Follow
Hongxin Hu
Hongxin Hu
Professor of Computer Science, University at Buffalo, SUNY
Verified email at buffalo.edu - Homepage
Title
Cited by
Cited by
Year
Cooperative provable data possession for integrity verification in multicloud storage
Y Zhu, H Hu, GJ Ahn, M Yu
Parallel and Distributed Systems, IEEE Transactions on 23 (12), 2231-2244, 2012
7022012
Dynamic audit services for outsourced storages in clouds
Y Zhu, GJ Ahn, H Hu, SS Yau, HG An, CJ Hu
IEEE transactions on services computing 6 (2), 227-238, 2011
4192011
Dynamic audit services for integrity verification of outsourced storages in clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 2011 ACM symposium on applied computing, 1550-1557, 2011
3942011
FlowGuard: Building Robust Firewalls for Software-Defined Network
H Hu, W Han, GJ Ahn, Z Zhao
Proceedings of ACM SIGCOMM Workshop on Hot Topics in Software Defined …, 2014
3762014
Multiparty access control for online social networks: model and mechanisms
H Hu, GJ Ahn, J Jorgensen
Knowledge and Data Engineering, IEEE Transactions on 25 (7), 1614-1627, 2013
2962013
NFP: Enabling network function parallelism in NFV
C Sun, J Bi, Z Zheng, H Yu, H Hu
Proceedings of the Conference of the ACM Special Interest Group on Data …, 2017
2852017
Detecting and Resolving Firewall Policy Anomalies
H Hu, GJ Ahn, K Kulkarni
IEEE Transactions on Dependable and Secure Computing, 2012
2422012
Poseidon: Mitigating volumetric ddos attacks with programmable switches
M Zhang, G Li, S Wang, C Liu, A Chen, H Hu, G Gu, Q Li, M Xu, J Wu
the 27th Network and Distributed System Security Symposium (NDSS 2020), 2020
2182020
On the safety of iot device physical interaction control
W Ding, H Hu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
2182018
Efficient provable data possession for hybrid clouds
Y Zhu, H Wang, Z Hu, GJ Ahn, H Hu, SS Yau
Proceedings of the 17th ACM conference on Computer and communications …, 2010
2072010
Detecting and resolving privacy conflicts for collaborative data sharing in online social networks
H Hu, GJ Ahn, J Jorgensen
Proceedings of the 27th annual computer security applications conference …, 2011
1812011
Efficient audit service outsourcing for data integrity in clouds
Y Zhu, H Hu, GJ Ahn, SS Yau
Journal of Systems and Software 85 (5), 1083-1095, 2012
1432012
Cyberbullying detection with a pronunciation based convolutional neural network
X Zhang, J Tong, N Vishwamitra, E Whittaker, JP Mazer, R Kowalski, H Hu, ...
2016 15th IEEE international conference on machine learning and applications …, 2016
1382016
Morpheus: automatically generating heuristics to detect android emulators
Y Jing, Z Zhao, GJ Ahn, H Hu
Proceedings of the 30th Annual Computer Security Applications Conference …, 2014
1372014
Secure sharing of electronic health records in clouds
R Wu, GJ Ahn, H Hu
8th international conference on collaborative computing: networking …, 2012
1292012
Towards Temporal Access Control in Cloud Computing
Y Zhu, H Hu, GJ Ahn, D Huang, S Wang
Proceedings of 31st IEEE International Conference on Computer Communications, 2012
1292012
Interpreting Deep Learning-Based Networking Systems
HH Zili Meng, Minhu Wang, Jiasong Bai, Mingwei Xu, Hongzi Mao
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
1212020
LPM: Layered policy management for software-defined networks
W Han, H Hu, GJ Ahn
Data and Applications Security and Privacy XXVIII: 28th Annual IFIP WG 11.3 …, 2014
1192014
Effectiveness and users' experience of obfuscation as a privacy-enhancing technology for sharing photos
Y Li, N Vishwamitra, BP Knijnenburg, H Hu, K Caine
Proceedings of the ACM on Human-Computer Interaction 1 (CSCW), 1-24, 2017
1072017
Patient-centric authorization framework for sharing electronic health records
J Jin, GJ Ahn, H Hu, MJ Covington, X Zhang
Proceedings of the 14th ACM symposium on Access control models and …, 2009
1072009
The system can't perform the operation now. Try again later.
Articles 1–20