Follow
Chin-Tser Huang
Chin-Tser Huang
Professor of Computer Science and Engineering, University of South Carolina
Verified email at cse.sc.edu - Homepage
Title
Cited by
Cited by
Year
A computational approach for examining the roots and spreading patterns of fake news: Evolution tree analysis
SM Jang, T Geng, JYQ Li, R Xia, CT Huang, H Kim, J Tang
Computers in Human Behavior 84, 103-113, 2018
1842018
Security issues in privacy and key management protocols of IEEE 802.16
S Xu, M Matthews, CT Huang
Proceedings of the 44th annual Southeast regional conference, 113-118, 2006
1502006
A secure address resolution protocol
MG Gouda, CT Huang
Computer Networks 41 (1), 57-71, 2003
1182003
Chinese remainder theorem based group key management
X Zheng, CT Huang, M Matthews
Proceedings of the 45th annual southeast regional conference, 266-271, 2007
1122007
Attacks on PKM protocols of IEEE 802.16 and its later versions
S Xu, CT Huang
2006 3rd International Symposium on Wireless Communication Systems, 185-189, 2006
1042006
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
1022014
Smart urban surveillance using fog computing
N Chen, Y Chen, S Song, CT Huang, X Ye
2016 IEEE/ACM symposium on edge computing (SEC), 95-96, 2016
922016
Wavelet-based real time detection of network traffic anomalies
CT Huang, S Thareja, YJ Shin
2006 securecomm and workshops, 1-7, 2006
862006
A secure cookie protocol
AX Liu, JM Kovacs, CT Huang, MG Gouda
Proceedings. 14th International Conference on Computer Communications and …, 2005
692005
Multi-dimensional credentialing using veiled certificates
JH Gerdes Jr, J Kalvenes, CT Huang
US Patent 8,468,355, 2013
682013
Responding to security issues in WiMAX networks
CT Huang, JM Chang
IT Professional 10 (5), 15-21, 2008
632008
Hop integrity in computer networks
MG Gouda, EN Elnozahy, CT Huang, TM McGuire
IEEE/ACM Transactions on Networking 10 (3), 308-319, 2002
632002
A hierarchical framework for secure and scalable EHR sharing and access control in multi-cloud
J Huang, M Sharaf, CT Huang
2012 41st international conference on parallel processing workshops, 279-287, 2012
522012
Smart city surveillance in fog computing
N Chen, Y Chen, X Ye, H Ling, S Song, CT Huang
Advances in mobile cloud computing and big data in the 5G era, 203-226, 2017
512017
Look-ahead routing and message scheduling in delay-tolerant networks
Y Xian, CT Huang, J Cobb
Computer Communications 34 (18), 2184-2194, 2011
482011
Using anomaly detection based techniques to detect HTTP-based botnet C&C traffic
MN Sakib, CT Huang
2016 ieee international conference on communications (icc), 1-6, 2016
402016
Modeling and analysis of IEEE 802.16 PKM Protocols using CasperFDR
S Xu, CT Huang, MM Matthews
2008 IEEE International Symposium on Wireless Communication Systems, 653-657, 2008
342008
Efficient and secure multicast in wirelessman: A cross-layer design
CT Huang, M Matthews, M Ginley, X Zheng, C Chen, JM Chang
Journal of Communications Software and Systems 3 (3), 199-206, 2007
342007
Impact of dust and sand on 5G communications for connected vehicles applications
E Abuhdima, J Liu, C Zhao, A Elqaouaq, G Comert, CT Huang, P Pisu, ...
IEEE Journal of Radio Frequency Identification 6, 229-239, 2022
332022
Key trees and the security of interval multicast
MG Gouda, CT Huang, EN Elnozahy
Proceedings 22nd International Conference on Distributed Computing Systems …, 2002
312002
The system can't perform the operation now. Try again later.
Articles 1–20