Hongxin Hu - Publications [Google Scholar]


Refereed Conference/Workshop Publications:

    2024
  1. Is Difficulty Calibration All We Need? Towards More Practical Membership Inference Attacks
    Yu He, Boheng Li, Yao Wang, Mengda Yang, Juan Wang, Hongxin Hu, and Xingyu Zhao
    In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), Salt Lake City, USA, October 14-18, 2024.

  2. A First Look at Security and Privacy Risks in the RapidAPI Ecosystem
    Song Liao, Long Cheng, Xiapu Luo, Zheng Song, Haipeng Cai, Danfeng (Daphne) Yao, and Hongxin Hu
    In Proceedings of ACM SIGSAC Conference on Computer and Communications Security (CCS 2024), Salt Lake City, USA, October 14-18, 2024.

  3. End-Users Know Best: Identifying Undesired Behavior of Alexa Skills Through User Review Analysis
    Mohammed Aldeen, Jeffrey Young, Song Liao, Tsu-Yao Chang, Long Cheng, Haipeng Cai, Xiapu Luo, and Hongxin Hu
    In Proceedings of ACM Interactive, Mobile, Wearable, and Ubiquitous Technologies (UbiComp 2024), Melbourne, Australia, October 5-9, 2024.

  4. Moderating Illicit Online Image Promotion for Unsafe User Generated Content Games Using Large Vision Language Models [PDF]
    Keyan Guo, Ayush Utkarsh, Wenbo Ding, Isabelle Ondracek, Ziming Zhao, Guo Freeman, Nishant Vishwamitra and Hongxin Hu
    In Proceedings of the 33rd USENIX Security Symposium (USENIX Security 2024), Philadelphia, PA, USA, August 14-16, 2024

  5. A Stealthy Wrongdoer: Feature-Oriented Reconstruction Attack against Split Learning
    Xiaoyang Xu, Mengda Yang, Wenzhe Yi, Ziang Li, Juan Wang, Hongxin Hu, Yong Zhuang and Yaxin Liu
    In Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR 2024), Seattle, WA, USA, June 17-21, 2024
    Acceptance rate: 23.6%

  6. Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces
    Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai and Hongxin Hu
    In Proceedings of the 2024 ACM Web Conference (WWW 2024), Singapore, May 13-17, 2024

  7. Moderating New Waves of Online Hate with Chain-of-Thought Reasoning in Large Language Models [PDF]
    Nishant Vishwamitra, Keyan Guo, Farhan Tajwar Romit, Isabelle Ondracek, Long Cheng, Ziming Zhao and Hongxin Hu
    In Proceedings of the 45th IEEE Symposium on Security and Privacy (S&P 2024), San Francisco, CA, USA, May 20-23, 2024

  8. Hairpin: Rethinking Packet Loss Recovery in Edge-based Interactive Video Streaming
    Zili Meng, Xiao Kong, Jing Chen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu and Xue Wei
    In Proceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 2024), Santa Clara, CA, USA, April 16-18, 2024

  9. Command Hijacking on Voice-Controlled IoT in Amazon Alexa Platform
    Wenbo Ding, Song Liao, Long Cheng, Xianghang Mi, Ziming Zhao and Hongxin Hu
    In Proceedings of the 19th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2024), Singapore, July 1 - 5, 2024.

  10. SoK: Where’s the “up”?! A Comprehensive (bottom-up) Study on the Security of Arm Cortex-M Systems
    Xi Tan, Zheyuan Ma, Sandro Pinto, Le Guan, Ning Zhang, Jun Xu, Zhiqiang Lin, Hongxin Hu, and Ziming Zhao
    In Proceedings of 18th USENIX WOOT Conference on Offensive Technologies (WOOT 2024), Philadelphia, PA, USA, August 12-13, 2024.

  11. Is the Canary Dead? On the Effectiveness of Stack Canaries on Microcontroller Systems
    Xi Tan, Sagar Mohan, Md Armanuzzaman, Zheyuan Ma, Gaoxiang Liu, Alex Eastman, Hongxin Hu, and Ziming Zhao
    In Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing (SAC 2024), Avila, Spain April 8-12, 2024.

  12. 2023
  13. GAN You See Me? Enhanced Data Reconstruction Attacks against Split Inference
    Ziang Li, Mengda Yang, Yaxin Liu, Juan Wang, Hongxin Hu, Wenzhe Yi and Xiaoyang Xu
    In Proceedings of the 37th Conference on Neural Information Processing Systems (NeurIPS 2023), New Orleans, LA, USA, Dec 10-16, 2023
    Acceptance rate: 26.1%

  14. SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase
    Song Liao, Long Cheng, Haipeng Cai, Linke Guo and Hongxin Hu
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2023), Copenhagen, Denmark, November 26-30, 2023

  15. xNIDS: Explaining Deep Learning-based Network Intrusion Detection Systems for Active Intrusion Responses [PDF]
    Feng Wei, Hongda Li, Ziming Zhao and Hongxin Hu
    In Proceedings of the 32nd USENIX Security Symposium (USENIX Security 2023), Anaheim, CA, USA, August 9-11, 2023

  16. Analysis of COVID-19 Offensive Tweets and Their Targets
    Song Liao, Ebuka Okpala, Long Cheng, Mingqi Li, Nishant Vishwamitra, Hongxin Hu, Feng Luo and Matthew John Costello
    In Proceedings of the 29th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD 2023), Long Beach, CA, USA, August 6-10, 2023

  17. Enabling High Quality Real-Time Communications with Adaptive Frame-Rate
    Zili Meng, Tingfeng Wang, Yixin Shen, Bo Wang, Mingwei Xu, Rui Han, Honghao Liu, Venkat Arun, Hongxin Hu and Xue Wei
    In Proceedings of the 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2023), Boston, MA, USA, April 17-19, 2023
    Acceptance rate: 50/272 = 18.3%

  18. Return-to-Non-Secure Vulnerabilities on ARM Cortex-M TrustZone: Attack and Defense
    Zheyuan Ma, Xi Tan, Lukasz Ziarek, Ning Zhang, Hongxin Hu and Ziming Zhao
    In Proceedings of the 60th ACM/IEEE Design Automation Conference (DAC 2023), San Francisco, CA, USA, July 9-13, 2023

  19. Understanding and Analyzing COVID-19-related Online Hate Propagation Through Hateful Memes Shared on Twitter
    Nishant Vishwamitra, Keyan Guo, Song Liao, Jaden Mu, Zheyuan Ma, Long Cheng, Ziming Zhao, and Hongxin Hu
    In Proceedings of the EEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM 2023), 2023.

  20. Understanding and Measuring Robustness of Vision and Language Multimodal Models
    Nishant Vishwamitra, Keyan Guo, Hongxin Hu, Ziming Zhao, Long Cheng, and Feng Luo
    In Proceedings of the International Conference on Secure Knowledge Management (SKM 2023), 2023.

  21. Exploring Vulnerabilities in Voice Command Skills for Connected Vehicles
    Wenbo Ding, Song Liao,Long Cheng, Ziming Zhao, Keyan Guo, and Hongxin Hu
    In Proceedings of the EAI International Conference on Security and Privacy in Cyber-Physical Systems and Smart Vehicles (SmartSP 2023), 2023.

  22. An Investigation of Large Language Models for Real-World Hate Speech Detection
    Keyan Guo, Alexander Hu, Jaden Mu, Ziheng Shi, Ziming Zhao, Nishant Vishwamitra and Hongxin Hu
    In Proceedings of IEEE 2023 International Conference on Machine Learning and Applications (ICMLA 2023), 2023.

  23. AI-Cybersecurity Education Through Designing AI-based Cyberharassment Detection Lab
    Ebuka Okpala, Nishant Vishwamitra, Keyan Guo, Liao Song, Long Cheng, Hongxin Hu, Yongkai Wu, Xiaohong Yuan, Jeannette Wade and Sajad Khorsandroo
    In Proceedings of the 2023 IEEE ASEE Frontiers in Education Conference (FIE 2023), College Station, Texas October 18–21, 2023.

  24. 2022
  25. Multi-level Distillation of Semantic Knowledge for Pre-training Multilingual Language Model
    Mingqi Li, Fei Ding, Dan Zhang, Long Cheng, Hongxin Hu and Feng luo
    In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP 2022), Abu Dhabi, Dec 7-11, 2022

  26. Measuring Data Reconstruction Defenses in Collaborative Inference Systems
    Mengda Yang, Juan Wang, Hongxin Hu, Ao Ren, Ziang Li, Xiaoyang Xu and Wenzhe Yi
    In Proceedings of the 36th Conference on Neural Information Processing Systems (NeurIPS 2022), New Orleans, LA, USA, Nov 28 - Dec 9, 2022
    Acceptance rate: 25.6%

  27. IMap: Fast and Scalable In-Network Scanning with Programmable Switches [PDF]
    Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu and Fenghua Li
    In Proceedings of the 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 2022), Renton, WA, USA, April 4-6, 2022
    Acceptance rate: 50/298 = 16.8%

  28. SkillDetective: Automated Policy-Violation Detection of Voice Assistant Applications in the Wild [PDF]
    Jeffrey Young, Song Liao, Long Cheng, Hongxin Hu and Huixing Deng
    In Proceedings of the 31st USENIX Security Symposium (USENIX Security 2022), August 10–12, 2022
    Acceptance rate: 256/1492 = 17.2%

  29. Understanding and Detecting Remote Infection on Linux-based IoT Devices [PDF]
    Hongda Li, Qiqing Huang, Fei Ding, Hongxin Hu, Long Cheng, Guofei Gu and Ziming Zhao
    In Proceedings of the 17th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2022), May 30 - June 3, 2022.
    Acceptance rate: 85/463 = 18.4%
    Best Paper Award

  30. Towards Automated Content-based Photo Privacy Control in User-Centered Social Networks [PDF]
    Nishant Vishwamitra, Yifang Li, Hongxin Hu, Kelly Caine, Long Cheng, Ziming Zhao and Gail-Joon Ahn
    In Proceedings of the 12th ACM Conference on Data and Application Security and Privacy (CODASPY 2022), April 24 - 26, 2022.

  31. BYOZ: Protecting BYOD Through Zero Trust Network Security
    John Anderson, Qiqing Huang, Long Cheng and Hongxin Hu
    In Proceedings of the 16th IEEE International Conference on Networking, Architecture, and Storage (NAS 2022), Philadelphia, PA, USA, October 3-4, 2022.

  32. Understanding the Generalizability of Hateful Memes Detection Models Against COVID-19-related Hateful Memes
    Keyan Guo, Wentai Zhao, Jaden Mu, Nishant Vishwamitra, Ziming Zhao and Hongxin Hu
    In Proceedings of IEEE 2022 International Conference on Machine Learning and Applications (ICMLA 2022), December 12-14, 2022.

  33. 2021
  34. Switches are Scanners Too! A Fast and Scalable In-Network Scanner with Programmable Switches [PDF]
    Guanyu Li, Menghao Zhang, Cheng Guo, Han Bao, Mingwei Xu, Hongxin Hu
    In Proceedings of the 20th ACM Workshop on Hot Topics in Networks (HotNets 2021), November 10-12, 2021

  35. CARTL: Cooperative Adversarially-Robust Transfer Learning [PDF]
    Dian Chen, Hongxin Hu, Qian Wang, Yinli Li, Cong Wang, Chao Shen and Qi Li
    In Proceedings of the 38th International Conference on Machine Learning (ICML 2021), July 18-24, 2021.
    Long presentation, top 3% (166/5513)

  36. Towards Understanding and Detecting Cyberbullying in Real-world Images [PDF]
    Nishant Vishwamitra, Hongxin Hu, Feng Luo and Long Cheng
    In Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021), February 21-24, 2021.
    Acceptance rate: 87/573 = 15.2%

  37. IoTSafe: Enforcing Safety and Security Policy with Real IoT Physical Interaction Discovery [PDF]
    Wenbo Ding, Hongxin Hu and Long Cheng
    In Proceedings of the 28th Network and Distributed System Security Symposium (NDSS 2021), February 21-24, 2021.
    Acceptance rate: 87/573 = 15.2%

  38. HierTopo: Towards High-Performance and Efficient Topology Optimization for Dynamic Networks
    Jing Chen, Zili Meng, Yaning Guo, Mingwei Xu and Hongxin Hu
    In Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service (IWQoS 2021), June 25-28, 2021.
    Acceptance rate: 64/256 = 25%

  39. COVID-HateBERT: a Pre-trained Language Model for COVID-19 related Hate Speech Detection
    Mingqi Li, Song Liao, Ebuka Okpala, Max Tong, Matthew Costello, Long Cheng, Hongxin Hu and Feng Luo
    In Proceedings of IEEE 2021 International Conference on Machine Learning and Applications (ICMLA 2021), December 13-16, 2021.

  40. Rallying Adversarial Techniques against Deep Learning for Network Security
    Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu and Yingjie Lao
    In Proceedings of 2021 IEEE Symposium Series on Computational Intelligence (SSCI 2021), December 4-7, 2021.

  41. 2020
  42. Dangerous Skills Got Certified: Measuring the Trustworthiness of Skill Certification in Voice Personal Assistant Platforms [PDF]
    Long Cheng, Christin Wilson, Song Liao, Jeffrey Young, Daniel Dong and Hongxin Hu
    In Proceedings of the ACM Conference on Computer and Communications Security (CCS 2020), November 9-13, 2020.
    Acceptance rate: 121/715 = 16.9%

  43. Measuring the Effectiveness of Privacy Policies for Voice Assistant Applications
    Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng
    In Proceedings of the 2020 Annual Computer Security Applications Conference (ACSAC 2020), December 7-11, 2020
    Acceptance rate: 23%
    Distinguished Paper Award

  44. Interpreting Deep Learning-Based Networking Systems [PDF]
    Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao and Hongxin Hu
    In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2020), August 10-14, 2020.
    Acceptance rate: 54/250 = 21.6%

  45. Martini: Bridging the Gap between Network Measurement and Control Using Switching ASICs
    Shuhe Wang, Chen Sun, Zili Meng, Minhu Wang, Jiamin Cao, Mingwei Xu, Jun Bi, Qun Huang, Masoud Moshref, Tong Yang, Hongxin Hu and Gong Zhang
    In Proceedings of the 26th IEEE International Conference on Network Protocols (ICNP 2020), Madrid, Spain, October 13-16, 2020
    Acceptance rate: 16.84%

  46. FastFE: Accelerating ML-based Traffic Analysis with Programmable Switches
    Jiasong Bai, Menghao Zhang, Guanyu Li, Chang Liu, Mingwei Xu and Hongxin Hu
    In Proceedings of the 1st Workshop on Secure Programmable Network Infrastructure (SPIN 2020), co-located with SIGCOMM 2020, New York, USA, August 10, 2020.

  47. DeepPower: Non-intrusive and Deep Learning-based Detection of IoT Malware Using Power Side Channels
    Fei Ding, Hongda Li, Feng Luo, Hongxin Hu, Long Cheng, Hai Xiao and Rong Ge
    In Proceedings of 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS 2020), Taipei, Taiwan, June 1-5, 2020.
    Acceptance rate: 67/308 = 21.7%

  48. Poseidon: Mitigating Volumetric DDoS Attacks with Programmable Switches
    Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Mingwei Xu and Jianping Wu
    In Proceedings of the 27th Network and Distributed System Security Symposium (NDSS 2020), San Diego, CA, USA, February 23-26, 2020.
    Acceptance rate: 88/506 = 17.4%

  49. Towards A Taxonomy of Content Sensitivity and Sharing Preferences for Photos
    Yifang Li, Nishant Vishwamitra, Hongxin Hu and Kelly Caine
    In Proceedings of the 2020 ACM Conference on Human Factors in Computing Systems (CHI 2020), Honolulu, Hawaii, USA, April 25-30, 2020.
    Acceptance rate: 760/3126 = 24.3%

  50. SmartChain: Enabling High-Performance Service Chain Partition between SmartNIC and CPU
    Shuhe Wang, Zili Meng, Chen Sun, Minhu Wang, Mingwei Xu, Jun Bi, Tong Yang, Qun Huang and Hongxin Hu
    In Proceedings of 2020 IEEE International Conference on Communications (ICC 2020), Dublin, Ireland, June 7-11, 2020.
    Best Paper Award

  51. 2019
  52. PiTree: Practical Implementation of ABR Algorithms Using Decision Trees
    Zili Meng, Jing Chen, Yaning Guo, Chen Sun, Hongxin Hu and Mingwei Xu
    In Proceedings of the 27th ACM International Conference on Multimedia (MM 2019), Nice, France, October 21-25, 2019.
    Oral paper acceptance rate: 88/936 = 9.4%

  53. When NFV Meets ANN: Rethinking Elastic Scaling for ANN-based NFs
    Menghao Zhang, Jiasong Bai, Guanyu Li, Zili Meng, Hongda Li, Hongxin Hu and Mingwei Xu
    In Proceedings of IEEE ICNP 2019 HDR-Nets Workshop (HDR-Nets 2019), Chicago, IL, USA, October 7, 2019

  54. Teaching SDN Security Using Hands-on Labs in CloudLab
    Xiaohong Yuan, Zhipeng Liu, Younghee Park, Hongxin Hu and Hongda Li
    In Proceedings of the 23nd Colloquium for Information System Security Education (CISSE 2019), Las Vegas, Nevada, USA June 10-12, 2019.

  55. Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
    Hongda Li*, Feng Wei* and Hongxin Hu
    In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2019), Richardson, TX, USA, March 27, 2019. (*co-first author)

  56. Octans: Optimal Placement of Service Function Chains in Many-Core Systems
    Zhilong Zheng, Jun Bi, Heng Yu, Haiping Wang, Chen Sun, Hongxin Hu and Jianping Wu
    In Proceedings of the 37th IEEE International Conference on Computer Communications (INFOCOM 2019), Paris, France, April 29-May 2, 2019.
    Acceptance rate: 288/1464 = 19.7%

  57. 2018
  58. CrescendoNet: A New Deep Convolutional Neural Network with Ensemble Behavior [PDF]
    Xiang Zhang, Nishant Vishwamitra, Hongxin Hu and Feng Luo
    In Proceedings of the 17th IEEE International Conference on Machine Learning and Applications (ICMLA 2018), Orlando, Florida, USA, December 17-20, 2018.

  59. On the Safety of IoT Device Physical Interaction Control [PDF]
    Wenbo Ding and Hongxin Hu
    In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.
    Acceptance rate: 134/809 = 16.6%
    Featured on Clemson CECAS News

  60. vNIDS: Towards Elastic Security with Safe and Efficient Virtualization of Network Intrusion Detection Systems [PDF] [PPT]
    Hongda Li, Hongxin Hu, Guofei Gu, Gail-Joon Ahn and Fuqiang Zhang
    In Proceedings of the 25th ACM Conference on Computer and Communications Security (CCS 2018), Toronto, Canada, October 15-19, 2018.
    Acceptance rate: 134/809 = 16.6%
    Featured on Clemson CECAS News

  61. Effectiveness and Users' Experience of Obfuscation as a Privacy-Enhancing Technology for Sharing Photos [PDF]
    Yifang Li, Nishant Vishwamitra, Bart P. Knijnenburg, Hongxin Hu and Kelly Caine
    In Proceedings of the 21st ACM Conference on Computer-Supported Cooperative Work and Social Computing (CSCW 2018), Jersey City, NJ, USA, November 3-7, 2018.
    Acceptance rate: 105/384 = 27.3%

  62. Grus: Enabling Latency SLOs for GPU-Accelerated NFV Systems [PDF]
    Zhilong Zheng, Jun Bi, Haiping Wang, Chen Sun, Heng Yu, Hongxin Hu, Kai Gao and Jianping Wu
    In Proceedings of the 26th IEEE International Conference on Network Protocols (ICNP 2018), Cambridge, UK, September 24-27, 2018.
    Acceptance rate: 35/196 = 17.9%

  63. A GPU-Accelerated Elastic Framework for NFV [PDF]
    Zhilong Zheng, Jun Bi, Chen Sun, Heng Yu, Hongxin Hu, Zili Meng, Shuhe Wang, Kai Gao and Jianping Wu
    In Proceedings of the 2nd Asia-Pacific Workshop on Networking, (APNet 2018), Beijing, China, August 2-3, 2018.

  64. PAM: When Overloaded, Push Your Neighbor Aside! [PDF]
    Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang and Hongxin Hu
    In Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos, Budapest, Hungary, August 20-25, 2018.
    First Place in SIGCOMM 2018 SRC

  65. Improving Integrated LTE-WiFi Network Performance with SDN based Flow Scheduling [PDF]
    Kang Chen, Jianwei Liu, James Martin, Kuang-Ching Wang and Hongxin Hu
    In Proceedings of the 27th IEEE International Conference on Computer Communications and Networks (ICCCN 2018), Hangzhou, China, July 30-August 2, 2018.
    Acceptance rate: 29.5%

  66. OFM: Optimized Flow Migration for NFV Elasticity Control [PDF]
    Chen Sun, Jun Bi, Zili Meng, Xiao Zhang and Hongxin Hu
    In Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service (IWQoS 2018), Banff, Alberta, Canada, June 4-6, 2018.
    Acceptance rate (full paper): 26/125 = 20.8%

  67. CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV [PDF]
    Zili Meng, Jun Bi, Haiping Wang, Chen Sun and Hongxin Hu
    In Proceedings of the 53rd IEEE International Conference on Communications (ICC 2018), Kansas City, Missouri, USA, May 20-24, 2018.

  68. Towards Efficient Traffic Monitoring for Science DMZ with Side-channel Based Traffic Winnowing [PDF]
    Hongda Li, Fuqiang Zhang, Lu Yu, Jon Oakley, Hongxin Hu and Richard Brooks
    In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2018), Tempe, Arizona, USA, March 21, 2018.

  69. Challenges Towards Protecting VNF with SGX [PDF]
    Juan Wang, Chengyang Fan, Jie Wang, Shirong hao, Yi li and Hongxin Hu
    In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2018), Tempe, Arizona, USA, March 21, 2018.

  70. Enhancing Security Education Through Designing SDN Security Labs in CloudLab [PDF]
    Younghee Park, Hongxin Hu, Xiaohong Yuan and Hongda Li
    In Proceedings of the 49th ACM Technical Symposium on Computer Science Education (SIGCSE 2018), Baltimore, Maryland, USA, February 21-24, 2018.
    Best Paper Award

  71. 2017
  72. Building a Security OS with Software Defined Infrastructure [PDF]
    Guofei Gu, Hongxin Hu, Eric Keller, Zhiqiang Lin and Donald Porter
    In Proceedings of the 8th ACM SIGOPS Asia-Pacific Workshop on Systems (APSys 2017), IIT, Bombay, Indian, September 2-3, 2017.

  73. Effectiveness and Users' Experience of Face Blurring as a Privacy Protection for Sharing Photos via Online Social Networks [PDF]
    Yifang Li, Nishant Vishwamitra, Hongxin Hu, Bart Knijnenburg and Kelly Caine
    In Proceedings of the Human Factors and Ergonomics Society Annual Meeting (HFES 2017), Austin, Texas, USA, October 9-13, 2017.

  74. Blur vs. Block: Investigating the Effectiveness of Privacy-Enhancing Obfuscation for Images [PDF]
    Yifang Li, Nishant Vishwamitra, Bart Knijnenburg, Hongxin Hu and Kelly Caine
    In Proceedings of the 1st International Workshop on The Bright and Dark Sides of Computer Vision: Challenges and Opportunities for Privacy and Security (CV-COPS 2017), Honolulu, Hawaii, USA, July 21, 2017.

  75. NFP: Enabling Network Function Parallelism in NFV [PDF] [PPT]
    Chen Sun, Jun Bi, Zhilong Zheng, Heng Yu and Hongxin Hu
    In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2017), Los Angeles, CA, USA, August 21-25, 2017.
    Acceptance rate: 36/250 = 14.4%

  76. Towards PII-based Multiparty Access Control for Photo Sharing in Online Social Networks [PDF]
    Nishant Vishwamitra, Yifang Li, Kevin Wang, Hongxin Hu, Kelly Caine and Gail-Joon Ahn
    In Proceedings of the 22nd ACM Symposium on Access Control Models And Technologies (SACMAT 2017), Indianapolis, IN, USA, June 21-23, 2017.
    Acceptance rate: 14/50 = 28.0%

  77. ThinGs In a Fog: System Illustration with Connected Vehicles
    Anjan Rayamajhi, Mizanur Rahman, Manveen Kaur, Jianwei Liu, Mashrur Chowdhury, Hongxin Hu, Jerome McClendon, Kuang-Ching Wang, Abhimanyu Gosain and Jim Martin
    In Proceedings of the IEEE 85th Vehicular Technology Conference (VTC 2017), Sydney, NSW, Australia, June 4-7, 2017

  78. PRAM: Priority-aware Flow Migration Scheme in NFV Networks (Extended Abstract)
    Zili Meng, Jun Bi, Chen Sun, Anmin Xu and Hongxin Hu
    In Proceedings of the ACM Symposium on SDN Research (SOSR 2017 Poster), Santa Clara, CA, USA, April 3-4, 2017.

  79. Towards Effective Virtualization of Intrusion Detection Systems
    Nuyun Zhang, Hongda Li, Hongxin Hu and Younghee Park
    In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2017), Scottsdale, Arizona, USA, March 24, 2017.

  80. Dynamic Defense Provision via Network Functions Virtualization
    Younghee Park, Pritesh Chandaliya, Akshaya Muralidharan, Nikash Kumar and Hongxin Hu
    In Proceedings of ACM International Workshop on Security in Software Defined Networks and Network Function Virtualization (SDN-NFV Security 2017), Scottsdale, Arizona, USA, March 24, 2017.

  81. MCDefender: Toward Effective Cyberbullying Defense in Mobile Online Social Networks
    Nishant Vishwamitra, Xiang Zhang, Jonathan Tong, Hongxin Hu, Feng Luo, Robin Kowalski and Joseph Mazer
    In Proceedings of the 3rd International Workshop on Security and Privacy Analytics (IWSPA 2017), Scottsdale, Arizona, USA, March 24, 2017.

  82. On the Safety and Efficiency of Virtual Firewall Elasticity Control [PDF]
    Juan Deng*, Hongda Li*, Hongxin Hu, Kuang-Ching Wang, Gail-Joon Ahn, Ziming Zhao and Wonkyu Han
    In Proceedings of the 24th Network and Distributed System Security Symposium (NDSS 2017), San Diego, CA, USA, February 26 - March 1, 2017. (*co-first author)
    Acceptance rate: 68/423 = 16.1%
    Featured on Clemson CECAS News

  83. Load-aware and Congestion-free State Management in Network Function Virtualization
    Jinwei Liu, Haiying Shen and Hongxin Hu
    In Proceedings of International Conference on Computing, Networking and Communications (ICNC 2017), Silicon Valley, USA, January 26-29, 2017.

  84. 2016
  85. Cyberbullying Detection with a Pronunciation Based Convolutional Neural Network [PDF]
    Xiang Zhang, Jonathan Tong, Nishant Vishwamitra, Joseph P. Mazer, Robin Kowalski, Elizabeth Whittake, Hongxin Hu, Feng Luo, Jamie Macbeth and Edward Dillon
    In Proceedings of the 15th IEEE International Conference on Machine Learning and Applications (ICMLA 2016), Anaheim, California, USA, December 18-20, 2016.

  86. NeSMA: Enabling Network-Level State-Aware Applications in SDN
    Chen Sun, Jun Bi and Hongxin Hu
    In Proceedings of the 24th IEEE International Conference on Network Protocols (ICNP 2016), CoolSDN Workshop, Singapore, November 8-11, 2016.

  87. Comprehensive View of Security Practices in Vehicular Networks
    Manveen Kaur, James Martin and Hongxin Hu
    In Proceedings of the 5th International Conference on Connected Vehicles & Expo (ICCVE 2016), Seattle, USA, September 12-16, 2016.

  88. SLA-NFV: an SLA-aware High Performance Framework for Network Function Virtualization (Extended Abstract)
    Chen Sun, Jun Bi, Zhilong Zheng and Hongxin Hu
    In Proceedings of the ACM SIGCOMM Conference (SIGCOMM 2016 Poster), Florianópolis, Brazil, August 22-26, 2016.

  89. HetSDN: Exploiting SDN for Intelligent Network Usage in Heterogeneous Wireless Networks [PDF]
    Kang Chen, Ryan Izard, Hongxin Hu, Kuangching Wang and James Martin
    In Proceedings of 2016 IEEE/ACM International Symposium on Quality of Service (IWQoS 2016), Beijing, China, June 20-21, 2016.

  90. Enabling Dynamic Access Control for Controller Applications in Software-Defined Networks [PDF]
    Hitesh Padekar, Younghee Park, Hongxin Hu and Sang-Yoon Chang
    In Proceedings of the 21st ACM Symposium on Access Control Models And Technologies (SACMAT 2016), Shanghai, China, June 5-8, 2016.
    Best Paper Honorable Mention

  91. State-aware Network Access Management for Software-Defined Networks [PDF]
    Wonkyu Han, Hongxin Hu, Ziming Zhao, Adam Doupé, Gail-Joon Ahn, Kuang-Ching Wang and Juan Deng
    In Proceedings of the 21st ACM Symposium on Access Control Models And Technologies (SACMAT 2016), Shanghai, China, June 5-8, 2016.

  92. Performance Considerations of Network Functions Virtualization using Containers
    Jason Anderson, Udit Agarwal, Hongda Li, Hongxin Hu, Craig Lowery and Amy Apon
    In Proceedings of International Conference on Computing, Networking and Communications (ICNC 2016), Kauai, Hawaii, USA, February 15-18, 2016.

  93. 2015
  94. VNGuard: An NFV/SDN Combination Framework for Provisioning and Managing Virtual Firewalls [PDF]
    Juan Deng, Hongxin Hu, Hongda Li, Zhizhong Pan, Kuang-Ching Wang, Gail-Joon Ahn, Jun Bi and Younghee Park
    In Proceedings of IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN 2015), San Francisco, USA, November 18-21, 2015.

  95. SDPA: Enhancing Stateful Forwarding for Software-Defined Networking [PDF]
    Shuyong Zhu, Jun Bi, Chen Sun, Chenghui Wu and Hongxin Hu
    In Proceedings of the 23rd IEEE International Conference on Network Protocols (ICNP 2015), San Francisco, USA, November 10-13, 2015.
    Acceptance rate: 38/187 = 20.3%
    Best Paper Nominee

  96. AR-ABAC: A New Attribute Based Access Control Model Supporting Attribute-Rules for Cloud Computing
    Khaled Riad, Yan Zhu, Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 1st IEEE International Conference on Collaboration and Internet Computing (CIC 2015), Hangzhou, China, October 27-30, 2015.

  97. 2014
  98. Morpheus: Automatically Generating Heuristics to Detect Android Emulators [PDF] [Dataset]
    Yiming Jing, Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 30th Annual Computer Security Applications Conference(ACSAC 2014), New Orleans, LA, USA, December 8-12, 2014.
    Acceptance rate: 47/236 = 19.9%
    Finalist for CSAW 2015 Best Applied Security Paper Award

  99. An E2E Trusted Cloud Infrastructure (Extended Abstract) [PDF]
    Juan Wang, Bo Zhao, Huanguo Zhang, Fei Yan, Liqiang Zhang, Fajiang Yu and Hongxin Hu
    In Proceedings of the 21st ACM Conference on Computer and Communications Security (CCS 2014 Poster), Scottsdale, AZ, USA, November 3-7, 2014.

  100. Defensive Maneuver Cyber Platform Modeling with Stochastic Petri Nets [PDF]
    WC Moody, Hongxin Hu and Amy W. Apon
    In Proceedings of 10th International Conference on Collaborative Computing (CollaborateCom 2014), Miami, Florida, USA, October 22-25, 2014.

  101. FlowGuard: Building Robust Firewalls for Software-Defined Networks [PDF]
    Hongxin Hu, Wonkyu Han, Gail-Joon Ahn and Ziming Zhao
    In Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN 2014), Chicago, IL, USA, August 22, 2014.
    Acceptance rate (full paper with long presentation): 16/114 = 14.0%

  102. LPM: Layered Policy Management for Software-Defined Networks [PDF]
    Wonkyu Han, Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 28th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2014), Vienna, Austria. July 14-16, 2014.

  103. Game Theoretic Analysis of Multiparty Access Control in Online Social Networks [PDF]
    Hongxin Hu, Gail-Joon Ahn, Ziming Zhao and Dejun Yang
    In Proceedings of the 19th ACM Symposium on Access Control Models And Technologies (SACMAT 2014), London, Ontario, Canada, June 25-27, 2014.
    Acceptance rate: 29.3%
    Test-of-Time Award

  104. Towards a Reliable SDN Firewall [PDF]
    Hongxin Hu, Gail-Joon Ahn, Wonkyu Han and Ziming Zhao
    In Proceedings of Open Networking Summit 2014 (ONS 2014) Research Track, Santa Clara, California, USA, March 3-5, 2014.
    Acceptance rate (oral presentation): 28.2%

  105. RiskMon: Continuous and Automated Risk Assessment of Mobile Applications [PDF]
    Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu
    In Proceedings of the 4th ACM Conference on Data and Application Security and Privacy (CODASPY 2014), San Antonio, Texas, USA, March 3-5, 2014.
    Acceptance rate (full paper): 19/119 = 16.0%
    Best Paper Award

  106. 2013
  107. Towards a Security-Enhanced Firewall Application for OpenFlow Networks
    Juan Wang, Yong Wang, Hongxin Hu, Qingxin Sun, He Shi and Longjie Zeng
    In Proceedings of the 5th International Symposium on Cyberspace Safety and Security (CSS 2013), November 13-15, 2013.

  108. Towards a Trusted Launch Mechanism for Virtual Machines in Cloud Computing
    Juan Wang, Xuhui Xie and Hongxin Hu
    In Proceedings of the 4th International Conference on Cloud Computing (CLOUDCOMP 2013), October 17–19, 2013.

  109. On the Security of Picture Gesture Authentication [PDF]
    Ziming Zhao, Gail-Joon Ahn, Jeong-Jin Seo and Hongxin Hu
    In Proceedings of the 22nd USENIX Security Symposium (USENIX Security 2013), Washington DC, August 14-16, 2013.
    Acceptance rate: 44/277 = 15.9%
    Media coverage: ACM TechNews, InformationWeek, WeLiveSecurity, NetworkWorld, SlashDot, TechEYE, ThreatPost, SoftPedia, TechRadar, TechJournal, TechDigest, ParityNews, NeoWin, WebRoot, NakedSecurity, SignalNetworks, MyPRGenie, TheRegister, cnBeta, Delaware Business Daily, The State Press, DSU News, etc

  110. 2012
  111. Enabling Collaborative Data Sharing in Google+ [PDF]
    Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
    In Proceedings of the 55th IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, California, USA, December 3-7, 2012.

  112. Secure and Efficient Constructions of Hash, MAC and PRF for Mobile Devices [PDF]
    Yan Zhu, Shanbiao Wang, Di Ma, Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 55th IEEE Global Communications Conference (GLOBECOM 2012), Anaheim, California, USA, December 3-7, 2012.

  113. Model-based Conformance Testing for Android [PDF]
    Yiming Jing, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 7th International Workshop on Security (IWSEC 2012), Fukuoka, Japan, November 7-9, 2012.

  114. Secure Sharing of Electronic Health Records in Clouds [PDF]
    Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 8th IEEE International Conference on Collaborative Computing (CollaborateCom 2012), Pittsburgh, Pennsylvania, USA, October 14-17, 2012.

  115. SocialImpact: Systematic Analysis of Underground Social Dynamics [PDF]
    Ziming Zhao, Gail-Joon Ahn, Hongxin Hu and Deepinder Mahi
    In Proceedings of the 17th European Symposium on Research in Computer Security (ESORICS 2012), Pisa, Italy, September 10-14, 2012.
    Acceptance rate: 50/248 = 20.1%

  116. Comparison-Based Encryption for Fine-grained Access Control in Clouds [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyan Yu
    In Proceedings of the 2nd ACM Conference on Data and Application Security and Privacy (CODASPY 2012), San Antonio, Texas, USA, February 7-9, 2012.
    Acceptance rate: 21/113 = 18.6%

  117. Towards Temporal Access Control in Cloud Computing [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Dijiang Huang and Shanbiao Wang
    In Proceedings of the 31st IEEE International Conference on Computer Communications (INFOCOM 2012), Mini-conference, Orlando, Florida, USA, March 25-30, 2012.
    Acceptance rate: 378/1547 = 24.4%

  118. Towards HIPAA-compliant Healthcare Systems [PDF]
    Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium (IHI 2012), Miami, Florida, USA, January 28-30, 2012.
    Acceptance rate for oral presentation: 48/269 = 17.8%

  119. 2011
  120. Detecting and Resolving Privacy Conflicts for Collaborative Data Sharing in Online Social Networks [PDF]
    Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
    In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC 2011), Orlando, Florida, USA, December 5-9, 2011.
    Acceptance rate: 39/195 = 20.0%

  121. Examining Social Dynamics for Countering Botnet Attacks [PDF]
    Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 54th IEEE Global Communications Conference (GLOBECOM 2011), Houston, Texas, USA, December 5-9, 2011.

  122. Collaborative Integrity Verification in Hybrid Clouds [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han and Shimin Chen
    In Proceedings of the 7th International Conference on Collaborative Computing (CollaborateCom 2011), Orlando, Florida, USA, October 15-18, 2011.

  123. Ontology-based Policy Anomaly Management for Autonomic Computing [PDF]
    Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
    In Proceedings of the 7th International Conference on Collaborative Computing (CollaborateCom 2011), Orlando, Florida, USA, October 15-18, 2011.

  124. Automatic Extraction of Secrets from Malware [PDF]
    Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 18th Working Conference on Reverse Engineering (WCRE 2011), Limerick, Ireland, October 17-20, 2011.
    Acceptance rate: 27/104 = 25.9%

  125. Temporal Attribute-Based Encryption in Clouds (Extended Abstract) [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Xiaorui Gong and Shimin Chen
    In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011 Poster), Chicago, IL, USA, October 17-21, 2011.

  126. Multiparty Authorization Framework for Data Sharing in Online Social Networks [PDF]
    Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 25th Annual WG 11.3 Conference on Data and Applications Security and Privacy (DBSec 2011), Richmond, Virginia, USA. July 11-13, 2011.

  127. Anomaly Discovery and Resolution in Web Access Control Policies [PDF]
    Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
    In Proceedings of the 16th ACM Symposium on Access Control Models And Technologies (SACMAT 2011), Innsbruck, Austria, June 15-17, 2011.
    Best Paper Nominee

  128. Dynamic Audit Services for Integrity Verification of Outsourced Storages in Clouds [PDF]
    Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu and Stephen S. Yau
    In Proceedings of the 26th ACM Symposium on Applied Computing (SAC 2011), Security Track, TaiChung, Taiwan, March 21-25, 2011.
    Acceptance rate for the security track: 9/41 = 21.9%
     

  129. Security Validation of Information Card Protocol with AVISPA
    Juan Wang and Hongxin Hu
    In Proceedings of International Conference on Energy Systems and Electrical Power (ESEP 2011), Singapore, Dec 9-10, 2011.

  130. 2010
  131. A Collaborative Framework for Privacy Protection in Online Social Networks [PDF]
    Yan Zhu, Zexing Hu, Huaixi Wang, Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010), Chicago, Illinois, USA, October 9-12, 2010.

  132. Information Flow Control in Cloud Computing [PDF]
    Ruoyu Wu, Gail-Joon Ahn, Hongxin Hu and Mukesh Singhal
    In Proceedings of the 6th International Conference on Collaborative Computing (CollaborateCom 2010), Chicago, Illinois, USA, October 9-12, 2010.

  133. FAME: A Firewall Anomaly Management Environment [PDF]
    Hongxin Hu, Gail-Joon Ahn and Ketan Kulkarni
    In Proceedings of ACM CCS Workshop on Assurable & Usable Security Configuration (SafeConfig 2010)
    in conjunction with the 17th ACM Conference on Computer and Communications Security (CCS 2010),
    Chicago, IL, USA, October 4, 2010.  

  134. Efficient Provable Data Possession for Hybrid Clouds (Extended Abstract) [PDF]
    Yan Zhu, Huaixi Wang, Zexing Hu, Gail-Joon Ahn, Hongxin Hu and Stephen S. Yau
    In Proceedings of the 17th ACM Conference on Computer and Communications Security (CCS 2010 Poster), Chicago, IL, USA, October 4-8, 2010.

  135. Risk-Aware Response for Mitigating MANET Routing Attacks [PDF]
    Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu
    In Proceedings of the 53rd IEEE Global Communications Conference (GLOBECOM 2010), Miami, Florida, USA, December 6-10, 2010.

  136. DR@FT: Efficient Remote Attestation Framework for Dynamic Systems [PDF]
    Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang and Jean-Pierre Seifert
    In Proceedings of the 15th European Symposium on Research in Computer Security (ESORICS 2010), Athens, Greece, September 20-22, 2010.
    Acceptance rate: 42/201 = 20.8%

  137. Representing and Reasoning about Web Access Control Policies [PDF]
    Gail-Joon Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng (Authors are listed alphabetically)
    In Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference (COMPSAC 2010), Seoul, South Korea, July 19-23, 2010.
    Acceptance rate: 39/193 = 20% 

  138. Reasoning about XACML Policy Descriptions in Answer Set Programming [PDF]
    Gail-Joon Ahn, Hongxin Hu, Joohyung Lee and Yunsong Meng (Authors are listed alphabetically)
    In Proceedings of the 13th International Workshop on Nonmonotonic Reasoning (NMR 2010), Toronto, Canada, May 14-16, 2010.  

  139. Cryptographic Role-based Security Mechanisms based on Role-Key Hierarchy [PDF]
    Yan Zhu, Gail-Joon Ahn, Hongxin Hu and Huaixi Wang
    In Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security (ASIACCS 2010), Beijing, China, April 13-16, 2010.
    Acceptance rate: 35/166 = 21%

  140. 2009
  141. Building Dynamic Remote Attestation Framework (Extended Abstract) [PDF]
    Wenjuan Xu, Gail-Joon Ahn, Hongxin Hu, Xinwen Zhang and Jean-Pierre Seifert
    In the 16th ACM Conference on Computer and Communications Security (CCS 2009 Poster), Chicago, IL, USA, November 9-13, 2009.  

  142. Patient-centric Authorization Framework for Sharing Electronic Health Records [PDF]
    Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen Zhang
    In Proceedings of the 14th ACM Symposium on Access Control Models And Technologies (SACMAT 2009), Stresa, Italy, June 3-5, 2009.  

  143. 2008
  144. Towards Role-based Authorization for OSGi Service Environments [PDF]
    Gail-Joon Ahn, Hongxin Hu and Jing Jin
    In Proceedings of the 12th IEEE International Workshop on Future Trends of Distributed Computing Systems (FTDCS 2008), Kunming, China, October 21-23, 2008.  

  145. Enabling Verification and Conformance Testing for Access Control Model [PDF]
    Hongxin Hu and Gail-Joon Ahn
    In Proceedings of the 13th ACM Symposium on Access Control Models And Technologies (SACMAT 2008), Estes Park, Colorado, USA, June 11-12, 2008.
    Acceptance rate: 20/79 = 25%
     

  146. 2007
  147. Towards Trust-aware Access Management for Ad-hoc Collaborations [PDF]
    Jing Jin, Gail-Joon Ahn, Mohammed Shehab and Hongxin Hu
    In Proceedings of the 3rd International Conference on Collaborative Computing (CollaborateCom 2007), New York, USA, November 12-15, 2007.

  148. Towards Realizing a Formal RBAC Model in Real Systems [PDF]
    Gail-Joon Ahn and Hongxin Hu
    In Proceedings of the 12th ACM Symposium on Access Control Models And Technologies (SACMAT 2007), Sophia Antipolis, France, June 20-22, 2007.
    Acceptance rate: 19/79 = 24%

Refereed Journal/Magazine Publications:
  1. A Zero Trust Architecture for Connected and Autonomous Vehicles
    John Anderson, Qiqing Huang, Long Cheng and Hongxin Hu
    IEEE Internet Computing, 2023.

  2. SysFlow: Towards a Programmable Zero Trust Framework for System Security
    Sungmin Hong, Lei Xu, Jianwei Huang, Hongda Li, Hongxin Hu and Guofei Gu
    IEEE Transactions on Information Forensics and Security (TIFS), 2023.

  3. Dual-Level Knowledge Distillation via Knowledge Alignment and Correlation
    Fei Ding, Yin Yang, Hongxin Hu, Venkat Krovi and Feng Luo
    IEEE Transactions on Neural Networks and Learning Systems (TNNLS), 2022.

  4. S-Blocks: Lightweight and Trusted Virtual Security Function with SGX
    Juan Wang, Shirong Hao, Hongxin Hu, Hongda Li, Wenhui Zhang, Jun Xu and Peng Liu
    IEEE Transactions on Cloud Computing (TCC), 10(2): 1082-1099, 2022.

  5. COVID-19: A Pandemic of Anti-Asian Cyberhate
    Matthew Costello, Long Cheng, Feng Luo, Hongxin Hu, Song Liao, Nishant Vishwamitra, Mingqi Li and Ebuka Okpala
    Journal of Hate Studies, 17(1), 2021.

  6. Problematic Privacy Policies of Voice Assistant Applications
    Song Liao, Christin Wilson, Long Cheng, Hongxin Hu and Huixing Deng
    IEEE Security & Privacy (S&P), 2021.

  7. Enabling Performant, Flexible and Cost-Efficient DDoS Defense with Programmable Switches
    Guanyu Li, Menghao Zhang, Shicheng Wang, Chang Liu, Mingwei Xu, Ang Chen, Hongxin Hu, Guofei Gu, Qi Li, Jianping Wu
    IEEE/ACM Transactions on Networking (ToN), 29(4): 1509-1526, 2021.

  8. Octans: Optimal Placement of Service Function Chains in Many-Core Systems
    Heng Yu, Zhilong Zheng, Junxian Shen, Congcong Miao, Chen Sun, HongxinHu, Jun Bi, Jianping Wu, Jilong Wang
    IEEE Transactions Parallel and Distributed Systems (TPDS), 32(9): 2202-2215, 2021.

  9. Practically Deploying Heavyweight Adaptive Bitrate Algorithms With Teacher-Student Learning
    Zili Meng, Yaning Guo, Yixin Shen, Jing Chen, Chao Zhou, Minhu Wang, Jia Zhang, Mingwei Xu, Chen Sun, Hongxin Hu
    IEEE/ACM Transactions on Networking (ToN), 29(2): 723-736, 2021.

  10. Context-rich Privacy Leakage Analysis through Inferring Apps in Smart Home IoT
    Yuan Luo, Long Cheng, Hongxin Hu, Guojun Peng, Danfeng Yao
    IEEE Internet of Things Journal (IoTJ), 8(4): 2736-2750, 2021.

  11. IoT-Praetor: Undesired Behaviors Detection for IoT Devices
    Juan Wang, Shirong Hao, Ru Wen, Boxian Zhang, Hongxin Hu and Rongxin Lu
    IEEE Internet of Things Journal (IoTJ), 8(2): 927-940, 2021.

  12. Paving the Way for NFV Acceleration: A Taxonomy, Survey and Future Directions
    Xincai Fei, Fangming Liu, Qixia Zhang, Hai Jin, Hongxin Hu
    ACM Computing Surveys (CSUR), Vol.53, August 2020.

  13. MicroNF: An Efficient Framework for Enabling Modularized Service Chains in NFV
    Zili Meng, Jun Bi, Haiping Wang, Chen Sun and Hongxin Hu
    IEEE Journal of Selected Areas in Communications (JSAC), 2019.

  14. Vision-Based Navigation of Autonomous Vehicle in Roadway Environments with Unexpected Hazards
    Mhafuzul Islam, Mashrur Chowdhury, Hongda Li and Hongxin Hu
    Journal of the Transportation Research Board (TRB), 2019.

  15. Towards a Reliable Firewall for Software-Defined Networks
    Hongxin Hu, Wonkyu Han, Sukwha Kyung, Gail-Joon Ahn, Ziming Zhao, Hongda Li and Juan Wang
    Computers & Security (COSE), Elsevier, 2019

  16. Tripod: Towards a Scalable, Efficient and Resilient Cloud Gateway
    Menghao Zhang, Jun Bi, Kai Gao, Yi Qiao, Guanyu Li, Xiao Kong, Zhaogeng Li and Hongxin Hu
    IEEE Journal of Selected Areas in Communications (JSAC), Vol.37, No.3, 2019.

  17. Enabling NFV Elasticity Control with Optimized Flow Migration
    Chen Sun, Jun Bi, Zili Meng, Tong Yang, Xiao Zhang and Hongxin Hu
    IEEE Journal of Selected Areas in Communications (JSAC), Vol.36, No.10, 2018.

  18. Cybersecurity Attacks in Vehicle-to-Infrastructure (V2I) Applications and Their Prevention
    Mhafuzul Islam, Mashrur Chowdhury, Hongda Li and Hongxin Hu
    Journal of the Transportation Research Board (TRB), 2018.

  19. HYPER: A Hybrid High-Performance Framework for Network Function Virtualization
    Chen Sun, Jun Bi, Zhilong Zheng and Hongxin Hu
    IEEE Journal of Selected Areas in Communications (JSAC), Special issue on Emerging Technologies in Software-driven Communication, Vol. 35, No. 11, 2017.

  20. SDPA: Towards a Stateful Data Plane in Software-Defined Networking
    Chen Sun, Jun Bi, Haoxian Chen, Hongxin Hu, Zhilong Zheng, Shuyong Zhu and Chenghui Wu
    IEEE/ACM Transactions on Networking (TON), Vol. 25, No. 6, December, 2017.

  21. CHAOS: An SDN-Based Moving Target Defense System
    Yuan Shi, Huanguo Zhang, Juan Wang, Feng Xiao, Jianwei Huang, Daochen Zha, Hongxin Hu, Fei Yan, and Bo Zhao
    Security and Communication Networks (SCN), October, 2017.

  22. TripleMon: A Multi-layer Security Framework for Mediating Inter-Process Communication on Android
    Yiming Jing, Gail-Joon Ahn, Hongxin Hu, Haehyun Cho, and Ziming Zhao
    Journal of Computer Security (JCS), Vol. 24, No. 4, 2016.

  23. Supporting Virtualized Network Functions with Stateful Data Plane Abstraction
    Jun Bi, Shuyong Zhu, Guang Yao, Chen Sun and Hongxin Hu
    IEEE Network, Vol. 30, No. 3, 2016.

  24. Mules, Seals, and Attacking Tools: Analyzing Twelve Online Marketplaces
    Ziming Zhao, Mukund Sankaran, Gail-Joon Ahn, Tom Holt, Yiming Jing and Hongxin Hu
    IEEE Security & Privacy, Vol. 14, No. 3, 2016.

  25. Picture Gesture Authentication: Empirical Analysis, Automated Attacks, and Scheme Evaluation [PDF]
    Ziming Zhao, Gail-Joon Ahn and Hongxin Hu
    ACM Transactions on Information and System Security (TISSEC), Vol. 17, No. 4, April, 2015.

  26. Towards Automated Risk Assessment and Mitigation of Mobile Applications [PDF]
    Yiming Jing, Gail-Joon Ahn, Ziming Zhao and Hongxin Hu
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 12, No. 5, November/December, 2015.
    Selected as the spotlight paper of the issue. (screen shot)

  27. OpenFlow-based Real-Time Conflict Detection and Resolution for SDN Access Control Policies
    Juan Wang, Jiang Wang, Hongyang Jiao, Yong Wang, Shiya Chen, Shihui Liu and Hongxin Hu
    Chinese Journal of Computers (CJC), Vol. 38, No. 4, April, 2015.

  28. Secure and Efficient Random Functions with Variable-Length Output
    Yan Zhu, Di Ma, Changjun Hu, Gail-Joon Ahn and Hongxin Hu
    Journal of Network and Computer Applications (JNCA), August, 2014.

  29. Role-Based Cryptosystem: A New Cryptographic RBAC System Based on Role-Key Hierarchy [PDF]
    Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Di Ma and Shanbiao Wang
    IEEE Transactions on Information Forensics & Security (TIFS), Vol. 8, No. 12, December, 2013.

  30. Discovery and Resolution of Anomalies in Web Access Control Policies [PDF]
    Hongxin Hu, Gail-Jooh Ahn and Ketan Kulkarni
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 10, No. 6, November/December, 2013.
    Selected as the spotlight paper of the issue. (screen shot)

  31. Multiparty Access Control for Online Social Networks: Model and Mechanisms [PDF]
    Hongxin Hu, Gail-Joon Ahn and Jan Jorgensen
    IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 25, No. 7, July, 2013.
    Featured by the IEEE Special Technical Community on Social Networking: (respective post)

  32. Dynamic Audit Services for Outsourced Storages in Clouds [PDF]
    Yan Zhu, Gail-Joon Ahn, Hongxin Hu, Stephen S. Yau, Ho G. An and Shimin Chen
    IEEE Transactions on Services Computing (TSC), Vol. 6, No. 2, April/June, 2013.

  33. Formal Analysis of Information Card Federated Identity-Management Protocol [PDF]
    Juan Wang, Hongxin Hu, Bo Zhao, Fei Yan, Huangguo Zhang and Qianhong Wu
    Chinese Journal of Electronics (CJE), Vol. 22, No. 1, January, 2013.

  34. Towards HIPAA-compliant Healthcare Systems in Cloud Computing [PDF]
    Ruoyu Wu, Gail-Joon Ahn and Hongxin Hu
    International Journal of Computational Models and Algorithms in Medicine (IJCMAM), Special Issue on Privacy in Health Informatics, Vol. 3, No. 2, December, 2012.

  35. Cooperative Provable Data Possession for Integrity Verification in Multi-Cloud Storage [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Mengyang Yu
    IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 23, No. 12, December, 2012.

  36. Collaborative Integrity Verification in Hybrid Clouds [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Yujing Han and Shimin Chen
    International Journal of Cooperative Information Systems (IJCIS), World Scientific, Vol. 21, No. 03, November, 2012.
    Invited as one of best papers presented at CollaborateCom'11.

  37. Detecting and Resolving Firewall Policy Anomalies [PDF]
    Hongxin Hu, Gail-Jooh Ahn and Ketan Kulkarni
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 9, No. 3, May/June 2012.

  38. Comprehensive Two-Level Analysis of Role-Based Delegation and Revocation Policies [PDF]
    Karsten Sohr, Mirco Kuhlmann, Martin Gogolla, Hongxin Hu and Gail-Joon Ahn
    Information and Software Technology (IST), Elsevier, Vol. 54, No. 12, December, 2012.
    Invited as the SSIRI'11 best paper.

  39. Efficient Constructions of Provably Secure Steganography under Ordinary Covert Channels [PDF]
    Yan Zhu, Mengyang Yu, Hongxin Hu, Gail-Joon Ahn and Hongjia Zhao
    Science China - Information Sciences, Springer, Vol. 55, No. 7, July, 2012.

  40. Remote Attestation with Domain-based Integrity Model and Policy Analysis [PDF]
    Wenjuan Xu, Xinwen Zhang, Hongxin Hu, Gail-Joon Ahn and Jean-Pierre Seifert
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 9, No. 3, May/June 2012.

  41. Efficient Audit Service Outsourcing for Data Integrity in Clouds [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn and Stephen S. Yau
    Journal of Systems and Software (JSS), Elsevier, Vol. 85, No 5, May 2012.

  42. Risk-Aware Mitigation for MANET Routing Attacks [PDF]
    Ziming Zhao, Hongxin Hu, Gail-Joon Ahn and Ruoyu Wu
    IEEE Transactions on Dependable and Secure Computing (TDSC), Vov. 9, No. 2, March/April 2012.

  43. Provably Secure Role-Based Encryption with Revocation Mechanism [PDF]
    Yan Zhu, Hongxin Hu, Gail-Joon Ahn, Huaixi Wang and Shanbiao Wang
    Journal of Computer Science and Technology (JCST), Springer, Vol. 26, No. 4, July, 2011.

  44. Patient-centric Authorization Framework for Electronic Healthcare Services [PDF]
    Jing Jin, Gail-Joon Ahn, Hongxin Hu, Michael Covington and Xinwen Zhang
    Computers & Security (COSE), Elsevier, Vol. 30, No. 2-3, March-May, 2011.

  45. Zero-knowledge Proofs of Retrievability [PDF]
    Yan Zhu, Zexing Hu, Huaixi Wang, Gail-Joon Ahn and Hongxin Hu
    Science China - Information Sciences, Springer, Vol. 54, No. 8, August, 2011.

  46. Constructing Authorization Systems Using Assurance Management Framework [PDF]
    Hongxin Hu and Gail-Joon Ahn
    IEEE Transactions on Systems, Man, and Cybernetics (TSMC), Part C, Special Issue on Availability, Reliability, and Security, Vol. 40, No. 4, July, 2010.
    Acceptance rate for the special issue: 6/70 = 8.6%

  47. Security-enhanced OSGi Service Environments [PDF]
    Gail-Joon Ahn, Hongxin Hu and Jing Jin
    IEEE Transactions on Systems, Man, and Cybernetics (TSMC), Part C, Vol. 39, No. 5, September, 2009.