitra, Keyan Guo, Hongxin Hu, Ziming Zhao, Long Cheng, and Feng Luo
In Proceedings of the International Conference on Secure Knowledge Management (SKM 2023), 2023.
- Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles
Wenbo Ding, Song Liao,Long Cheng, Ziming Zhao, Keyan Guo, and Hongxin Hu
In Proceedings of the EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP 2023), 2023.
- An Investigation of Large Language Models for Real-World Hate Speech Detection
Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra and Hongxin Hu
In Proceedings of IEEE 2023 International Conference on Machine Learning and Applications (ICMLA 2023), 2023.
- AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab
Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Liao Song, Long Cheng, Hongxin Hu, Yongkai Wu, Xiaohong Yuan, Jeannette Wade and Sajad Khorsandroo
In Proceedings of the 2023 IEEE ASEE Frontiers in Education Conference (FIE 2023), College Station, Texas October 18–21, 2023.
2022
- Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model
Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu and Feng luo
In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP 2022), Abu Dhabi, Dec 7-11, 2022
- Measuring Data Reconstruction Defenses in Collaborative Inference Systems
Mengda Yang, Juan Wang, Hongxin Hu, Ao Ren, Ziang Li, Xiaoyang Xu and Wenzhe Yi
In Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, USA, Nov 28 - Dec 9, 2022
Acceptance rate: 25.6%
- IMap: Fast and Scalable In-Network Scanning with Programmable Switches [PDF]
Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu and Fenghua Li
In Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2022), Renton, WA, USA, April 4-6, 2022
Acceptance rate: 50/298 = 16.8%
- SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild [PDF]
Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu and Huixing Deng
In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022), August 10–12, 2022
Acceptance rate: 256/1492 = 17.2%
- Understanding and Detecting Remote Infection on Linux-based IoT Devices [PDF]
Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu and Ziming Zhao
In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2022), May 30 - June 3, 2022.
Acceptance rate: 85/463 = 18.4%
Best Paper Award
- Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks [PDF]
Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao and Gail-Joon Ahn
In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022), April 24 - 26, 2022.
- BYOZ: Protecting BYOD Through Zero Trust Network Security
John Anderson, Qiqing Huang, Long Cheng and Hongxin Hu
In Proceedings of the 16th IEEE International Conference on Networking, Architecture, and Storage (NAS 2022), Philadelphia, PA, USA, October 3-4, 2022.
- Understanding the Generalizability of Hateful Memes Detection Models Against COVID-19-related Hateful Memes
Keyan Guo, Wentai Zhao, Jaden Mu, Nishant Vishwamitra, Ziming Zhao and Hongxin Hu
In Proceedings of IEEE 2022 International Conference on Machine Learning and Applications (ICMLA 2022), December 12-14, 2022.
2021
- Switches are Scanners Too! A Fast and Scalable In-Network Scanner with Programmable Switches [PDF]
Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu
In Proceedings of the 20th ACM Workshop on Hot Topics in Networks (HotNets 2021), November 10-12, 2021
- CARTL: Cooperative Adversarially-Robust Transfer Learning [PDF]
Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen and Qi Li
In Proceedings of the 38th International Conference on Machine Learning (ICML 2021), July 18-24, 2021.
Long presentation, top 3% (166/5513)
- Towards Understanding and Detecting Cyberbullying in Real-world Images [PDF]
Nishant Vishwamitra, Hongxin Hu, Feng Luo and Long Cheng
In Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021), February 21-24, 2021.
Acceptance rate: 87/573 = 15.2%
- IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery [PDF]
Wenbo Ding, Hongxin Hu and Long Cheng
In Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021), February 21-24, 2021.
Acceptance rate: 87/573 = 15.2%
- HierTopo: Towards High-Performance and Efficient Topology Optimization for Dynamic Networks
Jing Chen, Zili Meng, Yaning Guo, Mingwei Xu and Hongxin Hu
In Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service (IWQoS 2021), June 25-28, 2021.
Acceptance rate: 64/256 = 25%
- COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection
Mingqi Li, Song Liao, Ebuka Okpala, Max Tong, Matthew Costello, Long Cheng, Hongxin Hu and Feng Luo
In Proceedings of IEEE 2021 International Conference on Machine Learning and Applications (ICMLA 2021), December 13-16, 2021.
- Rallying Adversarial Techniques against Deep Learning for Network Security
Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu and Yingjie Lao
In Proceedings of 2021 IEEE Symposium Series on Computational Intelligence (SSCI 2021), December 4-7, 2021.
2020
- Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms [PDF]
Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong and Hongxin Hu
In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2020), November 9-13, 2020.
Acceptance rate: 121/715 = 16.9%
- Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications
Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng
In Proceedings of the 2020 Annual Computer Security Applications Conference (ACSAC 2020), December 7-11, 2020
Acceptance rate: 23%
Distinguished Paper Award
- Interpreting Deep
Learning-Based Networking Systems [PDF]
Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao and Hongxin Hu
In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2020), August 10-14, 2020.
Acceptance rate: 54/250 = 21.6%
- Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs
Shuhe Wang, Chen Sun, Zili Meng, Minhu Wang, Jiamin Cao, Mingwei Xu, Jun Bi, Qun Huang, Masoud Moshref, Tong Yang, Hongxin Hu and Gong Zhang
In Proceedings of the 26th IEEE International Conference on Network Protocols (ICNP 2020), Madrid, Spain, October 13-16, 2020
Acceptance rate: 16.84%
- FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches
Jiasong Bai, Menghao Zhang, Guanyu Li, Chang Liu, Mingwei Xu and Hongxin Hu
In Proceedings of the 1st Workshop on Secure Programmable Network Infrastructure (SPIN 2020), co-located with SIGCOMM 2020, New York, USA, August 10, 2020.
- DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels
Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao and Rong Ge
In Proceedings of 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), Taipei, Taiwan, June 1-5, 2020.
Acceptance rate: 67/308 = 21.7%
- Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches
Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu
In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS 2020), San Diego, CA, USA, February 23-26, 2020. Acceptance rate: 88/506 = 17.4%
- Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos
Yifang Li, Nishant Vishwamitra, Hongxin Hu and Kelly Caine
In Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems (CHI 2020), Honolulu, Hawaii, USA, April 25-30, 2020.
Acceptance rate: 760/3126 = 24.3%
- SmartChain: Enabling High-Performance Service Chain Partition between SmartNIC and CPU
Shuhe Wang, Zili Meng, Chen Sun, Minhu Wang, Mingwei Xu, Jun Bi, Tong Yang, Qun Huang and Hongxin Hu
In Proceedings of 2020 IEEE International Conference on Communications (ICC 2020), Dublin, Ireland, June 7-11, 2020.
Best Paper Award
2019
- PiTree: Practical Implementation of ABR Algorithms Using Decision Trees
Zili Meng, Jing Chen, Yaning Guo, Chen Sun, Hongxin Hu and Mingwei Xu
In Proceedings of the 27th ACM International Conference on Multimedia
(MM 2019),
Nice, France, October 21-25, 2019.
Oral paper acceptance rate: 88/936 = 9.4%
- When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs
Menghao Zhang, Jiasong Bai, Guanyu Li, Zili Meng, Hongda Li, Hongxin Hu and Mingwei Xu
In Proceedings of IEEE ICNP 2019 HDR-Nets Workshop (HDR-Nets 2019), Chicago, IL, USA, October 7, 2019
- Teaching SDN Security Using Hands-on Labs in CloudLab
Xiaohong Yuan, Zhipeng Liu, Younghee Park, Hongxin Hu and Hongda Li
In Proceedings of the 23nd Colloquium for Information System Security Education (CISSE 2019), Las Vegas, Nevada, USA June 10-12, 2019.
- Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
Hongda Li*, Feng Wei* and Hongxin Hu
In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2019),
Richardson, TX, USA, March 27, 2019. (*co-first author)
- Octans: Optimal Placement of Service Function Chains in Many-Core Systems
Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu and Jianping Wu
In Proceedings of the 37th IEEE International Conference on Computer Communications
(INFOCOM 2019),
Paris, France, April 29-May 2, 2019.
Acceptance rate: 288/1464 = 19.7%
2018
- CrescendoNet: A New Deep Convolutional Neural Network with Ensemble Behavior [PDF]
Xiang Zhang, Nishant Vishwamitra, Hongxin Hu and Feng Luo
In Proceedings of the 17th IEEE International Conference on Machine Learning and Applications (ICMLA 2018),
Orlando, Florida, USA, December 17-20, 2018.
- On the Safety of IoT Device Physical Interaction Control [PDF]
Wenbo Ding and Hongxin Hu
In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.
Acceptance rate: 134/809 = 16.6%
Featured on Clemson CECAS News
- vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems [PDF] [PPT]
Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn and Fuqiang Zhang
In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.
Acceptance rate: 134/809 = 16.6%
Featured on Clemson CECAS News
- Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos [PDF]
Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu and Kelly Caine
In Proceedings of the 21st ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2018),
Jersey City, NJ, USA, November 3-7, 2018.
Acceptance rate: 105/384 = 27.3%
- Grus: Enabling Latency SLOs for GPU-Accelerated NFV Systems [PDF]
Zhilong Zheng, Jun Bi, Haiping Wang, Chen Sun, Heng Yu, Hongxin Hu, Kai Gao and Jianping Wu
In Proceedings of the 26th IEEE International Conference on Network Protocols
(ICNP 2018),
Cambridge, UK, September 24-27, 2018.
Acceptance rate: 35/196 = 17.9%
- A GPU-Accelerated Elastic Framework for NFV [PDF]
Zhilong Zheng, Jun Bi, Chen Sun, Heng Yu, Hongxin Hu, Zili Meng, Shuhe Wang, Kai Gao and Jianping Wu
In Proceedings of the 2nd Asia-Pacific Workshop on Networking, (APNet 2018),
Beijing, China, August 2-3, 2018.
- PAM: When Overloaded, Push Your Neighbor Aside! [PDF]
Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang and Hongxin Hu
In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, Budapest, Hungary, August 20-25, 2018.
First Place in SIGCOMM 2018 SRC
- Improving Integrated LTE-WiFi Network Performance with SDN based Flow Scheduling [PDF]
Kang Chen, Jianwei Liu, James Martin, Kuang-Ching Wang and Hongxin Hu
In Proceedings of the 27th IEEE International Conference on Computer Communications and Networks (ICCCN 2018),
Hangzhou, China, July 30-August 2, 2018.
Acceptance rate: 29.5%
- OFM: Optimized Flow Migration for NFV Elasticity Control [PDF]
Chen Sun, Jun Bi, Zili Meng, Xiao Zhang and Hongxin Hu
In Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service (IWQoS 2018),
Banff, Alberta, Canada, June 4-6, 2018.
Acceptance rate (full paper): 26/125 = 20.8%
- CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV [PDF]
Zili Meng, Jun Bi, Haiping Wang, Chen Sun and Hongxin Hu
In Proceedings of the 53rd IEEE International Conference on Communications (ICC 2018),
Kansas City, Missouri, USA, May 20-24, 2018.
- Towards Efficient Traffic Monitoring for Science DMZ with Side-channel Based Traffic Winnowing [PDF]
Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu and Richard Brooks
In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2018),
Tempe, Arizona, USA, March 21, 2018.
- Challenges Towards Protecting VNF with SGX [PDF]
Juan Wang, Chengyang Fan, Jie Wang, Shirong hao, Yi li and Hongxin Hu
In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2018),
Tempe, Arizona, USA, March 21, 2018.
- Enhancing Security Education Through Designing SDN Security Labs in CloudLab [PDF]
Younghee Park, Hongxin Hu, Xiaohong Yuan and Hongda Li
In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE 2018),
Baltimore, Maryland, USA, February 21-24, 2018.
Best Paper Award
2017
- Building a Security OS with Software Defined Infrastructure [PDF]
Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin and Donald Porter
In Proceedings of the 8th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2017),
IIT, Bombay, Indian, September 2-3, 2017.
- Effectiveness and Users' Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks [PDF]
Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart Knijnenburg and Kelly Caine
In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (HFES 2017),
Austin, Texas, USA, October 9-13, 2017.
- Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images [PDF]
Yifang Li, Nishant Vishwamitra, Bart Knijnenburg, Hongxin Hu and Kelly Caine
In Proceedings of the 1st International Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017),
Honolulu, Hawaii, USA, July 21, 2017.
- NFP: Enabling Network Function Parallelism in NFV [PDF] [PPT]
Chen Sun, Jun Bi, Zhilong Zheng, Heng Yu and Hongxin Hu
In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2017), Los Angeles, CA, USA, August 21-25, 2017.
Acceptance rate: 36/250 = 14.4%
- Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks [PDF]
Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine and Gail-Joon Ahn
In Proceedings of the 22nd ACM Symposium on Access Control Models
And Technologies (SACMAT 2017), Indianapolis, IN, USA, June 21-23, 2017.
Acceptance rate: 14/50 = 28.0%
- ThinGs In a Fog: System Illustration with Connected Vehicles
Anjan Rayamajhi, Mizanur Rahman, Manveen Kaur, Jianwei Liu, Mashrur Chowdhury, Hongxin Hu, Jerome McClendon, Kuang-Ching Wang, Abhimanyu Gosain and Jim Martin
In Proceedings of the IEEE 85th Vehicular Technology Conference (VTC 2017), Sydney, NSW, Australia, June 4-7, 2017
- PRAM: Priority-aware Flow Migration Scheme in NFV Networks (Extended Abstract)
Zili Meng, Jun Bi, Chen Sun, Anmin Xu and Hongxin Hu
In Proceedings of the ACM Symposium on SDN Research (SOSR 2017 Poster), Santa Clara, CA, USA, April 3-4, 2017.
- Towards Effective Virtualization of Intrusion Detection Systems
Nuyun Zhang, Hongda Li, Hongxin Hu and Younghee Park
In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2017),
Scottsdale, Arizona, USA, March 24, 2017.
- Dynamic Defense Provision via Network Functions Virtualization
Younghee Park, Pritesh Chandaliya, Akshaya Muralidharan, Nikash Kumar and Hongxin Hu
In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2017),
Scottsdale, Arizona, USA, March 24, 2017.
- MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks
Nishant Vishwamitra, Xiang Zhang, Jonathan Tong, Hongxin Hu, Feng Luo, Robin Kowalski and Joseph Mazer
In Proceedings of the 3rd International Workshop on Security and Privacy Analytics (IWSPA 2017),
Scottsdale, Arizona, USA, March 24, 2017.
- On the Safety and Efficiency of Virtual Firewall Elasticity Control [PDF]
Juan Deng*, Hongda Li*, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao and Wonkyu Han
In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), San Diego, CA, USA, February 26 - March 1, 2017. (*co-first author)
Acceptance rate: 68/423 = 16.1%
Featured on Clemson CECAS News
- Load-aware and Congestion-free State Management in Network Function Virtualization
Jinwei Liu, Haiying Shen and Hongxin Hu
In Proceedings of International Conference on Computing, Networking and Communications (ICNC 2017),
Silicon Valley, USA, January 26-29, 2017.
2016
- Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network [PDF]
Xiang Zhang, Jonathan Tong, Nishant Vishwamitra, Joseph P. Mazer, Robin Kowalski, Elizabeth Whittake, Hongxin Hu, Feng Luo, Jamie Macbeth and Edward Dillon
In Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA 2016),
Anaheim, California, USA, December 18-20, 2016.
- NeSMA: Enabling Network-Level State-Aware Applications in SDN
Chen Sun, Jun Bi and Hongxin Hu
In Proceedings of the 24th IEEE International Conference on Network Protocols (ICNP 2016),
CoolSDN Workshop, Singapore, November 8-11, 2016.
- Comprehensive View of Security Practices in Vehicular Networks
Manveen Kaur, James Martin and Hongxin Hu
In Proceedings of the 5th International Conference on Connected Vehicles & Expo
(ICCVE 2016),
Seattle, USA, September 12-16, 2016.
- SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization (Extended Abstract)
Chen Sun, Jun Bi, Zhilong Zheng and Hongxin Hu
In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2016 Poster), Florianópolis, Brazil, August 22-26, 2016.
- HetSDN: Exploiting SDN for Intelligent Network Usage in Heterogeneous Wireless Networks [PDF]
Kang Chen, Ryan Izard, Hongxin Hu, Kuangching Wang and James Martin
In Proceedings of 2016 IEEE/ACM International Symposium on Quality of Service (IWQoS 2016),
Beijing, China, June 20-21, 2016.
- Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks [PDF]
Hitesh Padekar, Younghee Park, Hongxin Hu and Sang-Yoon Chang
In Proceedings of the 21st ACM Symposium on Access Control Models
And Technologies (SACMAT 2016),
Shanghai, China, June 5-8, 2016.
Best Paper Honorable Mention
- State-aware Network Access Management for Software-Defined Networks [PDF]
Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang and Juan Deng
In Proceedings of the 21st ACM Symposium on Access Control Models
And Technologies (SACMAT 2016),
Shanghai, China, June 5-8, 2016.
- Performance Considerations of Network Functions Virtualization using Containers
Jason Anderson, Udit Agarwal, Hongda Li, Hongxin Hu, Craig Lowery and Amy Apon
In Proceedings of International Conference on Computing, Networking and Communications (ICNC 2016),
Kauai, Hawaii, USA, February 15-18, 2016.
2015
- VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls [PDF]
Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi and Younghee Park
In Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2015),
San Francisco, USA, November 18-21, 2015.
- SDPA: Enhancing Stateful Forwarding for Software-Defined Networking [PDF]
Shuyong Zhu, Jun Bi, Chen Sun, Chenghui Wu and Hongxin Hu
In Proceedings of the 23rd IEEE International Conference on Network Protocols (ICNP 2015),
San Francisco, USA, November 10-13, 2015.
Acceptance rate: 38/187 = 20.3%
Best Paper Nominee
- AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing
Khaled Riad, Yan Zhu, Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing (CIC 2015),
Hangzhou, China, October 27-30, 2015.
2014
- Morpheus: Automatically Generating Heuristics to Detect Android Emulators [PDF] [Dataset]
Yiming Jing, Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 30th Annual Computer Security Applications Conference(ACSAC 2014),
New Orleans, LA, USA, December 8-12, 2014.
Acceptance rate: 47/236 = 19.9%
Finalist for CSAW 2015 Best Applied Security Paper Award
- An E2E Trusted Cloud Infrastructure (Extended Abstract) [PDF]
Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Liqiang Zhang, Fajiang Yu and Hongxin Hu
In Proceedings of the 21st ACM Conference on Computer and Communications
Security (CCS
2014 Poster), Scottsdale, AZ, USA, November 3-7, 2014.
- Defensive Maneuver Cyber Platform Modeling with Stochastic Petri Nets [PDF]
WC Moody, Hongxin Hu and Amy W. Apon
In Proceedings of 10th International Conference on Collaborative Computing (CollaborateCom 2014),
Miami, Florida, USA, October 22-25, 2014.
- FlowGuard: Building Robust Firewalls for Software-Defined
Networks [PDF]
Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao
In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014),
Chicago, IL, USA, August 22, 2014.
Acceptance rate (full paper with long presentation): 16/114 = 14.0%
- LPM: Layered Policy Management for Software-Defined Networks [PDF]
Wonkyu Han, Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 28th Annual WG 11.3 Conference on Data
and Applications Security and Privacy (DBSec
2014), Vienna, Austria. July 14-16, 2014.
- Game Theoretic Analysis of Multiparty Access Control in Online Social Networks [PDF]
Hongxin Hu, Gail-Joon Ahn, Ziming Zhao and Dejun Yang
In Proceedings of the 19th ACM Symposium on Access Control Models
And Technologies (SACMAT 2014),
London, Ontario, Canada, June 25-27, 2014.
Acceptance rate: 29.3%
Test-of-Time Award
- Towards a Reliable SDN Firewall [PDF]
Hongxin Hu, Gail-Joon Ahn, Wonkyu Han and Ziming Zhao
In Proceedings of Open Networking Summit 2014 (ONS 2014) Research Track,
Santa Clara, California, USA, March 3-5, 2014.
Acceptance rate (oral presentation): 28.2%
- RiskMon: Continuous and Automated Risk Assessment
of Mobile Applications [PDF]
Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin
Hu
In Proceedings of the 4th ACM Conference on Data and Application
Security and Privacy (CODASPY 2014),
San Antonio, Texas, USA, March 3-5, 2014.
Acceptance rate (full paper): 19/119 = 16.0%
Best Paper Award
2013
- Towards a Security-Enhanced Firewall Application
for OpenFlow Networks
Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun,
He Shi and Longjie Zeng
In Proceedings of the 5th International Symposium on Cyberspace
Safety and Security (CSS 2013), November
13-15, 2013.
- Towards a Trusted Launch Mechanism for Virtual Machines
in Cloud Computing
Juan Wang, Xuhui Xie and Hongxin Hu
In Proceedings of the 4th International Conference on Cloud
Computing (CLOUDCOMP 2013), October 17–19,
2013.
- On the Security of Picture Gesture Authentication
[PDF]
Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo and
Hongxin Hu
In Proceedings of the 22nd USENIX Security Symposium (USENIX
Security 2013), Washington DC, August 14-16, 2013.
Acceptance rate: 44/277 = 15.9%
Media coverage: ACM
TechNews, InformationWeek,
WeLiveSecurity,
NetworkWorld,
SlashDot, TechEYE,
ThreatPost,
SoftPedia,
TechRadar,
TechJournal,
TechDigest,
ParityNews,
NeoWin, WebRoot,
NakedSecurity,
SignalNetworks,
MyPRGenie,
TheRegister,
cnBeta,
Delaware
Business Daily, The
State Press, DSU
News, etc
2012
- Enabling Collaborative Data Sharing in Google+
[PDF]
Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
In Proceedings of the 55th IEEE Global Communications Conference
(GLOBECOM 2012), Anaheim, California,
USA, December 3-7, 2012.
- Secure and Efficient Constructions of Hash, MAC
and PRF for Mobile Devices [PDF]
Yan Zhu, Shanbiao Wang, Di Ma, Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 55th IEEE Global Communications Conference
(GLOBECOM 2012), Anaheim, California,
USA, December 3-7, 2012.
- Model-based Conformance Testing for Android
[PDF]
Yiming Jing, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 7th International Workshop on Security
(IWSEC 2012), Fukuoka, Japan, November
7-9, 2012.
- Secure Sharing of Electronic Health Records in Clouds
[PDF]
Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 8th IEEE International Conference
on Collaborative Computing (CollaborateCom 2012),
Pittsburgh, Pennsylvania, USA, October 14-17, 2012.
- SocialImpact: Systematic Analysis of Underground
Social Dynamics [PDF]
Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi
In Proceedings of the 17th European Symposium on Research in
Computer Security (ESORICS 2012),
Pisa, Italy, September 10-14, 2012.
Acceptance rate: 50/248 = 20.1%
- Comparison-Based Encryption for Fine-grained Access
Control in Clouds [PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyan Yu
In Proceedings of the 2nd ACM Conference on Data and Application
Security and Privacy (CODASPY 2012),
San Antonio, Texas, USA, February 7-9, 2012.
Acceptance rate: 21/113 = 18.6%
- Towards Temporal Access Control in Cloud Computing
[PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang and Shanbiao Wang
In Proceedings of the 31st IEEE International Conference on
Computer Communications (INFOCOM 2012),
Mini-conference, Orlando, Florida, USA, March 25-30, 2012.
Acceptance rate: 378/1547 = 24.4%
- Towards HIPAA-compliant Healthcare Systems
[PDF]
Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 2nd ACM SIGHIT International Health Informatics
Symposium (IHI 2012),
Miami, Florida, USA, January 28-30, 2012.
Acceptance rate for oral presentation: 48/269 = 17.8%
2011
- Detecting and Resolving Privacy Conflicts for Collaborative
Data Sharing in Online Social Networks [PDF]
Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
In Proceedings of the 27th Annual Computer Security Applications
Conference (ACSAC 2011),
Orlando, Florida, USA, December 5-9, 2011.
Acceptance rate: 39/195 = 20.0%
- Examining Social Dynamics for Countering Botnet Attacks
[PDF]
Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 54th IEEE Global
Communications Conference (GLOBECOM 2011),
Houston, Texas, USA, December 5-9, 2011.
- Collaborative Integrity Verification in Hybrid Clouds
[PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han and Shimin Chen
In Proceedings of the 7th International Conference on Collaborative
Computing (CollaborateCom 2011), Orlando, Florida, USA, October
15-18, 2011.
- Ontology-based Policy Anomaly Management for Autonomic Computing
[PDF]
Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
In Proceedings of the 7th International Conference on Collaborative
Computing (CollaborateCom 2011), Orlando, Florida, USA, October
15-18, 2011.
- Automatic Extraction of Secrets from Malware [PDF]
Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 18th Working Conference on Reverse Engineering
(WCRE 2011),
Limerick, Ireland, October 17-20, 2011.
Acceptance rate: 27/104 = 25.9%
- Temporal Attribute-Based Encryption in Clouds
(Extended Abstract) [PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong and Shimin Chen
In Proceedings of the 18th ACM Conference on Computer and Communications
Security (CCS
2011 Poster), Chicago,
IL, USA, October 17-21, 2011.
- Multiparty Authorization Framework for Data Sharing
in Online Social Networks [PDF]
Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 25th Annual WG 11.3 Conference on Data
and Applications Security and Privacy (DBSec
2011), Richmond, Virginia, USA. July 11-13, 2011.
- Anomaly Discovery and Resolution in Web Access Control
Policies [PDF]
Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
In Proceedings of the 16th ACM Symposium on Access Control Models
And Technologies (SACMAT 2011),
Innsbruck, Austria, June 15-17, 2011.
Best Paper Nominee
- Dynamic Audit Services for Integrity Verification of Outsourced
Storages in Clouds [PDF]
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu and Stephen
S. Yau
In Proceedings of the 26th ACM Symposium on Applied Computing (SAC
2011), Security Track, TaiChung, Taiwan, March
21-25, 2011.
Acceptance rate for the security track: 9/41 = 21.9%
- Security Validation of Information Card Protocol with AVISPA
Juan Wang and Hongxin Hu
In Proceedings of International Conference on Energy Systems
and Electrical Power (ESEP 2011), Singapore, Dec 9-10,
2011.
2010
- A Collaborative Framework for Privacy Protection in Online Social
Networks [PDF]
Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 6th International Conference on Collaborative
Computing (CollaborateCom 2010), Chicago, Illinois, USA,
October 9-12, 2010.
- Information Flow Control in Cloud Computing [PDF]
Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu and Mukesh Singhal
In Proceedings of the 6th International Conference on Collaborative
Computing (CollaborateCom 2010), Chicago, Illinois, USA,
October 9-12, 2010.
- FAME: A Firewall Anomaly Management Environment
[PDF]
Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
In Proceedings of ACM CCS Workshop on Assurable & Usable Security
Configuration (SafeConfig 2010)
in conjunction with the 17th ACM Conference on Computer and Communications
Security (CCS 2010),
Chicago, IL, USA, October 4, 2010.
- Efficient Provable Data Possession for Hybrid
Clouds (Extended Abstract) [PDF]
Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu and Stephen
S. Yau
In Proceedings of the 17th ACM Conference on Computer and Communications
Security (CCS
2010 Poster),
Chicago, IL, USA, October 4-8, 2010.
- Risk-Aware Response for Mitigating MANET Routing Attacks
[PDF]
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu
In Proceedings of the 53rd IEEE Global
Communications Conference (GLOBECOM 2010),
Miami, Florida, USA, December 6-10, 2010.
- DR@FT: Efficient Remote Attestation Framework for Dynamic
Systems [PDF]
Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang and Jean-Pierre
Seifert
In Proceedings of the 15th European Symposium on Research in
Computer Security (ESORICS 2010),
Athens, Greece, September 20-22, 2010.
Acceptance rate: 42/201 = 20.8%
- Representing and Reasoning about Web Access Control Policies
[PDF]
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng (Authors
are listed alphabetically)
In Proceedings of the 34th Annual IEEE International Computer
Software and Applications Conference (COMPSAC
2010), Seoul, South Korea,
July 19-23, 2010.
Acceptance rate: 39/193 = 20%
- Reasoning about XACML Policy Descriptions in Answer Set
Programming [PDF]
Gail-Joon Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng (Authors
are listed alphabetically)
In Proceedings of the 13th International Workshop on Nonmonotonic
Reasoning (NMR 2010),
Toronto, Canada, May 14-16, 2010.
- Cryptographic Role-based Security Mechanisms based on Role-Key
Hierarchy [PDF]
Yan Zhu, Gail-Joon Ahn, Hongxin Hu and Huaixi Wang
In Proceedings of the 5th ACM Symposium on Information, Computer
and Communications Security (ASIACCS
2010),
Beijing, China, April 13-16, 2010.
Acceptance rate: 35/166 = 21%
2009
- Building Dynamic Remote Attestation Framework
(Extended Abstract) [PDF]
Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang and Jean-Pierre
Seifert
In the 16th ACM Conference on Computer and Communications Security
(CCS 2009 Poster),
Chicago, IL, USA, November 9-13, 2009.
- Patient-centric Authorization Framework for Sharing Electronic
Health Records [PDF]
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen
Zhang
In Proceedings of the 14th ACM Symposium on Access Control Models
And Technologies (SACMAT 2009),
Stresa, Italy, June 3-5, 2009.
2008
- Towards Role-based Authorization for OSGi Service Environments
[PDF]
Gail-Joon Ahn, Hongxin Hu and Jing Jin
In Proceedings of the 12th IEEE International Workshop on
Future Trends of Distributed Computing Systems (FTDCS 2008),
Kunming, China, October 21-23, 2008.
- Enabling Verification and Conformance Testing for Access
Control Model [PDF]
Hongxin Hu and Gail-Joon Ahn
In Proceedings of the 13th ACM Symposium on Access Control Models
And Technologies (SACMAT
2008),
Estes Park, Colorado, USA, June 11-12, 2008.
Acceptance rate: 20/79 = 25%
2007
- Towards Trust-aware Access Management for Ad-hoc Collaborations
[PDF]
Jing Jin, Gail-Joon Ahn, Mohammed Shehab and Hongxin Hu
In Proceedings of the 3rd International Conference on Collaborative
Computing (CollaborateCom 2007),
New York, USA, November 12-15, 2007.
- Towards Realizing a Formal RBAC Model in Real Systems [PDF]
Gail-Joon Ahn and Hongxin Hu
In Proceedings of the 12th ACM Symposium on Access Control Models And
Technologies (SACMAT
2007),
Sophia Antipolis, France, June 20-22, 2007.
Acceptance rate: 19/79 = 24%
Refereed
Journal/Magazine Publications:
- A Zero Trust Architecture for Connected and Autonomous Vehicles
John Anderson, Qiqing Huang, Long Cheng and Hongxin Hu
IEEE Internet Computing, 2023.
- SysFlow: Towards a Programmable Zero Trust Framework for System Security
Sungmin Hong, Lei Xu, Jianwei Huang, Hongda Li, Hongxin Hu and Guofei Gu
IEEE Transactions on Information Forensics and Security (TIFS), 2023.
- Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation
Fei Ding, Yin Yang, Hongxin Hu, Venkat Krovi and Feng Luo
IEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2022.
- S-Blocks: Lightweight and Trusted Virtual Security Function with SGX
Juan Wang, Shirong Hao, Hongxin Hu, Hongda Li, Wenhui Zhang, Jun Xu and Peng Liu
IEEE Transactions on Cloud Computing (TCC), 10(2): 1082-1099, 2022.
- COVID-19: A Pandemic of Anti-Asian Cyberhate
Matthew Costello, Long Cheng, Feng Luo, Hongxin Hu, Song Liao, Nishant Vishwamitra, Mingqi Li and Ebuka Okpala
Journal of Hate Studies, 17(1), 2021.
- Problematic Privacy Policies of Voice Assistant Applications
Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng
IEEE Security & Privacy (S&P), 2021.
- Enabling Performant, Flexible and Cost-Efficient DDoS Defense with Programmable Switches
Guanyu Li, Menghao Zhang, Shicheng Wang, Chang Liu, Mingwei Xu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Jianping Wu
IEEE/ACM Transactions on Networking (ToN), 29(4): 1509-1526, 2021.
- Octans: Optimal Placement of Service Function Chains in Many-Core Systems
Heng Yu, Zhilong Zheng, Junxian Shen, Congcong Miao, Chen Sun, HongxinHu, Jun Bi, Jianping Wu, Jilong Wang
IEEE Transactions Parallel and Distributed Systems (TPDS), 32(9): 2202-2215, 2021.
- Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning
Zili Meng, Yaning Guo, Yixin Shen, Jing Chen, Chao Zhou, Minhu Wang, Jia Zhang, Mingwei Xu, Chen Sun, Hongxin Hu
IEEE/ACM Transactions on Networking (ToN), 29(2): 723-736, 2021.
- Context-rich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT
Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao
IEEE Internet of Things Journal (IoTJ), 8(4): 2736-2750, 2021.
- IoT-Praetor: Undesired Behaviors Detection for IoT Devices
Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Hongxin Hu and Rongxin Lu
IEEE Internet of Things Journal (IoTJ), 8(2): 927-940, 2021.
- Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions
Xincai Fei, Fangming Liu, Qixia Zhang, Hai Jin, Hongxin Hu
ACM Computing Surveys (CSUR), Vol.53, August 2020.
- MicroNF: An Efficient Framework for Enabling Modularized Service Chains in NFV
Zili Meng, Jun Bi, Haiping Wang, Chen Sun and Hongxin Hu
IEEE Journal of Selected Areas in Communications (JSAC), 2019.
- Vision-Based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards
Mhafuzul Islam, Mashrur Chowdhury, Hongda Li and Hongxin Hu
Journal of the Transportation Research Board (TRB), 2019.
- Towards a Reliable Firewall for Software-Defined Networks
Hongxin Hu, Wonkyu Han, Sukwha Kyung, Gail-Joon Ahn, Ziming
Zhao, Hongda Li and Juan Wang
Computers & Security (COSE),
Elsevier, 2019
- Tripod: Towards a Scalable, Efficient and Resilient Cloud Gateway
Menghao Zhang, Jun Bi, Kai Gao, Yi Qiao, Guanyu Li, Xiao Kong, Zhaogeng Li and Hongxin Hu
IEEE Journal of Selected Areas in Communications (JSAC), Vol.37, No.3, 2019.
- Enabling NFV Elasticity Control with Optimized Flow Migration
Chen Sun, Jun Bi, Zili Meng, Tong Yang, Xiao Zhang and Hongxin Hu
IEEE Journal of Selected Areas in Communications (JSAC), Vol.36, No.10, 2018.
- Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and Their Prevention
Mhafuzul Islam, Mashrur Chowdhury, Hongda Li and Hongxin Hu
Journal of the Transportation Research Board (TRB), 2018.
- HYPER: A Hybrid High-Performance Framework for Network Function Virtualization
Chen Sun, Jun Bi, Zhilong Zheng and Hongxin Hu
IEEE Journal of Selected Areas in Communications (JSAC), Special issue on Emerging Technologies in Software-driven Communication, Vol. 35, No. 11,
2017.
- SDPA: Towards a Stateful Data Plane in Software-Defined Networking
Chen Sun, Jun Bi, Haoxian Chen, Hongxin Hu, Zhilong Zheng, Shuyong Zhu and Chenghui Wu
IEEE/ACM Transactions on Networking (TON), Vol. 25, No. 6, December, 2017.
- CHAOS: An SDN-Based Moving Target Defense System
Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, and Bo Zhao
Security and Communication Networks (SCN), October, 2017.
- TripleMon: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android
Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, and Ziming Zhao
Journal of Computer
Security (JCS), Vol. 24, No. 4,
2016.
- Supporting Virtualized Network Functions with Stateful Data Plane Abstraction
Jun Bi, Shuyong Zhu, Guang Yao, Chen Sun and Hongxin Hu
IEEE Network, Vol. 30, No. 3, 2016.
- Mules, Seals, and Attacking Tools: Analyzing Twelve Online Marketplaces
Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Tom Holt, Yiming Jing and Hongxin Hu
IEEE Security & Privacy, Vol. 14, No. 3, 2016.
- Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation [PDF]
Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
ACM Transactions on Information and System Security (TISSEC), Vol. 17, No. 4, April, 2015.
- Towards Automated Risk Assessment and Mitigation of Mobile Applications [PDF]
Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu
IEEE Transactions on Dependable and Secure Computing (TDSC),
Vol. 12, No. 5, November/December, 2015.
Selected as the spotlight paper of the issue. (screen shot)
- OpenFlow-based Real-Time Conflict Detection and Resolution for SDN Access Control Policies
Juan Wang, Jiang Wang, Hongyang Jiao, Yong Wang, Shiya Chen, Shihui Liu and Hongxin Hu
Chinese Journal of Computers (CJC), Vol. 38, No. 4, April, 2015.
- Secure and Efficient Random Functions with Variable-Length Output
Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn and Hongxin Hu
Journal of Network and Computer Applications (JNCA),
August, 2014.
- Role-Based Cryptosystem: A New Cryptographic RBAC
System Based on Role-Key Hierarchy [PDF]
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma and Shanbiao
Wang
IEEE Transactions on Information Forensics & Security (TIFS),
Vol. 8, No. 12, December, 2013.
- Discovery and Resolution of Anomalies in Web Access
Control Policies [PDF]
Hongxin Hu, Gail-Jooh Ahn and Ketan Kulkarni
IEEE Transactions on Dependable and Secure Computing (TDSC),
Vol. 10, No. 6, November/December, 2013.
Selected as the spotlight paper of the issue. (screen shot)
- Multiparty Access Control for Online Social Networks:
Model and Mechanisms [PDF]
Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
IEEE Transactions on Knowledge and Data Engineering (TKDE),
Vol. 25, No. 7, July, 2013.
Featured by the IEEE Special
Technical Community on Social Networking: (respective
post)
- Dynamic Audit Services for Outsourced Storages in
Clouds [PDF]
Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau,
Ho G. An and Shimin Chen
IEEE Transactions on Services Computing (TSC),
Vol. 6, No. 2, April/June, 2013.
- Formal Analysis of Information Card Federated Identity-Management
Protocol [PDF]
Juan Wang, Hongxin Hu, Bo Zhao, Fei Yan, Huangguo Zhang
and Qianhong Wu
Chinese Journal of Electronics (CJE), Vol. 22, No.
1, January, 2013.
- Towards HIPAA-compliant Healthcare Systems in Cloud
Computing [PDF]
Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
International Journal of Computational Models and Algorithms
in Medicine (IJCMAM), Special Issue on Privacy in Health Informatics,
Vol. 3, No. 2, December, 2012.
- Cooperative Provable Data Possession for Integrity
Verification in Multi-Cloud Storage [PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyang Yu
IEEE Transactions on Parallel and Distributed Systems (TPDS),
Vol. 23, No. 12, December, 2012.
- Collaborative Integrity Verification in Hybrid Clouds
[PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han and Shimin Chen
International Journal of Cooperative Information Systems (IJCIS),
World Scientific, Vol. 21, No. 03, November, 2012.
Invited as one of best papers presented
at CollaborateCom'11.
- Detecting and Resolving Firewall Policy Anomalies
[PDF]
Hongxin Hu, Gail-Jooh Ahn and Ketan Kulkarni
IEEE Transactions on Dependable and Secure Computing (TDSC),
Vol. 9, No. 3, May/June 2012.
- Comprehensive Two-Level Analysis of Role-Based Delegation
and Revocation Policies [PDF]
Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu and Gail-Joon
Ahn
Information and Software Technology (IST), Elsevier,
Vol. 54, No. 12, December, 2012.
Invited as the SSIRI'11 best paper.
- Efficient Constructions of Provably Secure Steganography
under Ordinary Covert Channels [PDF]
Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn and Hongjia
Zhao
Science China - Information Sciences, Springer,
Vol. 55, No. 7, July, 2012.
- Remote Attestation with Domain-based Integrity Model
and Policy Analysis [PDF]
Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn
and Jean-Pierre Seifert
IEEE Transactions on Dependable and Secure Computing (TDSC),
Vol. 9, No. 3, May/June 2012.
- Efficient Audit Service Outsourcing for Data Integrity
in Clouds [PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Stephen S.
Yau
Journal of Systems and Software (JSS),
Elsevier, Vol. 85, No 5, May 2012.
- Risk-Aware Mitigation for MANET Routing Attacks
[PDF]
Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu
IEEE Transactions on Dependable and Secure Computing (TDSC),
Vov. 9, No. 2, March/April 2012.
- Provably Secure Role-Based Encryption with Revocation
Mechanism [PDF]
Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang and
Shanbiao Wang
Journal of Computer Science and Technology (JCST),
Springer, Vol. 26, No. 4, July, 2011.
- Patient-centric Authorization Framework for Electronic
Healthcare Services [PDF]
Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and
Xinwen Zhang
Computers & Security (COSE),
Elsevier, Vol. 30, No. 2-3, March-May, 2011.
- Zero-knowledge Proofs of Retrievability [PDF]
Yan Zhu, Zexing Hu, Huaixi Wang, Gail-Joon Ahn and
Hongxin Hu
Science China - Information Sciences, Springer,
Vol. 54, No. 8, August, 2011.
- Constructing Authorization Systems Using Assurance
Management Framework [PDF]
Hongxin Hu and Gail-Joon Ahn
IEEE Transactions on Systems, Man, and Cybernetics (TSMC),
Part C, Special Issue on Availability, Reliability, and Security,
Vol. 40, No. 4, July, 2010.
Acceptance rate for the special issue: 6/70 = 8.6%
- Security-enhanced OSGi Service Environments [PDF]
Gail-Joon Ahn, Hongxin Hu and Jing Jin
IEEE Transactions on Systems, Man, and Cybernetics (TSMC),
Part C, Vol. 39, No. 5, September, 2009.
|