Hongxin Hu
Hongxin Hu
Associate Professor of Computer Science, University at Buffalo, SUNY
Verified email at - Homepage
Cited by
Cited by
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
Parallel and Distributed Systems, IEEE Transactions on 23 (12), 2231-2244, 2012
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE transactions on services computing 6 (2), 227-238, 2011
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011
FlowGuard: Building Robust Firewalls for Software-Defined Network
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined …, 2014
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
Knowledge and Data Engineering, IEEE Transactions on 25 (7), 1614-1627, 2013
NFP: Enabling network function parallelism in NFV
C Sun, J Bi, Z Zheng, H Yu, H Hu
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
Detecting and Resolving Firewall Policy Anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on Dependable and Secure Computing, 2012
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
On the safety of iot device physical interaction control
W Ding, H Hu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
H Hu, GJ Ahn, J Jorgensen
Proceedings of the 27th Annual Computer Security Applications Conference …, 2011
Poseidon: Mitigating volumetric ddos attacks with programmable switches
M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu
the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020
Efficient audit service outsourcing for data integrity in clouds
Y Zhu, H Hu, GJ Ahn, SS Yau
Journal of Systems and Software 85 (5), 1083-1095, 2012
Towards Temporal Access Control in Cloud Computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
Proceedings of 31st IEEE International Conference on Computer Communications, 2012
Secure sharing of electronic health records in clouds
R Wu, GJ Ahn, H Hu
8th international conference on collaborative computing: networking …, 2012
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
Cyberbullying detection with a pronunciation based convolutional neural network
X Zhang, J Tong, N Vishwamitra, E Whittaker, JP Mazer, R Kowalski, H Hu, ...
2016 15th IEEE international conference on machine learning and applications …, 2016
LPM: Layered policy management for software-defined networks
W Han, H Hu, GJ Ahn
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
Riskmon: Continuous and automated risk assessment of mobile applications
Y Jing, GJ Ahn, Z Zhao, H Hu
Proceedings of the 4th ACM Conference on Data and Application Security and …, 2014
Patient-centric authorization framework for sharing electronic health records
J Jin, GJ Ahn, H Hu, MJ Covington, X Zhang
Proceedings of the 14th ACM symposium on Access control models and …, 2009
Interpreting Deep Learning-Based Networking Systems
HH Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
The system can't perform the operation now. Try again later.
Articles 1–20